메뉴 건너뛰기




Volumn 10, Issue 1, 2010, Pages

Privacy-preserving similarity-based text retrieval

Author keywords

Privacy of search queries; Security in text retrieval; Singular value decomposition

Indexed keywords

CONFIDENTIAL INFORMATION; ON-LINE DOCUMENTS; ON-LINE SERVICE; PRIVACY PRESERVING; SEARCH QUERIES; SEARCH RESULTS; SECURITY IN TEXT RETRIEVAL; TEXT CORPORA; TEXT RETRIEVAL;

EID: 76849085704     PISSN: 15335399     EISSN: 15576051     Source Type: Journal    
DOI: 10.1145/1667067.1667071     Document Type: Article
Times cited : (56)

References (76)
  • 8
    • 34250013678 scopus 로고    scopus 로고
    • A face is exposed for AOL searcher No. 4417749
    • BARBARO, M. AND ZELLER, T. 2006. A face is exposed for AOL searcher No. 4417749. The New York Times. http://www.nytimes.com/2006/08/09/technology/09aol. html.
    • (2006) The New York Times
    • Barbaro, M.1    Zeller, T.2
  • 12
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • BLOOM, B. 1970. Space/time trade-offs in hash coding with allowable errors. Comm. ACM 13, 7, 422-426.
    • (1970) Comm. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 13
    • 0041619493 scopus 로고
    • A systematic appproach to compressing a full text retrieval system
    • BOOKSTEIN, A., KLEIN, S. T., AND ZIFF, D. 1992. A systematic appproach to compressing a full text retrieval system. Inform. Process. Manage. 28, 6, 795-806.
    • (1992) Inform. Process. Manage. , vol.28 , Issue.6 , pp. 795-806
    • Bookstein, A.1    Klein, S.T.2    Ziff, D.3
  • 14
    • 0038589165 scopus 로고    scopus 로고
    • The anatomy of a large-scale hypertextual web search engine
    • BRIN, S. AND PAGE, L. 1998. The anatomy of a large-scale hypertextual web search engine. Comput. Netw. ISDN Syst. 30, 1-7, 107-117.
    • (1998) Comput. Netw. ISDN Syst. , vol.30 , Issue.1-7 , pp. 107-117
    • Brin, S.1    Page, L.2
  • 15
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • CHAUM, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commu. ACM 24, 2, 84-90.
    • (1981) Commu. ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.1
  • 21
    • 52049126397 scopus 로고    scopus 로고
    • Privacy homomorphisms for social networks with private relationships
    • DOMINGO-FERRER, J., VIEJO, A., SEB́E, F., AND GONŹALEZ- NICOĹAS, U. 2008. Privacy homomorphisms for social networks with private relationships. Comput. Netw. 52, 3007-3016.
    • (2008) Comput. Netw. , vol.52 , pp. 3007-3016
    • Domingo-Ferrer, J.1    Viejo, A.2    Seb́e, F.3    Gonźalez-Nicoĺas, U.4
  • 22
    • 33751075906 scopus 로고    scopus 로고
    • Fast Monte Carlo algorithms for matrices II: Computing a low-rank approximation to a matrix
    • DOI 10.1137/S0097539704442696
    • DRINEAS, P., KANNAN, R., AND MAHONEY, M. W. 2006. Fast Monte Carlo algorithms for matrices II: Computing a low-rank approximation to a matrix. SIAM J. Comput. 36, 1, 158-183. (Pubitemid 46374022)
    • (2006) SIAM Journal on Computing , vol.36 , Issue.1 , pp. 158-183
    • Drineas, P.1    Kannan, R.2    Mahoney, M.W.3
  • 23
    • 0002698154 scopus 로고
    • Latent semantic indexing (LSI) and TREC-2
    • D. Harman, Ed. National Institute of Standards and Technology Special Publication
