메뉴 건너뛰기




Volumn 22, Issue 3, 2010, Pages 437-446

Spectral anonymization of data

Author keywords

Computational disclosure control; Machine learning; Privacy

Indexed keywords

ANONYMIZATION; AUXILIARY INFORMATION; DATA ANONYMIZATION; DISCLOSURE CONTROL; EIGENVECTORS; ILLUSTRATIVE EXAMPLES; MACHINE-LEARNING; PRIVACY PROTECTION; REFERENCE STANDARD; VECTOR-SPACE;

EID: 76749086226     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2009.88     Document Type: Article
Times cited : (24)

References (37)
  • 1
    • 76749089617 scopus 로고    scopus 로고
    • PhD dissertation, Massachusetts Inst. of Technology
    • T.A. Lasko, "Spectral Anonymization of Data," PhD dissertation, Massachusetts Inst. of Technology, 2007.
    • (2007) Spectral Anonymization of Data
    • Lasko, T.A.1
  • 2
    • 34250017239 scopus 로고    scopus 로고
    • A face is exposed for AOL searcher No. 4417749
    • Aug.
    • M. Barbaro, T. Zeller, and S. Hansell, "A Face Is Exposed for AOL Searcher No. 4417749," New York Times, http://www.nytimes. com/2006/08/09/technology/09aol.html, Aug. 2006.
    • (2006) New York Times
    • Barbaro, M.1    Zeller, T.2    Hansell, S.3
  • 3
    • 0344971447 scopus 로고
    • The confidentiality and analytic usefulness of masked business microdata
    • N. Spruill, "The Confidentiality and Analytic Usefulness of Masked Business Microdata," Proc. Section on Survey Research Methods, pp. 602-607, 1983.
    • (1983) Proc. Section on Survey Research Methods , pp. 602-607
    • Spruill, N.1
  • 4
    • 84949472056 scopus 로고    scopus 로고
    • Microdata protection through noise addition
    • Springer
    • R. Brand, "Microdata Protection through Noise Addition," Inference Control in Statistical Databases, pp. 97-116, Springer, 2002.
    • (2002) Inference Control in Statistical Databases , pp. 97-116
    • Brand, R.1
  • 6
    • 35048813475 scopus 로고    scopus 로고
    • Data swapping: Variations on a theme by dalenius and reiss
    • Springer
    • S.E. Fienberg and J. McIntyre, "Data Swapping: Variations on a Theme by Dalenius and Reiss," Privacy in Statistical Databases, pp. 14-29, Springer, 2004.
    • (2004) Privacy in Statistical Databases , pp. 14-29
    • Fienberg, S.E.1    McIntyre, J.2
  • 7
    • 33645384015 scopus 로고    scopus 로고
    • Evaluating fuzzy clustering algorithms for microdata protection
    • Springer
    • V. Torra and S. Miyamoto, "Evaluating Fuzzy Clustering Algorithms for Microdata Protection," Privacy in Statistical Databases, pp. 175-186, Springer, 2004.
    • (2004) Privacy in Statistical Databases , pp. 175-186
    • Torra, V.1    Miyamoto, S.2
  • 8
    • 26944448516 scopus 로고    scopus 로고
    • Ordinal, continuous and heterogeneous k-anonymity through microaggregation
    • Sept.
    • J. Domingo-Ferrer and V. Torra, "Ordinal, Continuous and Heterogeneous k-Anonymity through Microaggregation," Data Mining and Knowledge Discovery, vol.11, no.2, pp. 195-212, Sept. 2005.
    • (2005) Data Mining and Knowledge Discovery , vol.11 , Issue.2 , pp. 195-212
    • Domingo-Ferrer, J.1    Torra, V.2
  • 9
    • 10144252689 scopus 로고
    • Confidentiality issues at the united states bureau of the census
    • L.H. Cox, S. McDonald, and D. Nelson, "Confidentiality Issues at the United States Bureau of the Census," J. Official Statistics, vol.2, no.2, pp. 135-160, 1986.
    • (1986) J. Official Statistics , vol.2 , Issue.2 , pp. 135-160
    • Cox, L.H.1    McDonald, S.2    Nelson, D.3
  • 11
    • 0000185822 scopus 로고
    • Statistical analysis of masked data
    • R.J.A. Little, "Statistical Analysis of Masked Data," J. Official Statistics, vol.9, no.2, pp. 407-426, 1993.
