메뉴 건너뛰기




Volumn 27, Issue 3, 2011, Pages 348-356

A family of enhanced (L,α)-diversity models for privacy preserving data publishing

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMIZATION; DATA PUBLISHING; DATA SETS; EXPERIMENTAL EVALUATION; NP-HARD; PRIVACY MODELS; PRIVACY PRESERVATION; PRIVACY PRESERVING; SENSITIVE INFORMATIONS; TOPDOWN;

EID: 78649238948     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2010.07.007     Document Type: Article
Times cited : (51)

References (41)
  • 8
  • 11
    • 34548805858 scopus 로고    scopus 로고
    • T-closeness: Privacy beyond k-anonymity and l-diversity
    • N. Li, T. Li, S. Venkatasubramanian, t-closeness: privacy beyond k-anonymity and l-diversity, in: ICDE, 2007, pp. 106115.
    • (2007) ICDE , pp. 106-115
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 13
    • 33749571958 scopus 로고    scopus 로고
    • (α,k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing
    • R. Wong, J. Li, A. Fu, K. Wang, (α, k ) -anonymity: an enhanced k-anonymity model for privacy preserving data publishing, in: KDD, 2006, pp. 754759.
    • (2006) KDD , pp. 754-759
    • Wong, R.1    Li, J.2    Fu, A.3    Wang, K.4
  • 14
    • 38049087648 scopus 로고    scopus 로고
    • Generating microdata with P-sensitivek-anonymity property
    • T.M. Traian, A. Campan, P. Meyer, Generating microdata with P-sensitivek-anonymity property, in: SDM, 2007, pp. 124141.
    • (2007) SDM , pp. 124-141
    • Traian, T.M.1    Campan, A.2    Meyer, P.3
  • 21
    • 33749568934 scopus 로고    scopus 로고
    • Template-based privacy preservation in classification problems
    • K. Wang, B.C.M. Fung, P.S. Yu, Template-based privacy preservation in classification problems, in: ICDM05, 2005.
    • (2005) ICDM05
    • Wang, K.1    Fung, B.C.M.2    Yu, P.S.3
  • 22
    • 67649641460 scopus 로고    scopus 로고
    • Modeling and integrating background knowledge in data anonymization
    • T. Li, N. Li, J. Zhang, Modeling and integrating background knowledge in data anonymization, in: ICDE, 2009.
    • (2009) ICDE
    • Li, T.1    Li, N.2    Zhang, J.3
  • 26
  • 27
    • 35248860015 scopus 로고    scopus 로고
    • Secure anonymization for incremental datasets, Secure Data Management
    • J.W. Byun, Y. Sohn, E. Bertino, N. Li, Secure anonymization for incremental datasets, Secure Data Management, SDM, 2006, p. 4863.
    • (2006) SDM , pp. 4863
    • Byun, J.W.1    Sohn, Y.2    Bertino, E.3    Li, N.4
  • 37
    • 74549220778 scopus 로고    scopus 로고
    • Injecting purpose and trust into data anonymization
    • (in press)
    • X. Sun, H. Wang, J. Li, Injecting purpose and trust into data anonymization, in: CIKM, 2009, pp. 15411544 (in press).
    • (2009) CIKM , pp. 1541-1544
    • Sun, X.1    Wang, H.2    Li, J.3
  • 39
    • 26944448516 scopus 로고    scopus 로고
    • Ordinal, continuous and heterogeneousk-anonymity through microaggregation
    • J. Domingo-Ferrer, V. Torra, Ordinal, continuous and heterogeneousk- anonymity through microaggregation, Data Mining and Knowledge Discovery 11, pp. 195212.
    • Data Mining and Knowledge Discovery , vol.11 , pp. 195-212
    • Domingo-Ferrer, J.1    Torra, V.2
  • 41
    • 43749088488 scopus 로고    scopus 로고
    • On the complexity of restricted k-anonymity problem
    • X. Sun, H. Wang, J. Li, On the complexity of restricted k-anonymity problem, in: APWeb, 2008, pp. 287296.
    • (2008) APWeb , pp. 287-296
    • Sun, X.1    Wang, H.2    Li, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.