메뉴 건너뛰기




Volumn 21, Issue 4, 2010, Pages 680-693

Clustering-Based approach for data anonymization

Author keywords

Clustering; Data anonymization; Information loss; Linking attack; Quasi identifier

Indexed keywords

AMOUNT OF INFORMATION; ATTRIBUTE VALUES; CLUSTERING DATA; CLUSTERING PROBLEMS; DATA ANONYMIZATION; DATA GENERALIZATION; DATA SHARING; FLEXIBLE STRATEGIES; INFORMATION LOSS; SENSITIVE ATTRIBUTE;

EID: 77952187845     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: 10.3724/SP.J.1001.2010.03508     Document Type: Article
Times cited : (36)

References (18)
  • 1
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • doi: 10.1109/69.971193
    • Samarati P. Protecting respondents' identities in microdata release. IEEE Trans. on Knowledge and Data Engineering, 2001, 13(6): 1010-1027. [doi: 10.1109/69.971193]
    • (2001) IEEE Trans. on Knowledge and Data Engineering , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 3
    • 33749607006 scopus 로고    scopus 로고
    • l-Diversity: Privacy beyond k-anonymity
    • In: Liu L, Reuter A, Whang KY, Zhang JJ, eds. Los Alamitos: IEEE Computer Society
    • Machanavajjhala A, Gehrke J, Kifer D. l-Diversity: Privacy beyond k-anonymity. In: Liu L, Reuter A, Whang KY, Zhang JJ, eds. Proc. of the 22nd Int'l Conf. on Data Engineering. Los Alamitos: IEEE Computer Society, 2006. 24.
    • (2006) Proc. of the 22nd Int'l Conf. on Data Engineering , pp. 24
    • Machanavajjhala, A.1    Gehrke, J.2    Kifer, D.3
  • 4
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • doi: 10.1142/S021848850200165X
    • Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression. Int'l Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems, 2002, 10(5):571-588. [doi: 10.1142/S021848850200165X]
    • (2002) Int'l Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1
  • 8
    • 19544380211 scopus 로고    scopus 로고
    • Bottom-Up generalization: A data mining solution to privacy protection
    • In: Rastogi R, Morik K, Bramer M, Wu XD, eds. Los Alamitos: IEEE Computer Society
    • Wang K, Yu P, Chakraborty S. Bottom-Up generalization: A data mining solution to privacy protection. In: Rastogi R, Morik K, Bramer M, Wu XD, eds. Proc. of the 4th IEEE Int'l Conf. on Data Mining. Los Alamitos: IEEE Computer Society, 2004. 249-256.
    • (2004) Proc. of the 4th IEEE Int'l Conf. on Data Mining , pp. 249-256
    • Wang, K.1    Yu, P.2    Chakraborty, S.3
  • 10
    • 28444499680 scopus 로고    scopus 로고
    • Top-Down specialization for information and privacy preservation
    • In: Toyama M, Sasaki S, eds. Los Alamitos: IEEE Computer Society
    • Fung B, Wang K, Yu P. Top-Down specialization for information and privacy preservation. In: Toyama M, Sasaki S, eds. Proc. of the 21st Int'l Conf. on Data Engineering. Los Alamitos: IEEE Computer Society, 2005. 205-216.
    • (2005) Proc. of the 21st Int'l Conf. on Data Engineering , pp. 205-216
    • Fung, B.1    Wang, K.2    Yu, P.3
  • 11
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimal k-anonymization
    • In: Toyama M, Sasaki S, eds. Los Alamitos: IEEE Computer Society
    • Bayardo R, Agrawal R. Data privacy through optimal k-anonymization. In: Toyama M, Sasaki S, eds. Proc. of the 21st Int'l Conf. on Data Engineering. Los Alamitos: IEEE Computer Society, 2005. 217-228.
    • (2005) Proc. of the 21st Int'l Conf. on Data Engineering , pp. 217-228
    • Bayardo, R.1    Agrawal, R.2
  • 12
    • 33749606641 scopus 로고    scopus 로고
    • Mondrian multidimensional k-anonymity
    • In: Liu L, Reuter A, Whang KY, Zhang JJ, eds. Los Alamitos: IEEE Computer Society
    • LeFevre K, DeWitt D, Ramakrishnan R. Mondrian multidimensional k-anonymity. In: Liu L, Reuter A, Whang KY, Zhang JJ, eds. Proc. of the 22nd Int'l Conf. on Data Engineering. Los Alamitos: IEEE Computer Society, 2006. 25.
    • (2006) Proc. of the 22nd Int'l Conf. on Data Engineering , pp. 25
    • LeFevre, K.1    DeWitt, D.2    Ramakrishnan, R.3
  • 13
    • 33751359260 scopus 로고    scopus 로고
    • Achieving k-anonymity by clustering in attribute hierarchical structures
    • In: Tjoa AM, Trujillo J, eds. Heidelberg: Springer-Verlag
    • Li JY, Wong R, Fu A, Pei J. Achieving k-anonymity by clustering in attribute hierarchical structures. In: Tjoa AM, Trujillo J, eds. Proc. of the 8th Int'l Conf. on Data Warehousing and Knowledge Discovery. Heidelberg: Springer-Verlag, 2006. 405-416.
    • (2006) Proc. of the 8th Int'l Conf. on Data Warehousing and Knowledge Discovery , pp. 405-416
    • Li, J.Y.1    Wong, R.2    Fu, A.3    Pei, J.4
  • 14
    • 38049126170 scopus 로고    scopus 로고
    • Efficient k-anonymization using clustering techniques
    • In: Kotagiri R, Krishna PR, Mohania M, Nantajeewarawat E, eds. Heidelberg: Springer-Verlag
    • Byun JW, Kamra A, Bertino E, Li NH. Efficient k-anonymization using clustering techniques. In: Kotagiri R, Krishna PR, Mohania M, Nantajeewarawat E, eds. Proc. of the 12th Int'l Conf. on Database Systems for Advanced Applications. Heidelberg: Springer-Verlag, 2007. 188-200.
    • (2007) Proc. of the 12th Int'l Conf. on Database Systems for Advanced Applications , pp. 188-200
    • Byun, J.W.1    Kamra, A.2    Bertino, E.3    Li, N.H.4
  • 15
    • 33745757998 scopus 로고    scopus 로고
    • K-Anonymization approaches for supporting multiple constraints
    • in Chinese with English abstract [doi: 10.1360/jos171222]
    • Yang XC, Liu XY, Wang B, Ge Y. K-Anonymization approaches for supporting multiple constraints. Journal of Software, 2006, 17(5):1222-1231 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/17/1222.htm [doi: 10.1360/jos171222]
    • (2006) Journal of Software , vol.17 , Issue.5 , pp. 1222-1231
    • Yang, X.C.1    Liu, X.Y.2    Wang, B.3    Ge, Y.4
  • 17
    • 84893853914 scopus 로고    scopus 로고
    • Anatomy: Simple and effective privacy preservation
    • In: Dayal U, Whang KY, Lomet D, Alonso G, Lohman G, Kersten M, Cha SK, Kim YK, eds. New York: ACM
    • Xiao XK, Tao YF. Anatomy: Simple and effective privacy preservation. In: Dayal U, Whang KY, Lomet D, Alonso G, Lohman G, Kersten M, Cha SK, Kim YK, eds. Proc. of the 32nd Int'l Conf. on Very Large Data Bases. New York: ACM, 2006. 139-150.
    • (2006) Proc. of the 32nd Int'l Conf. on Very Large Data Bases , pp. 139-150
    • Xiao, X.K.1    Tao, Y.F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.