메뉴 건너뛰기




Volumn 5645 LNCS, Issue , 2009, Pages 191-207

Distributed anonymization: Achieving privacy for both data subjects and data providers

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMIZATION; DATA ANONYMIZATION; DATA CONFIDENTIALITY; DATA REPOSITORIES; DATA SHARING; DATA SUBJECTS; DECENTRALIZED PROTOCOLS; PERSONAL INFORMATION; PRIVACY CONSTRAINTS; PRIVATE DATABASE; QUERY RESULTS; PARTITIONED DATABASE;

EID: 70350355055     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03007-9_13     Document Type: Conference Paper
Times cited : (50)

References (21)
  • 1
    • 70350624866 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey on recent developments
    • in press
    • Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey on recent developments. ACM Computing Surveys (in press)
    • ACM Computing Surveys
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 3
    • 73349125549 scopus 로고    scopus 로고
    • Böttcher, S., Obermeier, S.: Secure set union and bag union computation for guaranteeing anonymity of distrustful participants. JSW 3(1), 9-17 (2008)
    • Böttcher, S., Obermeier, S.: Secure set union and bag union computation for guaranteeing anonymity of distrustful participants. JSW 3(1), 9-17 (2008)
  • 5
    • 36048997303 scopus 로고    scopus 로고
    • A secure distributed framework for achieving k-anonymity
    • Jiang, W., Clifton, C.: A secure distributed framework for achieving k-anonymity. VLDB Journal 15(4), 316-333 (2006)
    • (2006) VLDB Journal , vol.15 , Issue.4 , pp. 316-333
    • Jiang, W.1    Clifton, C.2
  • 7
    • 70350390432 scopus 로고    scopus 로고
    • Goldreich, O, Secure multi-party computation, Working Draft, Version 1.3 2001
    • Goldreich, O.: Secure multi-party computation, Working Draft, Version 1.3 (2001)
  • 9
    • 70350390430 scopus 로고    scopus 로고
    • Secure multiparty computation for privacypreserving data mining. Cryptology ePrint Archive
    • Report 2008/197
    • Lindell, Y., Pinkas, B.: Secure multiparty computation for privacypreserving data mining. Cryptology ePrint Archive, Report 2008/197 (2008), http://eprint.iacr.org/
    • (2008)
    • Lindell, Y.1    Pinkas, B.2
  • 10
    • 10944270172 scopus 로고    scopus 로고
    • Privacy-preserving data mining: Why, how, and when
    • Vaidya, J., Clifton, C.: Privacy-preserving data mining: Why, how, and when. IEEE Security & Privacy 2(6), 19-27 (2004)
    • (2004) IEEE Security & Privacy , vol.2 , Issue.6 , pp. 19-27
    • Vaidya, J.1    Clifton, C.2
  • 11
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • ACM, New York
    • Du, W., Atallah, M.J.: Secure multi-party computation problems and their applications: a review and open problems. In: NSPW 2001: Proceedings of the 2001 workshop on New security paradigms, pp. 13-22. ACM, New York (2001)
    • (2001) NSPW 2001: Proceedings of the 2001 workshop on New security paradigms , pp. 13-22
    • Du, W.1    Atallah, M.J.2
  • 12
    • 0003855464 scopus 로고    scopus 로고
    • 2nd edn. John Wiley & Sons, Chichester
    • Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)
    • (1996) Applied Cryptography
    • Schneier, B.1
  • 13
    • 35048875418 scopus 로고    scopus 로고
    • Secure computation of the kth-ranked element
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Aggarwal, G., Mishra, N., Pinkas, B.: Secure computation of the kth-ranked element. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 40-55. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 40-55
    • Aggarwal, G.1    Mishra, N.2    Pinkas, B.3
  • 14
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • Samarati, P.: Protecting respondents' identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010-1027 (2001)
    • (2001) IEEE Trans. Knowl. Data Eng , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 18
    • 70350407331 scopus 로고    scopus 로고
    • Jurczyk, P., Xiong, L.: Distributed anonymization: Achieving privacy for both data subjects and data providers. Technical Report TR-2009-013, Emory University Department of Mathematics and Computer Science (2009)
    • Jurczyk, P., Xiong, L.: Distributed anonymization: Achieving privacy for both data subjects and data providers. Technical Report TR-2009-013, Emory University Department of Mathematics and Computer Science (2009)
  • 19
    • 47749097171 scopus 로고    scopus 로고
    • Dobjects: Enabling distributed data services for metacomputing platforms
    • Bubak, M, van Albada, G.D, Dongarra, J, Sloot, P.M.A, eds, ICCS 2008, Part I, Springer, Heidelberg
    • Jurczyk, P., Xiong, L.: Dobjects: Enabling distributed data services for metacomputing platforms. In: Bubak, M., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2008, Part I. LNCS, vol. 5101, pp. 136-145. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5101 , pp. 136-145
    • Jurczyk, P.1    Xiong, L.2
  • 21
    • 84856530175 scopus 로고    scopus 로고
    • Privacy preserving serial data publishing by role composition
    • Bu, Y., Fu, A.W.C., Wong, R.C.W., Chen, L., Li, J.: Privacy preserving serial data publishing by role composition. Proc. VLDB Endow. 1(1), 845-856 (2008)
    • (2008) Proc. VLDB Endow , vol.1 , Issue.1 , pp. 845-856
    • Bu, Y.1    Fu, A.W.C.2    Wong, R.C.W.3    Chen, L.4    Li, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.