메뉴 건너뛰기




Volumn , Issue , 2006, Pages 518-523

Optimal k-anonymity with flexible generalization schemes through bottom-up searching

Author keywords

[No Author keywords available]

Indexed keywords

POPULATION STATISTICS;

EID: 76749111107     PISSN: 15504786     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icdmw.2006.127     Document Type: Conference Paper
Times cited : (9)

References (9)
  • 1
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimal k-anonymization
    • R. J. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, pages 217-228, 2005.
    • (2005) ICDE , pp. 217-228
    • Bayardo, R.J.1    Agrawal, R.2
  • 2
    • 0242625276 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • V. S. Iyengar. Transforming data to satisfy privacy constraints. In SIGKDD, pages 279-288, 2002.
    • (2002) SIGKDD , pp. 279-288
    • Iyengar, V.S.1
  • 3
    • 29844444250 scopus 로고    scopus 로고
    • Incognito: Efficient full-domain k-anonymity
    • K. LeFevre, D. DeWitt, and R. Ramakrishnan. Incognito: Efficient full-domain k-anonymity. In SIGMOD, pages 49-60, 2005.
    • (2005) SIGMOD , pp. 49-60
    • LeFevre, K.1    DeWitt, D.2    Ramakrishnan, R.3
  • 4
    • 0000819568 scopus 로고
    • The number of partitions of a set
    • G.-C. Rota. The number of partitions of a set. In Amer. Math. Monthly, 71(5):498-504, 1964.
    • (1964) Amer. Math. Monthly , vol.71 , Issue.5 , pp. 498-504
    • Rota, G.-C.1
  • 5
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondent's privacy in microdata release
    • P. Samarati. Protecting respondent's privacy in microdata release. In IEEE TKDE, 13(6):1010-1027, 2001.
    • (2001) IEEE TKDE , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 6
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. SRI Technical Report SRICSL-98-04, 1998.
    • (1998) SRI Technical Report SRICSL-98-04
    • Samarati, P.1    Sweeney, L.2
  • 7
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. In Int. J. on Uncertain. Fuzz, 10(6):571-588, 2002.
    • (2002) Int. J. on Uncertain. Fuzz , vol.10 , Issue.6 , pp. 571-588
    • Sweeney, L.1
  • 8
    • 0036811662 scopus 로고    scopus 로고
    • K-anonymity: A model for protecting privacy
    • L. Sweeney. K-anonymity: A model for protecting privacy. In Int. J. on Uncertain. Fuzz, 10(5):557-570, 2002.
    • (2002) Int. J. on Uncertain. Fuzz , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1
  • 9
    • 0013069354 scopus 로고    scopus 로고
    • Inclusive pruning: A new class of pruning rule for unordered search and its application to classification learning
    • G. I. Webb. Inclusive pruning: a new class of pruning rule for unordered search and its application to classification learning. In Proc. Australasian Computer Science Conference, pages 1-10, 1996.
    • (1996) Proc. Australasian Computer Science Conference , pp. 1-10
    • Webb, G.I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.