메뉴 건너뛰기




Volumn 179, Issue 17, 2009, Pages 2948-2963

k-Anonymous data collection

Author keywords

Data collection; k Anonymity; Privacy

Indexed keywords

COMMUNICATION CHANNEL; DATA COLLECTION; INDIVIDUAL PRIVACY; K-ANONYMITY; K-ANONYMIZATION; PRIVACY;

EID: 67549084348     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2009.05.004     Document Type: Article
Times cited : (33)

References (72)
  • 2
    • 35048875418 scopus 로고    scopus 로고
    • G. Aggarwal, N. Mishra, B. Pinkas, Secure computation of the kth-ranked element, in: EUROCRYPT, 2004, pp. 40-55.
    • G. Aggarwal, N. Mishra, B. Pinkas, Secure computation of the kth-ranked element, in: EUROCRYPT, 2004, pp. 40-55.
  • 3
    • 0034827009 scopus 로고    scopus 로고
    • On the design and quantification of privacy preserving data mining algorithms
    • D. Agrawal, C. Aggarwal, On the design and quantification of privacy preserving data mining algorithms, in: Proceedings of the 20th ACM PODS, 2001, pp. 247-255.
    • (2001) Proceedings of the 20th ACM PODS , pp. 247-255
    • Agrawal, D.1    Aggarwal, C.2
  • 6
    • 84945309966 scopus 로고    scopus 로고
    • Proofs of knowledge for non-monotone discrete-log formulae and applications
    • Emmanuel Bresson, Jacques Stern, Proofs of knowledge for non-monotone discrete-log formulae and applications, in: Proceedings of the ISC, 2002, pp. 272-288.
    • (2002) Proceedings of the ISC , pp. 272-288
    • Bresson, E.1    Stern, J.2
  • 8
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return address and digital pseudonyms
    • Chaum D. Untraceable electronic mail, return address and digital pseudonyms. Communications of the ACM 24 2 (1981) 84-88
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 9
    • 0023861309 scopus 로고
    • The dining cryptographers problem: unconditional sender and recipient untraceability
    • Chaum D. The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology 1 1 (1988) 65-75
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 12
    • 0000072558 scopus 로고
    • Finding a needle in a haystack or identifying anonymous census records
    • Dalenius T. Finding a needle in a haystack or identifying anonymous census records. Journal of Official Statistics 2 3 (1986) 329-336
    • (1986) Journal of Official Statistics , vol.2 , Issue.3 , pp. 329-336
    • Dalenius, T.1
  • 13
  • 14
    • 77952334884 scopus 로고    scopus 로고
    • Using randomized response techniques for privacy-preserving data mining
    • W. Du, Z. Zhan, Using randomized response techniques for privacy-preserving data mining, in: Proceedings of the Ninth ACM SIGKDD, 2003, pp. 505-510.
    • (2003) Proceedings of the Ninth ACM SIGKDD , pp. 505-510
    • Du, W.1    Zhan, Z.2
  • 15
    • 67549113055 scopus 로고    scopus 로고
    • C. Dwork, K. Nissim, Privacy-preserving datamining on vertically partitioned databases, in: CRYPTO 2003, 2004.
    • C. Dwork, K. Nissim, Privacy-preserving datamining on vertically partitioned databases, in: CRYPTO 2003, 2004.
  • 19
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • A. Fiat, A. Shamir, How to prove yourself: practical solutions to identification and signature problems, in: Advances in Cryptology - Crypto'86, 1986, pp. 186-194.
    • (1986) Advances in Cryptology - Crypto'86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 20
    • 12244293654 scopus 로고    scopus 로고
    • B. Gilburd, A. Schuster, R. Wolff, k-TTP: a new privacy model for large-scale distributed environments, in: Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, 2004, pp. 563-568.
    • B. Gilburd, A. Schuster, R. Wolff, k-TTP: a new privacy model for large-scale distributed environments, in: Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, 2004, pp. 563-568.
  • 27
    • 56949092341 scopus 로고    scopus 로고
    • A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks
    • Hsu C., and Chuang Y. A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks. Information Sciences 179 4 (2009) 422-429
    • (2009) Information Sciences , vol.179 , Issue.4 , pp. 422-429
    • Hsu, C.1    Chuang, Y.2
  • 32
    • 1142282764 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • M. Kantarcioglu, C. Clifton, Privacy-preserving distributed mining of association rules on horizontally partitioned data, in: DMKD'02, 2002, pp. 24-31.
