-
2
-
-
38049126170
-
Efficient k-anonymization using clustering techniques
-
and, In, of Lecture Notes in Computer Science, pages, Springer
-
J.-W. Byun, A. Kamra, E. Bertino, and N. Li. Efficient k-anonymization using clustering techniques. In Proceedings of the 12th International Conference on Database Systems for Advanced Applications (DASFAA), volume 4443 of Lecture Notes in Computer Science, pages 188-200. Springer, 2007.
-
(2007)
Proceedings of the 12th International Conference on Database Systems for Advanced Applications (DASFAA)
, vol.4443
, pp. 188-200
-
-
Byun, J.-W.1
Kamra, A.2
Bertino, E.3
Li, N.4
-
3
-
-
77952412889
-
-
Cambridge English Dictionary
-
Cambridge English Dictionary. http://dictionary.cambridge.org/define.asp? key=68410&dict=CALD.
-
-
-
-
4
-
-
84859246670
-
R-MAT: A recursive model for graph mining
-
and, In M. W. Berry, U. Dayal, C. Kamath, and D. B. Skillicorn, editors
-
D. Chakrabarti, Y. Zhan, and C. Faloutsos. R-MAT: A recursive model for graph mining. In M. W. Berry, U. Dayal, C. Kamath, and D. B. Skillicorn, editors, SDM. SIAM, 2004.
-
(2004)
SDM. SIAM
-
-
Chakrabarti, D.1
Zhan, Y.2
Faloutsos, C.3
-
6
-
-
70849135088
-
Resisting structural identification in anonymized social networks
-
and, In
-
M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis. Resisting structural identification in anonymized social networks. In Conference on Very Large Databases (VLDB), 2008.
-
(2008)
Conference on Very Large Databases (VLDB)
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Towsley, D.4
Weis, P.5
-
7
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and l-diversity
-
and, In, pages
-
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In Proceedings of the 23rd International Conference on Data Engineering (ICDE), pages 106-115, 2007.
-
(2007)
Proceedings of the 23rd International Conference on Data Engineering (ICDE)
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
8
-
-
57149126815
-
Towards identity anonymization on graphs
-
J. T.-L. Wang, editor, pages, ACM
-
K. Liu and E. Terzi. Towards identity anonymization on graphs. In J. T.-L. Wang, editor, SIGMOD Conference, pages 93-106. ACM, 2008.
-
(2008)
SIGMOD Conference
, pp. 93-106
-
-
Liu, K.1
Terzi, E.2
-
10
-
-
0002687371
-
The small world problem
-
May
-
S. Milgram. The small world problem. Psychology Today, 1 (1):60-67, May 1967.
-
(1967)
Psychology Today
, vol.1
, Issue.1
, pp. 60-67
-
-
Milgram, S.1
-
12
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
pages, IEEE Computer Society
-
A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In IEEE Symposium on Security and Privacy, pages 111-125. IEEE Computer Society, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
13
-
-
34548689125
-
Thoughts on k-anonymization
-
M. E. Nergiz and C. Clifton. Thoughts on k-anonymization. Data Knowl. Eng., 63 (3):622-645, 2007.
-
(2007)
Data Knowl. Eng.
, vol.63
, Issue.3
, pp. 622-645
-
-
Nergiz, M.E.1
Clifton, C.2
-
14
-
-
34548804367
-
Multirelational k-anonymity
-
and, In, pages
-
M. E. Nergiz, C. Clifton, and A. E. Nergiz. Multirelational k-anonymity. In Proceedings of the 23rd International Conference on Data Engineering (ICDE), pages 1417-1421, 2007.
-
(2007)
Proceedings of the 23rd International Conference on Data Engineering (ICDE)
, pp. 1417-1421
-
-
Nergiz, M.E.1
Clifton, C.2
Nergiz, A.E.3
-
15
-
-
77952380530
-
-
Netflix Prize
-
Netflix Prize. http://www.netflixprize.com.
-
-
-
-
16
-
-
0031632776
-
Generalizing data to provide anonymity when disclosing information (abstract)
-
ACM Press
-
P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information (abstract). In PODS, page 188. ACM Press, 1998.
-
(1998)
PODS
, pp. 188
-
-
Samarati, P.1
Sweeney, L.2
-
18
-
-
0036811662
-
K-anonymity, a model for protecting privacy
-
L. Sweeney. k-Anonymity, a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5):557-570, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
19
-
-
33749571958
-
(α, K)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing
-
and, In T. Eliassi-Rad, L. H. Ungar, M. Craven, and D. Gunopulos, editors, pages, ACM
-
R. C.-W. Wong, J. Li, A. W.-C. Fu, and K. Wang. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In T. Eliassi-Rad, L. H. Ungar, M. Craven, and D. Gunopulos, editors, KDD, pages 754-759. ACM, 2006.
-
(2006)
KDD
, pp. 754-759
-
-
Wong, R.C.-W.1
Li, J.2
Fu, A.W.-C.3
Wang, K.4
-
20
-
-
34250119996
-
Graph isomorphism problem
-
and, May
-
V. N. Zemlyachenko, N. M. Korneenko, and R. I. Tyshkevich. Graph isomorphism problem. Journal of Mathematical Sciences, 29 (4):1426U1481, May 1985.
-
(1985)
Journal of Mathematical Sciences
, vol.29
, Issue.4
, pp. 1426-1481
-
-
Zemlyachenko, V.N.1
Korneenko, N.M.2
Tyshkevich, R.I.3
|