메뉴 건너뛰기




Volumn , Issue , 2008, Pages 744-753

K-anonymization revisited

Author keywords

[No Author keywords available]

Indexed keywords

CANNING; TECHNOLOGY;

EID: 52649175334     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDE.2008.4497483     Document Type: Conference Paper
Times cited : (73)

References (22)
  • 4
    • 24144449674 scopus 로고    scopus 로고
    • Secure computation of the fcth-ranked element
    • G. Aggarwal, N. Mishra, and B. Pinkas. Secure computation of the fcth-ranked element, In Eurocrypt, 2004.
    • (2004) Eurocrypt
    • Aggarwal, G.1    Mishra, N.2    Pinkas, B.3
  • 5
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • R. Agrawal and R. Srikant. Privacy-preserving data mining. In SIGMOD, 2000.
    • (2000) SIGMOD
    • Agrawal, R.1    Srikant, R.2
  • 6
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimal k-anonymization
    • R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, 2005.
    • (2005) ICDE
    • Bayardo, R.1    Agrawal, R.2
  • 8
    • 0012793677 scopus 로고
    • Towards a methodology for statistical disclosure control
    • T. Dalenius. Towards a methodology for statistical disclosure control. Statistik Tidskrift, 15:429-444, 1977.
    • (1977) Statistik Tidskrift , vol.15 , pp. 429-444
    • Dalenius, T.1
  • 9
    • 1142263341 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy preserving data mining
    • A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In PODS, 2003.
    • (2003) PODS
    • Evfimievski, A.1    Gehrke, J.2    Srikant, R.3
  • 10
    • 52649119568 scopus 로고    scopus 로고
    • A. Gionis and T. Tassa, k-Anonymization with minimal loss of information. In ESA, 2007.
    • A. Gionis and T. Tassa, k-Anonymization with minimal loss of information. In ESA, 2007.
  • 11
    • 0242625276 scopus 로고    scopus 로고
    • V. Iyengar, Transforming data to satisfy privacy constraints. In KDD, 2002.
    • V. Iyengar, Transforming data to satisfy privacy constraints. In KDD, 2002.
  • 12
    • 34250673244 scopus 로고    scopus 로고
    • Injecting utility into anonymized datasets
    • D. Kifer and J. Gehrke. Injecting utility into anonymized datasets. In SIGMOD, 2006.
    • (2006) SIGMOD
    • Kifer, D.1    Gehrke, J.2
  • 14
  • 16
    • 3142691086 scopus 로고    scopus 로고
    • On the complexity of optimal k-anonymity
    • A. Meyerson and R. Williams. On the complexity of optimal k-anonymity, In PODS, 2004.
    • (2004) PODS
    • Meyerson, A.1    Williams, R.2
  • 18
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondent's privacy in microdata release
    • P. Samarati. Protecting respondent's privacy in microdata release. TKDE, 13:1010-1027, 2001.
    • (2001) TKDE , vol.13 , pp. 1010-1027
    • Samarati, P.1
  • 19
    • 0031632776 scopus 로고    scopus 로고
    • Generalizing data to provide anonymity when disclosing information
    • P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information. In PODS, 1998.
    • (1998) PODS
    • Samarati, P.1    Sweeney, L.2
  • 21
    • 84893853914 scopus 로고    scopus 로고
    • Anatomy: Simple and Effective Privacy Preservation
    • X. Xiao and Y. Tao. Anatomy: Simple and Effective Privacy Preservation. In VLDB, 2006.
    • (2006) VLDB
    • Xiao, X.1    Tao, Y.2
  • 22
    • 33749582207 scopus 로고    scopus 로고
    • J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. W.-C. Fu, Utility-based anonymization using local recoding. In KDD, 2006.
    • J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. W.-C. Fu, Utility-based anonymization using local recoding. In KDD, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.