    • (2002) DMKD'02 , pp. 24-31
    • Kantarcioglu, M.1    Clifton, C.2
  • 34
    • 67549097495 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • H. Kargupta, S. Datta, Q. Wang, K. Sivakumar, On the privacy preserving properties of random data perturbation techniques. in: The Third ICDM, 2003.
    • (2003) The Third ICDM
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 35
    • 35748979448 scopus 로고    scopus 로고
    • Privacy preserving data mining of sequential patterns for network traffic data
    • Kim S., Park S., Won J., and Kim S. Privacy preserving data mining of sequential patterns for network traffic data. Information Sciences 178 3 (2008) 694-713
    • (2008) Information Sciences , vol.178 , Issue.3 , pp. 694-713
    • Kim, S.1    Park, S.2    Won, J.3    Kim, S.4
  • 37
    • 0036312325 scopus 로고    scopus 로고
    • Hordes - a multicast based protocol for anonymity
    • Levine B.N., and Shields C. Hordes - a multicast based protocol for anonymity. Journal of Computer Security 10 3 (2002) 213-240
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 213-240
    • Levine, B.N.1    Shields, C.2
  • 38
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Lindell Y., and Pinkas B. Privacy preserving data mining. Journal of Cryptology 15 3 (2002) 177-206
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 39
    • 33749607006 scopus 로고    scopus 로고
    • A. Machanavajjhala, J. Gehrke, D. Kifer, M. Venkitasubramaniam, l-Diversity: privacy beyond k-anonymity, in: Proceedings of the 22nd ICDE, 2006.
    • A. Machanavajjhala, J. Gehrke, D. Kifer, M. Venkitasubramaniam, l-Diversity: privacy beyond k-anonymity, in: Proceedings of the 22nd ICDE, 2006.
  • 42
    • 67549083795 scopus 로고    scopus 로고
    • European Parliament, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal of the European Communities, 1995, p. 31.
    • European Parliament, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal of the European Communities, 1995, p. 31.
  • 43
    • 67549128178 scopus 로고    scopus 로고
    • European Parliament, Directive 97/66/EC of the European Parliament and of the Council of 15 December 1997 concering the processing of personal data and the protection of privacy in the telecommunications sector, Official Journal of the European Communities, 1998, pp. 1-8.
    • European Parliament, Directive 97/66/EC of the European Parliament and of the Council of 15 December 1997 concering the processing of personal data and the protection of privacy in the telecommunications sector, Official Journal of the European Communities, 1998, pp. 1-8.
  • 46
    • 0001574460 scopus 로고
    • Receipt-free Mix-type voting schemes - a practical solution to the implementation of a voting booth
    • K. Sako, J. Kilian, Receipt-free Mix-type voting schemes - a practical solution to the implementation of a voting booth, in: Proceedings of the EUROCRYPT 95, 1995, pp. 393-403.
    • (1995) Proceedings of the EUROCRYPT , vol.95 , pp. 393-403
    • Sako, K.1    Kilian, J.2
  • 47
    • 0031632776 scopus 로고    scopus 로고
    • Generalizing data to provide anonymity when disclosing information
    • abstract
    • P. Samarati, L. Sweeney, Generalizing data to provide anonymity when disclosing information (abstract), in: Proceedings of the 17th PODS, 1998, p. 188.
    • (1998) Proceedings of the 17th PODS , pp. 188
    • Samarati, P.1    Sweeney, L.2
  • 48
    • 67549131319 scopus 로고    scopus 로고
    • Secure computation over distributed databases
    • Su C., and Sakurai K. Secure computation over distributed databases. IPSJ Journal (2005)
    • (2005) IPSJ Journal
    • Su, C.1    Sakurai, K.2
  • 49
    • 34548646069 scopus 로고    scopus 로고
    • Two methods for privacy preserving data mining with malicious participants
    • Shah D., and Zhong S. Two methods for privacy preserving data mining with malicious participants. Information Sciences 177 23 (2007) 5468-5483
    • (2007) Information Sciences , vol.177 , Issue.23 , pp. 5468-5483
    • Shah, D.1    Zhong, S.2
  • 53
    • 84958979582 scopus 로고    scopus 로고
    • On the security of ElGamal-based encryption
