메뉴 건너뛰기




Volumn 2, Issue , 2009, Pages 949-960

Privacy preservation in social networks with sensitive edge weights

Author keywords

[No Author keywords available]

Indexed keywords

BUSINESS TRANSACTION; DE-IDENTIFICATION; EDGE WEIGHTS; FACEBOOK; GAUSSIANS; MATHEMATICAL ANALYSIS; NETWORK EDGES; PRIVACY PRESERVATION; PRIVACY PRESERVING; SECURITY AND PRIVACY; SHORTEST PATH; SOCIAL NETWORK ANALYSIS; SOCIAL NETWORKS;

EID: 72749117908     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (46)

References (20)
  • 1
    • 33845442788 scopus 로고    scopus 로고
    • A wavelet-based approach to preserve privacy for classification mining
    • S. Bapna and A. Gangopadhyay, A wavelet-based approach to preserve privacy for classification mining, Decision Sciences Journal, 37(4):623-642, 2006.
    • (2006) Decision Sciences Journal , vol.37 , Issue.4 , pp. 623-642
    • Bapna, S.1    Gangopadhyay, A.2
  • 3
    • 15744373612 scopus 로고    scopus 로고
    • Randomization in privacy preserving data mining
    • A. Evfimievski, Randomization in privacy preserving data mining, ACM SIGKDD Explorations Newsletter, 4(2):43-48, 2002.
    • (2002) ACM SIGKDD Explorations Newsletter , vol.4 , Issue.2 , pp. 43-48
    • Evfimievski, A.1
  • 5
    • 85082472975 scopus 로고
    • A semi-visible college: Structural effects on a social networks group
    • Henderson, M.M, and McNaughton, M.J, eds, Boulder, CO: Westview Press, pp
    • L. C. Freeman and S. C. Freeman, A semi-visible college: structural effects on a social networks group, Henderson, M.M., and McNaughton, M.J. (eds.) Electronic Communication: Technology and Impacts Boulder, CO: Westview Press, pp. 77-85, 1980.
    • (1980) Electronic Communication: Technology and Impacts , pp. 77-85
    • Freeman, L.C.1    Freeman, S.C.2
  • 7
    • 11544373391 scopus 로고
    • The Japanese corporate network transferred to North America: Implications for North American firms
    • A. Inkpen, The Japanese corporate network transferred to North America: implications for North American firms, The International Executive, 36(4): 411-433, 1994.
    • (1994) The International Executive , vol.36 , Issue.4 , pp. 411-433
    • Inkpen, A.1
  • 9
    • 36048948044 scopus 로고    scopus 로고
    • A privacy preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms
    • S. Mukherjee, Z. Chen, and A. Gangopadhyay, A privacy preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms, The VLDB Journal, 15(4):293-315, 2006.
    • (2006) The VLDB Journal , vol.15 , Issue.4 , pp. 293-315
    • Mukherjee, S.1    Chen, Z.2    Gangopadhyay, A.3
  • 10
    • 0033207750 scopus 로고    scopus 로고
    • A general additive data perturbation method for database security
    • K. Muralidhar, R. Parsa, and R. Sarathy, A general additive data perturbation method for database security, Management Science, 45(10): 1399-1415, 1999.
    • (1999) Management Science , vol.45 , Issue.10 , pp. 1399-1415
    • Muralidhar, K.1    Parsa, R.2    Sarathy, R.3
  • 11
    • 0037424991 scopus 로고    scopus 로고
    • Disease evolution on networks: The role of contact structure
    • J. M. Read and M. J. Keeling, Disease evolution on networks: the role of contact structure, Proc. R. Soc. Lond. B, 270: 699-708, 2003.
    • (2003) Proc. R. Soc. Lond. B , vol.270 , pp. 699-708
    • Read, J.M.1    Keeling, M.J.2
  • 14
    • 0344024833 scopus 로고    scopus 로고
    • Guaranteeing anonymity when sharing medical data, the DataFly system
    • L. Sweeney, Guaranteeing anonymity when sharing medical data, the DataFly system, Journal of the American Medical Informatics Association, Suppl. S, pp. 51-55, 1997.
    • (1997) Journal of the American Medical Informatics Association , Issue.SUPPL. S , pp. 51-55
    • Sweeney, L.1
  • 17
    • 33749339031 scopus 로고    scopus 로고
    • Singular value decomposition based data distortion strategy for privacy protection
    • S. Xu, J. Zhang, D. Han, and J. Wang, Singular value decomposition based data distortion strategy for privacy protection, Knowledge and Information Systems, 10(3):383-397, 2006.
    • (2006) Knowledge and Information Systems , vol.10 , Issue.3 , pp. 383-397
    • Xu, S.1    Zhang, J.2    Han, D.3    Wang, J.4
  • 18
    • 1542387065 scopus 로고    scopus 로고
    • The role of the internet in business-to-business network transformations: A novel case and theoretical analysis
    • L. W. Young and R. B. Johnston, The role of the internet in business-to-business network transformations: a novel case and theoretical analysis, Information Systems and E-Business Management, 1(1): 73-91, 2003.
    • (2003) Information Systems and E-Business Management , vol.1 , Issue.1 , pp. 73-91
    • Young, L.W.1    Johnston, R.B.2
  • 20
    • 52649120205 scopus 로고    scopus 로고
    • Proceedings of the 24th International Conference on Data Engineering ICDE'08, Cancun, Mexico, pp, April
    • B. Zhou and J. Pei, Preserving privacy in social networks against neighborhood attacks, in Proceedings of the 24th International Conference on Data Engineering (ICDE'08), Cancun, Mexico, pp. 506-515, April 2008.
    • (2008) Preserving privacy in social networks against neighborhood attacks , pp. 506-515
    • Zhou, B.1    Pei, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.