메뉴 건너뛰기




Volumn , Issue , 2008, Pages 152-157

Privacy-preserving data publishing based on de-clustering

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION; COMPUTER NETWORKS; CYBERNETICS; ELECTRIC BREAKDOWN; FLOW OF SOLIDS; INDEXING (OF INFORMATION); INFORMATION MANAGEMENT; INFORMATION SCIENCE; PUBLISHING;

EID: 51349158856     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIS.2008.44     Document Type: Conference Paper
Times cited : (6)

References (22)
  • 1
    • 33745629638 scopus 로고    scopus 로고
    • On k-anonymity and the curse of dimensionality
    • C. C. Aggarwal. On k-anonymity and the curse of dimensionality. In VLDB, 2005.
    • (2005) VLDB
    • Aggarwal, C.C.1
  • 2
    • 29844432932 scopus 로고    scopus 로고
    • A condensation based approach to privacy preserving data mining
    • C. C. Aggarwal and P. S. Yu. A condensation based approach to privacy preserving data mining. In EDBT, 2004.
    • (2004) EDBT
    • Aggarwal, C.C.1    Yu, P.S.2
  • 4
    • 28444478342 scopus 로고    scopus 로고
    • Privacy and ownership preserving of outsourced medical data
    • E. Bertino, B. Qoi, Y. Yang, and R. Deng. Privacy and ownership preserving of outsourced medical data. In ICDE, 2005.
    • (2005) ICDE
    • Bertino, E.1    Qoi, B.2    Yang, Y.3    Deng, R.4
  • 5
    • 0003810593 scopus 로고
    • The idea of de-clustering and its applications
    • M. T. Fang, C. T. Rechard, and C. C. Chang. The idea of de-clustering and its applications. In VLDB, 1986.
    • (1986) VLDB
    • Fang, M.T.1    Rechard, C.T.2    Chang, C.C.3
  • 6
    • 28444499680 scopus 로고    scopus 로고
    • Top-down specialization for information and privacy preservation
    • B. C. M. Fung, K. Wang, and P. S. Yu. Top-down specialization for information and privacy preservation. In ICDE, 2005.
    • (2005) ICDE
    • Fung, B.C.M.1    Wang, K.2    Yu, P.S.3
  • 7
    • 0242625276 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • V. Iyengar. Transforming data to satisfy privacy constraints. In SIGKDD, 2002.
    • (2002) SIGKDD
    • Iyengar, V.1
  • 8
    • 28444449426 scopus 로고    scopus 로고
    • R. J. B. Jr. and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, 2005.
    • R. J. B. Jr. and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, 2005.
  • 9
    • 34250673244 scopus 로고    scopus 로고
    • Injecting utility into anonymized datasets
    • D. Kifer and J. Gehrke. Injecting utility into anonymized datasets. In SIGMOD, 2006.
    • (2006) SIGMOD
    • Kifer, D.1    Gehrke, J.2
  • 10
  • 13
    • 3142691086 scopus 로고    scopus 로고
    • On the complexity of optimal k-anonymity
    • A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In PODS, 2004.
    • (2004) PODS
    • Meyerson, A.1    Williams, R.2
  • 14
    • 33746103944 scopus 로고    scopus 로고
    • Anonymity, unobservability, psuedonymitym. and identify management
    • A. Pfitamann and M. Hansen. Anonymity, unobservability, psuedonymitym. and identify management. A proposal for terminology, 2004.
    • (2004) A proposal for terminology
    • Pfitamann, A.1    Hansen, M.2
  • 15
    • 0031632776 scopus 로고    scopus 로고
    • Generalizing data to provide anonymity when disclosing information
    • P. Sammarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information. In PODS, 1998.
    • (1998) PODS
    • Sammarati, P.1    Sweeney, L.2
  • 16
    • 0011584005 scopus 로고    scopus 로고
    • Uniqueness of simple demographics in the u.s. population
    • Technical report, Carnegie Mellon University
    • L.Sweeney. Uniqueness of simple demographics in the u.s. population. Technical report, Carnegie Mellon University, 2000.
    • (2000)
    • Sweeney, L.1
  • 19
    • 19544380211 scopus 로고    scopus 로고
    • Bottom-up generalization: A data mining solution to privacy protection
    • K. Wang, P. S. Yu, and S. Chakraborty. Bottom-up generalization: A data mining solution to privacy protection. In ICDM, 2004.
    • (2004) ICDM
    • Wang, K.1    Yu, P.S.2    Chakraborty, S.3
  • 20
    • 84893853914 scopus 로고    scopus 로고
    • Anatomy: Simple and effective privacy preservation
    • X. Xiao and Y. Tao. Anatomy: simple and effective privacy preservation. In VLDB, 2006.
    • (2006) VLDB
    • Xiao, X.1    Tao, Y.2
  • 21
    • 34250680246 scopus 로고    scopus 로고
    • Peraonalized privacy preservation
    • X. Xiao and Y. Tao. Peraonalized privacy preservation. In SIGMOD, 2006.
    • (2006) SIGMOD
    • Xiao, X.1    Tao, Y.2
  • 22
    • 33745599656 scopus 로고    scopus 로고
    • Checking for kanonymity violation by views
    • C. Yao, X. S. Wang, and S. Jajodia. Checking for kanonymity violation by views. In VLDB, 2005.
    • (2005) VLDB
    • Yao, C.1    Wang, X.S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.