    • (1993) J. Official Statistics , vol.9 , Issue.2 , pp. 407-426
    • Little, R.J.A.1
  • 12
    • 0022130080 scopus 로고
    • A data distortion by probability distribution
    • C.K. Liew, U.J. Choi, and C.J. Liew, "A Data Distortion by Probability Distribution," ACM Trans. Database Systems, vol.10, no.3, pp. 395-411, 1985.
    • (1985) ACM Trans. Database Systems , vol.10 , Issue.3 , pp. 395-411
    • Liew, C.K.1    Choi, U.J.2    Liew, C.J.3
  • 13
    • 0012776989 scopus 로고
    • Discussion: Statistical disclosure limitation
    • D.B. Rubin, "Discussion: Statistical Disclosure Limitation," J. Official Statistics, vol.9, no.2, pp. 461-468, 1993.
    • (1993) J. Official Statistics , vol.9 , Issue.2 , pp. 461-468
    • Rubin, D.B.1
  • 15
    • 0348062788 scopus 로고    scopus 로고
    • Maximum entropy simulation for microdata protection
    • S. Polettini, "Maximum Entropy Simulation for Microdata Protection," Statistics and Computing, vol.13, no.4, pp. 307-320, 2003.
    • (2003) Statistics and Computing , vol.13 , Issue.4 , pp. 307-320
    • Polettini, S.1
  • 16
    • 0000983892 scopus 로고
    • Masking procedures for microdata disclosure limitation
    • W.A. Fuller, "Masking Procedures for Microdata Disclosure Limitation," J. Official Statistics, vol.9, no.2, pp. 383-406, 1993.
    • (1993) J. Official Statistics , vol.9 , Issue.2 , pp. 383-406
    • Fuller, W.A.1
  • 17
    • 0032656018 scopus 로고    scopus 로고
    • Correlations and copulas for decision and risk analysis
    • R.T. Clemen and T. Reilly, "Correlations and Copulas for Decision and Risk Analysis," Management Science, vol.45, no.2, pp. 208-224, 1999.
    • (1999) Management Science , vol.45 , Issue.2 , pp. 208-224
    • Clemen, R.T.1    Reilly, T.2
  • 18
    • 0002956175 scopus 로고
    • A method for limiting disclosure in microdata based on random noise and transformation
    • J. Kim, "A Method for Limiting Disclosure in Microdata Based on Random Noise and Transformation," Proc. Section on Survey Research Methods, pp. 370-374, 1986.
    • (1986) Proc. Section on Survey Research Methods , pp. 370-374
    • Kim, J.1
  • 22
    • 0007251183 scopus 로고    scopus 로고
    • Re-identification methods for evaluating the confidentiality of analytically valid microdata
    • W.E. Winkler, "Re-Identification Methods for Evaluating the Confidentiality of Analytically Valid Microdata," Research in Official Statistics, vol.1, pp. 87-104, 1998.
    • (1998) Research in Official Statistics , vol.1 , pp. 87-104
    • Winkler, W.E.1
  • 23
    • 4344559647 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • May
    • P. Samarati and L. Sweeney, "Protecting Privacy When Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression," Proc. IEEE Symp. Research in Security and Privacy, May 1998.
    • (1998) Proc. IEEE Symp. Research in Security and Privacy
    • Samarati, P.1    Sweeney, L.2
  • 24
    • 3042797039 scopus 로고    scopus 로고
    • Privacy: A machine learning view
    • Aug.
    • S.A. Vinterbo, "Privacy: A Machine Learning View," IEEE Trans. Knowledge and Data Eng., vol.16, no.8, pp. 939-948, Aug. 2004.
    • (2004) IEEE Trans. Knowledge and Data Eng. , vol.16 , Issue.8 , pp. 939-948
    • Vinterbo, S.A.1
  • 26
    • 84941871856 scopus 로고
    • The kolmogorov-smirnov test for goodness of fit
    • Mar.
    • F.J. Massey, Jr., "The Kolmogorov-Smirnov Test for Goodness of Fit," J. Am. Statistical Assoc., vol.46, no.253, pp. 68-78, Mar. 1951.
    • (1951) J. Am. Statistical Assoc. , vol.46 , Issue.253 , pp. 68-78
    • Massey Jr., F.J.1
  • 27
    • 0003602382 scopus 로고    scopus 로고
    • Tests on two independent samples