    • DUMAIS, S. T. 1994. Latent Semantic Indexing (LSI) and TREC-2. In Proceedings of the 2nd Text REtrieval Conference (TREC2). D. Harman, Ed. National Institute of Standards and Technology Special Publication, 105-116.
    • (1994) Proceedings of the 2nd Text REtrieval Conference (TREC2) , pp. 105-116
    • Dumais, S.T.1
  • 24
    • 0010295388 scopus 로고
    • Latent semantic indexing (LSI): TREC-3 report
    • D. Harman, ed National Institute of Standards and Technology Special Publication
    • DUMAIS, S. T. 1995. Latent semantic indexing (LSI): TREC-3 report, D. Harman, ed. In Proceedings of the 3rd Text REtrieval Conference (TREC3). National Institute of Standards and Technology Special Publication, 219-230.
    • (1995) Proceedings of the 3rd Text REtrieval Conference (TREC3) , pp. 219-230
    • Dumais, S.T.1
  • 26
    • 0000534667 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • ELGAMAL, T. 1984. A public-key cryptosystem and a signature scheme based on discrete logarithms. In Proceedings of the Crypto. 10-18.
    • (1984) Proceedings of the Crypto , pp. 10-18
    • Elgamal, T.1
  • 27
    • 70449378087 scopus 로고    scopus 로고
    • Efficient computation of the Riemannian SVD in TLS problems in information retrieval
    • S. van Huffel and P. Lemmerling, Eds. Kluwer Academic Publishers
    • FIERRO, R. AND BERRY, M. 2002. Efficient computation of the Riemannian SVD in TLS problems in information retrieval. In Total Least Squares and Errors-In-Variables Modeling: Analysis, Algorithms, and Applications, S. van Huffel and P. Lemmerling, Eds. Kluwer Academic Publishers, 349-360.
    • (2002) Total Least Squares and Errors-In-Variables Modeling: Analysis, Algorithms, and Applications , pp. 349-360
    • Fierro, R.1    Berry, M.2
  • 29
    • 77957175435 scopus 로고
    • Probabilistic models in information retrieval
    • FUHR, N. 1992. Probabilistic models in information retrieval. Comput. J. 35, 3, 243-255.
    • (1992) Comput. J. , vol.35 , Issue.3 , pp. 243-255
    • Fuhr, N.1
  • 32
    • 0036563104 scopus 로고    scopus 로고
    • Confidentiality via camouflage: The CVC approach to disclosure limitation when answering queries to databases
    • GOPAL, R., GARFINKEL, R., AND GOES, P. 2002. Confidentiality via camouflage: The CVC approach to disclosure limitation when answering queries to databases. Oper. Reser. 50, 3, 501-516.
    • (2002) Oper. Reser. , vol.50 , Issue.3 , pp. 501-516
    • Gopal, R.1    Garfinkel, R.2    Goes, P.3
  • 36
    • 67650867547 scopus 로고    scopus 로고
    • Marketers trace paths users leave on internet
    • HANSELL, S. 2006. Marketers trace paths users leave on internet. The New York Times. http://www.nytimes.com/2006/08/15/technology/15search.html.
    • (2006) The New York Times
    • Hansell, S.1
  • 38
    • 0000701994 scopus 로고    scopus 로고
    • Distance browsing in spatial databases
    • HJALTASON, G. R. AND SAMET, H. 1999. Distance browsing in spatial databases. ACM Trans. on Datab. Syst. 24, 2, 265-318.
    • (1999) ACM Trans. on Datab. Syst. , vol.24 , Issue.2 , pp. 265-318
    • Hjaltason, G.R.1    Samet, H.2
  • 43
    • 33749672242 scopus 로고    scopus 로고
    • A data disclosure policy for count data based on the COM-Poisson distribution