    • Y. Tsiounis, M. Yung, On the security of ElGamal-based encryption, in: Public Key Cryptography'98, 1998, pp. 117-134.
    • (1998) Public Key Cryptography'98 , pp. 117-134
    • Tsiounis, Y.1    Yung, M.2
  • 54
    • 77952332120 scopus 로고    scopus 로고
    • Privacy-preserving k-means clustering over vertically partitioned data
    • J. Vaidya, C. Clifton, Privacy-preserving k-means clustering over vertically partitioned data, in: Proceedings of the Ninth ACM SIGKDD, 2003, pp. 206-215.
    • (2003) Proceedings of the Ninth ACM SIGKDD , pp. 206-215
    • Vaidya, J.1    Clifton, C.2
  • 56
    • 14844282596 scopus 로고    scopus 로고
    • L. von Ahn, A. Bortz, N.J. Hopper, k-anonymous message transmission, in: Proceedings of the ACM CCS, 2003, pp. 122-130.
    • L. von Ahn, A. Bortz, N.J. Hopper, k-anonymous message transmission, in: Proceedings of the ACM CCS, 2003, pp. 122-130.
  • 57
    • 84896508047 scopus 로고
    • Unconditional sender and recipient untraceability in spite of active attacks
    • M. Waidner, Unconditional sender and recipient untraceability in spite of active attacks, in: EUROCRYPT'89, 1989, pp. 302-319.
    • (1989) EUROCRYPT'89 , pp. 302-319
    • Waidner, M.1
  • 58
    • 19544380211 scopus 로고    scopus 로고
    • Bottom-up generalization: A data mining solution to privacy protection
    • K. Wang, P.S. Yu, S. Chakraborty, Bottom-up generalization: a data mining solution to privacy protection, in: The Fourth ICDM, 2004, pp. 249-256.
    • (2004) The Fourth ICDM , pp. 249-256
    • Wang, K.1    Yu, P.S.2    Chakraborty, S.3
  • 60
    • 33749571958 scopus 로고    scopus 로고
    • Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang, (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing, in: Proceedings of the ACM SIGKDD, 2006, pp. 754-759.
    • Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang, (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing, in: Proceedings of the ACM SIGKDD, 2006, pp. 754-759.
  • 61
    • 12244255356 scopus 로고    scopus 로고
    • Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
    • R.N. Wright, Z. Yang, Privacy-preserving Bayesian network structure computation on distributed heterogeneous data, in: Proceedings of the 10th ACM SIGKDD, 2004, pp. 713-718.
    • (2004) Proceedings of the 10th ACM SIGKDD , pp. 713-718
    • Wright, R.N.1    Yang, Z.2
  • 66
    • 2442705676 scopus 로고    scopus 로고
    • GeneScout: a data mining system for predicting vertebrate genes in genomic DNA sequences
    • Yin M.M., and Wang J.T.L. GeneScout: a data mining system for predicting vertebrate genes in genomic DNA sequences. Information Sciences 163 1-3 (2004) 201-218
    • (2004) Information Sciences , vol.163 , Issue.1-3 , pp. 201-218
    • Yin, M.M.1    Wang, J.T.L.2
  • 67
    • 33646140552 scopus 로고    scopus 로고
    • A false negative approach to mining frequent itemsets from high speed transactional data streams
    • Yu J.X., Chong Z., Lu H., Zhang Z., and Zhou A. A false negative approach to mining frequent itemsets from high speed transactional data streams. Information Sciences 176 16 (2006) 1986-2015
    • (2006) Information Sciences , vol.176 , Issue.16 , pp. 1986-2015
    • Yu, J.X.1    Chong, Z.2    Lu, H.3    Zhang, Z.4    Zhou, A.5
  • 68
    • 19744364896 scopus 로고    scopus 로고
    • Fuzzy reasoning model under quotient space structure
    • Zhang L., and Zhang B. Fuzzy reasoning model under quotient space structure. Information Sciences 176 4 (2005) 353-364
    • (2005) Information Sciences , vol.176 , Issue.4 , pp. 353-364
    • Zhang, L.1    Zhang, B.2
  • 70
    • 33750333499 scopus 로고    scopus 로고
    • Privacy-preserving algorithms for distributed mining of frequent itemsets
    • Zhong S. Privacy-preserving algorithms for distributed mining of frequent itemsets. Information Sciences 177 2 (2007) 490-503
    • (2007) Information Sciences , vol.177 , Issue.2 , pp. 490-503
    • Zhong, S.1
  • 71
    • 46749124396 scopus 로고    scopus 로고
    • Guided perturbation: towards private and accurate mining
    • Zhong S., and Yang Z. Guided perturbation: towards private and accurate mining. VLDB Journal 17 5 (2008) 1165-1177
    • (2008) VLDB Journal , vol.17 , Issue.5 , pp. 1165-1177
    • Zhong, S.1    Yang, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.