    • third ed., ch. 6.3, Wiley
    • W.J. Conover, "Tests on Two Independent Samples," Practical Nonparametric Statistics, third ed., ch. 6.3, pp. 456-465, Wiley, 1999.
    • (1999) Practical Nonparametric Statistics , pp. 456-465
    • Conover, W.J.1
  • 28
    • 0000432739 scopus 로고    scopus 로고
    • Disclosure limitation using perturbation and related methods for categorical data
    • S.E. Fienberg, E. Makov, and R. Steel, "Disclosure Limitation Using Perturbation and Related Methods for Categorical Data," J. Official Statistics, vol.14, no.4, pp. 485-502, 1998.
    • (1998) J. Official Statistics , vol.14 , Issue.4 , pp. 485-502
    • Fienberg, S.E.1    Makov, E.2    Steel, R.3
  • 31
    • 33646348083 scopus 로고    scopus 로고
    • A data-swapping technique using ranks-a method for disclosure control
    • M. Carlson and M. Salabasis, "A Data-Swapping Technique using Ranks-a Method for Disclosure Control," Research in Official Statistics, vol.6, no.2, pp. 35-64, 2002.
    • (2002) Research in Official Statistics , vol.6 , Issue.2 , pp. 35-64
    • Carlson, M.1    Salabasis, M.2
  • 32
    • 10944249990 scopus 로고    scopus 로고
    • Controlled data swapping techniques for masking public use data sets
    • Statistical Research Division, US Bureau of the Census
    • R. Moore, "Controlled Data Swapping Techniques for Masking Public Use Data Sets," Report RR96/04, Statistical Research Division, US Bureau of the Census, 1996.
    • (1996) Report RR96/04
    • Moore, R.1
  • 33
    • 33646367179 scopus 로고    scopus 로고
    • Data shuffling-a new masking approach for numerical data
    • May
    • K. Muralidhar and R. Sarathy, "Data Shuffling-a New Masking Approach for Numerical Data," Management Science, vol.52, no.5, pp. 658-670, May 2006.
    • (2006) Management Science , vol.52 , Issue.5 , pp. 658-670
    • Muralidhar, K.1    Sarathy, R.2
  • 34
    • 84868174781 scopus 로고    scopus 로고
    • National Health and Examination Survey (NHANES) National Center for Health Statistics (NCHS)
    • "National Health and Examination Survey (NHANES)," National Center for Health Statistics (NCHS), Centers for Disease Control and Prevention (CDC), http://www.cdc.gov/nchs/about/major/ nhanes/datalink.htm, 2009.
    • (2009)
  • 35
    • 0028393221 scopus 로고
    • A modified random perturbation method for database security
    • P. Tendick and N. Matloff, "A Modified Random Perturbation Method for Database Security," ACM Trans. Database Systems, vol.19, no.1, pp. 47-63, 1994.
    • (1994) ACM Trans. Database Systems , vol.19 , Issue.1 , pp. 47-63
    • Tendick, P.1    Matloff, N.2
  • 36
    • 26044460461 scopus 로고    scopus 로고
    • The use of receiver operating characteristic curves in biomedical informatics
    • Oct.
    • T.A. Lasko, J.G. Bhagwat, K.H. Zou, and L. Ohno-Machado, "The Use of Receiver Operating Characteristic Curves in Biomedical Informatics," J. Biomedical Informatics, vol.38, no.5, pp. 404-415, http://dx.doi.org/10.1016/j. jbi.2005.02.008, Oct. 2005.
    • (2005) J. Biomedical Informatics , vol.38 , Issue.5 , pp. 404-415
    • Lasko, T.A.1    Bhagwat, J.G.2    Zou, K.H.3    Ohno-Machado, L.4
  • 37
    • 23844515436 scopus 로고    scopus 로고
    • Random-data perturbation techniques and privacy-preserving data mining
    • May
    • H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "Random-Data Perturbation Techniques and Privacy-Preserving Data Mining," Knowledge and Information Systems, vol.7, no.4, pp. 387-414, May 2005.
    • (2005) Knowledge and Information Systems , vol.7 , Issue.4 , pp. 387-414
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.