    • KADANE, J. B., KRISHNAN, R., AND SHMUELI, G. 2006. A data disclosure policy for count data based on the COM-Poisson distribution. Manag. Sci. 52, 10, 1610-1617.
    • (2006) Manag. Sci. , vol.52 , Issue.10 , pp. 1610-1617
    • Kadane, J.B.1    Krishnan, R.2    Shmueli, G.3
  • 44
    • 35648982949 scopus 로고    scopus 로고
    • Preventing location-based identity inference in anonymous spatial queries
    • KALNIS, P.,GHINITA, G.,MOURATIDIS, K., AND PAPADIAS, D. 2007. Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Engin. 19, 12, 1719-1733.
    • (2007) IEEE Trans. Knowl. Data Engin. , vol.19 , Issue.12 , pp. 1719-1733
    • Kalnis, P.1    Ghinita, G.2    Mouratidis, K.3    Papadias, D.4
  • 45
    • 0002956175 scopus 로고
    • A method for limiting disclosure in microdata based on random noise and transformation
    • American Statistical Association
    • KIM, J. 1986. A method for limiting disclosure in microdata based on random noise and transformation. In Section on Survey Research Methods, American Statistical Association, 303-308.
    • (1986) Section on Survey Research Methods , pp. 303-308
    • Kim, J.1
  • 47
    • 4243148480 scopus 로고    scopus 로고
    • Authoritative sources in a hyperlinked environment
    • KLEINBERG, J. M. 1999. Authoritative sources in a hyperlinked environment. J. ACM 46, 5, 604-632.
    • (1999) J. ACM , vol.46 , Issue.5 , pp. 604-632
    • Kleinberg, J.M.1
  • 48
    • 0032183760 scopus 로고    scopus 로고
    • A semidiscrete matrix decomposition for latent semantic indexing information retrieval
    • KOLDA, T. G. AND O'LEARY, D. P. 1998. A semidiscrete matrix decomposition for latent semantic indexing information retrieval. ACM Trans. Inform. Syst. 16, 4, 322-346.
    • (1998) ACM Trans. Inform. Syst. , vol.16 , Issue.4 , pp. 322-346
    • Kolda, T.G.1    O'Leary, D.P.2
  • 49
    • 1942420748 scopus 로고    scopus 로고
    • Oblivious keyword search
    • KUROSAWA, K. AND OGATA, W. 2004. Oblivious keyword search. J. Complex. 20, 2-3, 356-371.
    • (2004) J. Complex. , vol.20 , Issue.2-3 , pp. 356-371
    • Kurosawa, K.1    Ogata, W.2
  • 50
    • 84876811202 scopus 로고    scopus 로고
    • RCV1: A new benchmark collection for text categorization research
    • LEWIS, D. D., YANG, Y., ROSE, T. G., AND LI, F. 2004. RCV1: A new benchmark collection for text categorization research. J. Mach. Learn. Resea. 5, 361-397.
    • (2004) J. Mach. Learn. Resea , vol.5 , pp. 361-397
    • Lewis, D.D.1    Yang, Y.2    Rose, T.G.3    Li, F.4
  • 53
    • 33847045247 scopus 로고    scopus 로고
    • Minimizing information loss and preserving privacy
    • MENON, S. AND SARKAR, S. 2007. Minimizing information loss and preserving privacy. Manag. Sci. 53, 1, 101-116.
    • (2007) Manag. Sci. , vol.53 , Issue.1 , pp. 101-116
    • Menon, S.1    Sarkar, S.2
  • 55
    • 36749033301 scopus 로고    scopus 로고
    • Private searching on streaming data
    • OSTROVSKY, R. AND SKEITH, W. E. 2007. Private searching on streaming data. J. Cryptol. 20, 4, 397-430.
    • (2007) J. Cryptol. , vol.20 , Issue.4 , pp. 397-430
    • Ostrovsky, R.1    Skeith, W.E.2
  • 57
    • 3042643368 scopus 로고    scopus 로고
    • Steganographic schemes for file system and B-tree
