메뉴 건너뛰기




Volumn , Issue , 2008, Pages 473-485

Preservation of proximity privacy in publishing numerical sensitive data

Author keywords

( , m) anonymity; Anonymization; Numeric; Privacy

Indexed keywords

ANALYTICAL STUDIES; ANONYMIZATION; GENERALIZATION ALGORITHMS; HIGH CONFIDENCES; NUMERIC; PRIVACY; PRIVACY THREATS; REAL DATUMS; SENSITIVE ATTRIBUTES; SENSITIVE DATUMS;

EID: 57149132810     PISSN: 07308078     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1376616.1376666     Document Type: Conference Paper
Times cited : (101)

References (44)
  • 9
    • 85001786260 scopus 로고    scopus 로고
    • Secure and selective dissemination of xml documents
    • E. Bertino and E. Ferrari. Secure and selective dissemination of xml documents. ACM Trans. Inf. Syst. Secur., 5(3):290-331, 2002.
    • (2002) ACM Trans. Inf. Syst. Secur , vol.5 , Issue.3 , pp. 290-331
    • Bertino, E.1    Ferrari, E.2
  • 16
  • 19
    • 85011028519 scopus 로고    scopus 로고
    • K-anonymization as spatial indexing: Toward scalable and incremental anonymization
    • T. Iwuchukwu and J. F. Naughton. K-anonymization as spatial indexing: Toward scalable and incremental anonymization. In Proc. of Very Large Data Bases (VLDB), pages 746-757, 2007.
    • (2007) Proc. of Very Large Data Bases (VLDB) , pp. 746-757
    • Iwuchukwu, T.1    Naughton, J.F.2
  • 21
    • 36048997303 scopus 로고    scopus 로고
    • A secure distributed framework for achieving k-anonymity
    • W. Jiang and C. Clifton. A secure distributed framework for achieving k-anonymity. The VLDB Journal, 15(4):316-333, 2006.
    • (2006) The VLDB Journal , vol.15 , Issue.4 , pp. 316-333
    • Jiang, W.1    Clifton, C.2
  • 26
    • 34548805858 scopus 로고    scopus 로고
    • N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and 1-diversity. In Proc. of International Conference on Data Engineering (ICDE), pages 106-115, 2007.
    • N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and 1-diversity. In Proc. of International Conference on Data Engineering (ICDE), pages 106-115, 2007.
  • 34
    • 4544352907 scopus 로고    scopus 로고
    • Some facets of complexity theory and cryptography: A five-lecture tutorial
    • J. Rothe. Some facets of complexity theory and cryptography: A five-lecture tutorial. ACM Computing Surveys, 34(4):504-549, 2002.
    • (2002) ACM Computing Surveys , vol.34 , Issue.4 , pp. 504-549
    • Rothe, J.1
  • 40
    • 33749571958 scopus 로고    scopus 로고
    • R. C.-W. Wong, J. Li, A. W.-C. Fu, and K. Wang, (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In Proc. of ACM Knowledge Discovery and Data Alining (SIGKDD), pages 754-759, 2006.
    • R. C.-W. Wong, J. Li, A. W.-C. Fu, and K. Wang, (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In Proc. of ACM Knowledge Discovery and Data Alining (SIGKDD), pages 754-759, 2006.
  • 41
    • 84893853914 scopus 로고    scopus 로고
    • Anatomy: Simple and effective privacy preservation
    • X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In Proc. of Very Large Data Bases (VLDB), pages 139-150, 2006.
    • (2006) Proc. of Very Large Data Bases (VLDB) , pp. 139-150
    • Xiao, X.1    Tao, Y.2
  • 42
    • 35448967088 scopus 로고    scopus 로고
    • m-invariance: Towards privacy preserving re-publication of dynamic datasets
    • X. Xiao and Y. Tao. m-invariance: towards privacy preserving re-publication of dynamic datasets. In Proc. of ACM Management of Data (SIGMOD), pages 689-700, 2007.
    • (2007) Proc. of ACM Management of Data (SIGMOD) , pp. 689-700
    • Xiao, X.1    Tao, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.