메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1469-1472

A framework for safely publishing communication traces

Author keywords

Privacy; Utility

Indexed keywords

ANONYMIZATION; FORMAL REASONING; PRIVACY AND SECURITY;

EID: 74549203914     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1645953.1646147     Document Type: Conference Paper
Times cited : (6)

References (16)
  • 1
    • 74549205119 scopus 로고    scopus 로고
    • Predict
    • Predict. https://www.predict.org/.
  • 2
    • 74549203149 scopus 로고    scopus 로고
    • Tcpdpriv. http://ita.eee.lbl.gov/html/contrib/tcpdpriv.html.
    • Tcpdpriv1
  • 3
    • 74549166891 scopus 로고    scopus 로고
    • Tcpurify. http://irg.cs.ohiou.edu/ eblanton/tcpurify.
    • Tcpurify1
  • 5
    • 4444266989 scopus 로고    scopus 로고
    • Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
    • J. Fan, J. Xu, M. H. Ammar, and S. B. Moon. Prefix-preserving ip address anonymization: measurement-based security evaluation and a new cryptography-based scheme. Comput. Netw., 46(2):253-272, 2004.
    • (2004) Comput. Netw , vol.46 , Issue.2 , pp. 253-272
    • Fan, J.1    Xu, J.2    Ammar, M.H.3    Moon, S.B.4
  • 8
    • 66249097600 scopus 로고    scopus 로고
    • Privacy-safe network trace sharing via secure queries
    • ACM
    • J. Mirkovic. Privacy-safe network trace sharing via secure queries. In NDA '08, pages 3-10. ACM, 2008.
    • (2008) NDA '08 , pp. 3-10
    • Mirkovic, J.1
  • 9
    • 34248362859 scopus 로고    scopus 로고
    • Sc2d: An alternative to trace anonymization
    • J. C. Mogul and M. Arlitt. Sc2d: an alternative to trace anonymization. In MineNet '06, pages 323-328, 2006.
    • (2006) MineNet '06 , pp. 323-328
    • Mogul, J.C.1    Arlitt, M.2
  • 12
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • P. Samarati. Protecting respondents' identities in microdata release. IEEE Trans. on Knowl. and Data Eng., 13(6):1010-1027, 2001.
    • (2001) IEEE Trans. on Knowl. and Data Eng , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 13
    • 33847027721 scopus 로고    scopus 로고
    • Sharing computer network logs for security and privacy: A motivation for new methodologies of anonymization
    • A. Slagell and W. Yurcik. Sharing computer network logs for security and privacy: A motivation for new methodologies of anonymization. In SECOVAL, pages 80-89, 2005.
    • (2005) SECOVAL , pp. 80-89
    • Slagell, A.1    Yurcik, W.2
  • 14
    • 0036811662 scopus 로고    scopus 로고
    • k-anonymity: A model for protecting privacy
    • L. Sweeney. k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness and KB Syst., 10(5):557-570, 2002.
    • (2002) Int. J. Uncertain. Fuzziness and KB Syst , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1
  • 15
    • 84859177489 scopus 로고    scopus 로고
    • Privacy-preserving anonymization of set-valued data
    • M. Terrovitis, N. Mamoulis, and P. Kalnis. Privacy-preserving anonymization of set-valued data. VLDB, 1(1):115-125, 2008.
    • (2008) VLDB , vol.1 , Issue.1 , pp. 115-125
    • Terrovitis, M.1    Mamoulis, N.2    Kalnis, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.