    • PANG, H., TAN, K.-L., AND ZHOU, X. 2004. Steganographic schemes for file system and B-tree. IEEE Trans. Knowl. Data Engin. 16, 6, 701-713.
    • (2004) IEEE Trans. Knowl. Data Engin. , vol.16 , Issue.6 , pp. 701-713
    • Pang, H.1    Tan, K.-L.2    Zhou, X.3
  • 60
    • 70350000160 scopus 로고    scopus 로고
    • Latent semantic indexing: An overview
    • Spring Paper, University of California, Berkeley.
    • ROSARIO, B. 2000. Latent semantic indexing: An overview. Techn. rep. INFOSYS 240 Spring Paper, University of California, Berkeley. http://www.sims.berkeley.edu/ rosario/projects/LSI.pdf.
    • (2000) Techn. Rep. INFOSYS 240
    • Rosario, B.1
  • 62
    • 0000417994 scopus 로고
    • Developments in automatic text retrieval
    • SALTON, G. 1991. Developments in automatic text retrieval. Sci. 253, 5023, 974-979.
    • (1991) Sci. , vol.253 , Issue.5023 , pp. 974-979
    • Salton, G.1
  • 63
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' Identities in microdata release
    • SAMARATI, P. 2001. Protecting respondents' Identities in microdata release. IEEE Trans. Knowl. Data Engin. 13, 6, 1010-1027.
    • (2001) IEEE Trans. Knowl. Data Engin. , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 65
    • 58349110852 scopus 로고    scopus 로고
    • Privacy protection in personalized search
    • SHEN, X., TAN, B., AND ZHAI, C. 2007. Privacy protection in personalized search. ACM SIGIR Forum 41, 1, 4-17.
    • (2007) ACM SIGIR Forum , vol.41 , Issue.1 , pp. 4-17
    • Shen, X.1    Tan, B.2    Zhai, C.3
  • 67
  • 68
    • 0023014685 scopus 로고
    • A non-classical logic for information retrieval
    • VAN RIJSBERGEN, C. 1986. A non-classical logic for information retrieval. Comput. J. 29, 6, 481-485.
    • (1986) Comput. J. , vol.29 , Issue.6 , pp. 481-485
    • Van Rijsbergen, C.1
  • 70
    • 33750984193 scopus 로고    scopus 로고
    • Minimum-cost network hardening using attack graphs
    • DOI 10.1016/j.comcom.2006.06.018, PII S0140366406002271
    • WANG, L.,NOEL, S., AND JAJODIA, S. 2006. Minimum-cost network hardening using attack graphs. Comput. Commun. 29, 18, 3812-3824. (Pubitemid 44751132)
    • (2006) Computer Communications , vol.29 , Issue.18 , pp. 3812-3824
    • Wang, L.1    Noel, S.2    Jajodia, S.3
  • 73
    • 39749203739 scopus 로고    scopus 로고
    • Augmenting the power of LSI in text retrieval: Singular value rescaling
    • YAN, H., GROSKY, W. I., AND FOTOUHI, F. 2008. Augmenting the power of LSI in text retrieval: Singular value rescaling. Data Knowl. Engin. 65, 1, 108-125.
    • (2008) Data Knowl. Engin. , vol.65 , Issue.1 , pp. 108-125
    • Yan, H.1    Grosky, W.I.2    Fotouhi, F.3
  • 75
    • 0029359786 scopus 로고
    • Adding compression to a full-text retrieval system
    • ZOBEL, J. AND MOFFAT, A. 1995. Adding compression to a full-text retrieval system. Softw.-Practice Exper. 25, 8, 891-903.
    • (1995) Softw.-Practice Exper. , vol.25 , Issue.8 , pp. 891-903
    • Zobel, J.1    Moffat, A.2
  • 76
    • 33747729581 scopus 로고    scopus 로고
    • Inverted files for text search engine
    • ZOBEL, J. AND MOFFAT, A. 2006. Inverted files for text search engine. ACM Comput. Surv. 38, 2, 6.
    • (2006) ACM Comput. Surv. , vol.38 , Issue.2 , pp. 6
    • Zobel, J.1    Moffat, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.