메뉴 건너뛰기




Volumn , Issue , 2009, Pages 27-31

Movement data anonymity through generalization

Author keywords

Clustering; K anonymity; Privacy; Spatio temporal

Indexed keywords

CLUSTERING ANALYSIS; DATA SETS; K-ANONYMITY; MOVING OBJECTS DATABASES; NEW APPLICATIONS; POSITION PAPERS; PRIVACY PRESERVING DATA MINING; REAL-WORLD; SPATIO-TEMPORAL; SPATIO-TEMPORAL DATA; TEMPORAL CHARACTERISTICS;

EID: 76749098908     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1667502.1667510     Document Type: Conference Paper
Times cited : (22)

References (15)
  • 1
    • 52649110568 scopus 로고    scopus 로고
    • Never walk alone: Uncertainty for anonymity in moving objects databases
    • O. Abul, F. Bonchi, and M. Nanni. Never walk alone: Uncertainty for anonymity in moving objects databases. In ICDE, pages 376-385, 2008.
    • (2008) ICDE , pp. 376-385
    • Abul, O.1    Bonchi, F.2    Nanni, M.3
  • 2
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • ACM
    • R. Agrawal and R. Srikant. Privacy-preserving data mining. In SIGMOD, pages 439-450. ACM, 2000.
    • (2000) SIGMOD , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 4
    • 0347172110 scopus 로고    scopus 로고
    • Optics: Ordering points to identify the clustering structure
    • M. Ankerst, M. M. Breunig, H.P. Kriegel, and J. Sander. Optics: Ordering points to identify the clustering structure. In SIGMOD, pages 49-60, 1999.
    • (1999) SIGMOD , pp. 49-60
    • Ankerst, M.1    Breunig, M.M.2    Kriegel, H.P.3    Sander, J.4
  • 5
    • 35048866963 scopus 로고    scopus 로고
    • A methodological assessment of location privacy risks in wireless hotspot networks
    • M. Gruteser and D. Grunwald. A methodological assessment of location privacy risks in wireless hotspot networks. In SPC, pages 10-24, 2003.
    • (2003) SPC , pp. 10-24
    • Gruteser, M.1    Grunwald, D.2
  • 6
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimal k-anonymization
    • R. J. Bayardo Jr. and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, 2005.
    • (2005) ICDE
    • Bayardo Jr., R.J.1    Agrawal, R.2
  • 7
    • 33749606641 scopus 로고    scopus 로고
    • Mondrian multidimensional k-anonymity
    • K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In ICDE, page 25, 2006.
    • (2006) ICDE , pp. 25
    • LeFevre, K.1    DeWitt, D.J.2    Ramakrishnan, R.3
  • 8
    • 34547720006 scopus 로고    scopus 로고
    • The new casper: Query processing for location services without compromising privacy
    • M. F. Mokbel, C. Chow, and W. G. Aref. The new casper: Query processing for location services without compromising privacy. In VLDB, pages 763-774, 2006.
    • (2006) VLDB , pp. 763-774
    • Mokbel, M.F.1    Chow, C.2    Aref, W.G.3
  • 9
    • 34548713400 scopus 로고    scopus 로고
    • The new casper: A privacy-aware location-based database server
    • M. F. Mokbel, C. Chow, and W. G. Aref. The new casper: A privacy-aware location-based database server. In ICDE, pages 1499-1500, 2007.
    • (2007) ICDE , pp. 1499-1500
    • Mokbel, M.F.1    Chow, C.2    Aref, W.G.3
  • 11
    • 84885396762 scopus 로고    scopus 로고
    • Pattern-preserving k-anonymization of sequences and its application to mobility data mining
    • R. G. Pensa, A. Monreale, F. Pinelli, and D. Pedreschi. Pattern-preserving k-anonymization of sequences and its application to mobility data mining. In PiLBA, 2008.
    • (2008) PiLBA
    • Pensa, R.G.1    Monreale, A.2    Pinelli, F.3    Pedreschi, D.4
  • 13
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • Technical report, SRI International, 1998
    • P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International, 1998.
    • Samarati, P.1    Sweeney, L.2
  • 14
    • 51349142350 scopus 로고    scopus 로고
    • Privacy preservation in the publication of trajectories
    • M. Terrovitis and N. Mamoulis. Privacy preservation in the publication of trajectories. In MDM, pages 65-72, 2008.
    • (2008) MDM , pp. 65-72
    • Terrovitis, M.1    Mamoulis, N.2
  • 15
    • 70349095406 scopus 로고    scopus 로고
    • Anonymizing moving objects: How to hide a mob in a crowd?
    • R. Yarovoy, F. Bonchi, L. V. S. Lakshmanan, and W. H. Wang. Anonymizing moving objects: how to hide a mob in a crowd? In EDBT, pages 72-83, 2009.
    • (2009) EDBT , pp. 72-83
    • Yarovoy, R.1    Bonchi, F.2    Lakshmanan, L.V.S.3    Wang, W.H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.