메뉴 건너뛰기




Volumn 2, Issue , 2008, Pages 737-742

Efficient k-anonymization for privacy preservation

Author keywords

Data engineering; k anonymity; Privacy

Indexed keywords

DATA ENGINEERING; K-ANONYMITY; K-ANONYMIZATION; PRIVACY;

EID: 51049096797     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSCWD.2008.4537070     Document Type: Conference Paper
Times cited : (7)

References (12)
  • 4
    • 0344024833 scopus 로고    scopus 로고
    • Guaranteeing anonymity when sharing medical data, the Datafly system
    • Washington, DC: Hanley and Belfus, Inc
    • L. Sweeney. Guaranteeing anonymity when sharing medical data, the Datafly system. Proceedings, Journal of the American Medical Informatics Association. Washington, DC: Hanley and Belfus, Inc., 1997. 6
    • (1997) Proceedings, Journal of the American Medical Informatics Association , pp. 6
    • Sweeney, L.1
  • 6
    • 28444449426 scopus 로고    scopus 로고
    • Data Privacy through Optimal k-Anonymization
    • R. J. Bayardo and R. Agrawal. Data Privacy through Optimal k-Anonymization. In Proc. of ICDE, pp 217C228, 2005.
    • (2005) Proc. of ICDE , Issue.C228 , pp. 217
    • Bayardo, R.J.1    Agrawal, R.2
  • 7
    • 0242625276 scopus 로고    scopus 로고
    • Transforming Data to Satisfy Privacy Constraints
    • V. S. Iyengar. Transforming Data to Satisfy Privacy Constraints. In Proc. of SIGKDD, pp 279C288, 2002.
    • (2002) Proc. of SIGKDD , Issue.C288 , pp. 279
    • Iyengar, V.S.1
  • 8
    • 33749582207 scopus 로고    scopus 로고
    • Utility-Based Anonymization Using Local Recoding
    • J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. Fu. Utility-Based Anonymization Using Local Recoding. In Proc. of SIGKDD, pp 785C790, 2006.
    • (2006) Proc. of SIGKDD , Issue.C790 , pp. 785
    • Xu, J.1    Wang, W.2    Pei, J.3    Wang, X.4    Shi, B.5    Fu, A.6
  • 9
    • 29844444250 scopus 로고    scopus 로고
    • K. LeFevre, D. DeWitt, and R. Ramakrishnan. Incognito: Efficient fulldomain k-anonymity. In SIGMOD, 2005.
    • K. LeFevre, D. DeWitt, and R. Ramakrishnan. Incognito: Efficient fulldomain k-anonymity. In SIGMOD, 2005.
  • 10
    • 51049120125 scopus 로고    scopus 로고
    • J. W. Byun, A. Kamra, E Bertino, N. Li(2006), k-Anonymity using Clustering Technique, CERIAS Tech Report 2006-10.
    • J. W. Byun, A. Kamra, E Bertino, N. Li(2006), "k-Anonymity using Clustering Technique", CERIAS Tech Report 2006-10.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.