메뉴 건너뛰기




Volumn 5360 LNAI, Issue , 2008, Pages 461-469

L-diversity based dynamic update for large time-evolving microdata

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; RISK PERCEPTION;

EID: 58349121531     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-89378-3_47     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 1
    • 77049087087 scopus 로고    scopus 로고
    • Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing tables. In: Eiter, T., Libkin, L. (eds.) ICDT 2005, LNCS, 3363, pp. 246-258. Springer, Heidelberg (2005)
    • Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing tables. In: Eiter, T., Libkin, L. (eds.) ICDT 2005, LNCS, vol. 3363, pp. 246-258. Springer, Heidelberg (2005)
  • 2
    • 58349104271 scopus 로고    scopus 로고
    • Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Approximation algorithms for k-anonymity. Journal of Privacy Technology, paper number 20051120001
    • Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Approximation algorithms for k-anonymity. Journal of Privacy Technology, paper number 20051120001
  • 4
    • 38049126170 scopus 로고    scopus 로고
    • Efficient k-Anonymization using Clustering Techniques
    • Kotagiri, R, Radha Krishna, P, Mohania, M, Nantajeewarawat, E, eds, DASFAA 2007, Springer, Heidelberg
    • Byun, J., Kamra, A., Bertino, E., Li, N.: Efficient k-Anonymization using Clustering Techniques. In: Kotagiri, R., Radha Krishna, P., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol. 4443, pp. 188-200. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4443 , pp. 188-200
    • Byun, J.1    Kamra, A.2    Bertino, E.3    Li, N.4
  • 6
    • 29844444250 scopus 로고    scopus 로고
    • LeFevre, K., DeWitt, D., Ramakrishnan, R.: Incognito: Efficient Full-Domain kAnonymity. In: ACM SIGMOD International Conference on Management of Data (June 2005)
    • LeFevre, K., DeWitt, D., Ramakrishnan, R.: Incognito: Efficient Full-Domain kAnonymity. In: ACM SIGMOD International Conference on Management of Data (June 2005)
  • 7
    • 34548805858 scopus 로고    scopus 로고
    • t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
    • Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In: ICDE 2007, pp. 106-115 (2007)
    • (2007) ICDE 2007 , pp. 106-115
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 11
  • 12
    • 84868689050 scopus 로고    scopus 로고
    • Sun, X., Li, M., Wang, H., Plank, A.: An efficient hash-based algorithm for minimal k-anonymity problem. In: 31st Australasian Computer Science Conference (ACSC 2008), Wollongong, NSW, Australia, pp. 101-107. CRPIT 74 (2008)
    • Sun, X., Li, M., Wang, H., Plank, A.: An efficient hash-based algorithm for minimal k-anonymity problem. In: 31st Australasian Computer Science Conference (ACSC 2008), Wollongong, NSW, Australia, pp. 101-107. CRPIT 74 (2008)
  • 13
    • 43749088488 scopus 로고    scopus 로고
    • Sun, X., Wang, H., Li, J.: On the complexity of restricted k-anonymity problem. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, 4976, pp. 287-296. Springer, Heidelberg (2008)
    • Sun, X., Wang, H., Li, J.: On the complexity of restricted k-anonymity problem. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 287-296. Springer, Heidelberg (2008)
  • 14
    • 51849099051 scopus 로고    scopus 로고
    • +, a)-sensitive k-anonymity: a new enhanced privacy protection model. In: 8th IEEE International Conference on Computer and Information Technology (IEEE-CIT 2008), July 8-11, pp. 59-64 (2008)
    • +, a)-sensitive k-anonymity: a new enhanced privacy protection model. In: 8th IEEE International Conference on Computer and Information Technology (IEEE-CIT 2008), July 8-11, pp. 59-64 (2008)
  • 19
    • 33749571958 scopus 로고    scopus 로고
    • Wong, R., Li, J., Fu, A., Wang, K.: (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: KDD 2006, pp. 754-759 (2006)
    • Wong, R., Li, J., Fu, A., Wang, K.: (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: KDD 2006, pp. 754-759 (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.