메뉴 건너뛰기




Volumn 20, Issue 1, 2011, Pages 83-106

Local and global recoding methods for anonymizing set-valued data

Author keywords

Anonymity; Database privacy; Set valued data

Indexed keywords

DATABASE SYSTEMS; OPTIMIZATION;

EID: 78751575731     PISSN: 10668888     EISSN: 0949877X     Source Type: Journal    
DOI: 10.1007/s00778-010-0192-8     Document Type: Article
Times cited : (88)

References (32)
  • 4
    • 45749101998 scopus 로고    scopus 로고
    • Anonymitypreserving pattern discovery
    • (accepted for publication)
    • Atzori, M., Bonchi, F., Giannotti, F., Pedreschi, D.: Anonymitypreserving pattern discovery. VLDB J. (accepted for publication) (2008)
    • (2008) VLDB J
    • Atzori, M.1    Bonchi, F.2    Giannotti, F.3    Pedreschi, D.4
  • 5
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimalk-anonymization
    • Bayardo, R.J., Agrawal, R.: Data privacy through optimalk-anonymization. In: Proceedings of ICDE, pp 217-228 (2005)
    • (2005) Proceedings of ICDE , pp. 217-228
    • Bayardo, R.J.1    Agrawal, R.2
  • 8
    • 52649106883 scopus 로고    scopus 로고
    • On the anonymization of sparsehigh-dimensional data
    • Ghinita, G., Tao, Y., Kalnis, P.: On the anonymization of sparsehigh-dimensional data. In: Proceedings of ICDE, (2008)
    • (2008) Proceedings of ICDE
    • Ghinita, G.1    Tao, Y.2    Kalnis, P.3
  • 10
    • 0033311838 scopus 로고    scopus 로고
    • Mining multiple-level association rules in largedatabases
    • Han, J., Fu, Y.: Mining multiple-level association rules in largedatabases. IEEE TKDE 11(5), 798-805 (1999)
    • (1999) IEEE TKDE , vol.11 , Issue.5 , pp. 798-805
    • Han, J.1    Fu, Y.2
  • 11
    • 0039253846 scopus 로고    scopus 로고
    • Mining frequent patterns without candidategeneration
    • Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidategeneration. In: Proceedings of ACM SIGMOD, pp. 1-12 (2000)
    • (2000) Proceedings of ACM SIGMOD , pp. 1-12
    • Han, J.1    Pei, J.2    Yin, Y.3
  • 12
    • 78049372159 scopus 로고    scopus 로고
    • Anonymization of set-valued data via topdown,local generalization
    • He, Y., Naughton, J.F.: Anonymization of set-valued data via topdown,local generalization. PVLDB 2(1), 934-945 (2009)
    • (2009) PVLDB , vol.2 , Issue.1 , pp. 934-945
    • He, Y.1    Naughton, J.F.2
  • 13
    • 0242625276 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • Iyengar, V.S.: Transforming data to satisfy privacy constraints.In: Proceedings of SIGKDD, pp. 279-288 (2002)
    • (2002) Proceedings of SIGKDD , pp. 279-288
    • Iyengar, V.S.1
  • 16
    • 34548805858 scopus 로고    scopus 로고
    • t-Closeness: Privacy beyondk-anonymity and l-diversity
    • Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyondk-anonymity and l-diversity. In: Proceedings of ICDE, pp. 106-115 (2007)
    • (2007) Proceedings of ICDE , pp. 106-115
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 18
    • 3142691086 scopus 로고    scopus 로고
    • On the complexity of optimalK-anonymity
    • Meyerson, A., Williams, R.: On the complexity of optimalK-anonymity. In: Proceedings of ACMPODS, pp. 223-228 (2004)
    • (2004) Proceedings of ACMPODS , pp. 223-228
    • Meyerson, A.1    Williams, R.2
  • 21
    • 34548689125 scopus 로고    scopus 로고
    • Thoughts on k-anonymization
    • Nergiz, M.E., Clifton, C.: Thoughts on k-anonymization. Data.Knowl. Eng. 63(3), 622-645 (2007)
    • (2007) Data.Knowl. Eng , vol.63 , Issue.3 , pp. 622-645
    • Nergiz, M.E.1    Clifton, C.2
  • 22
    • 35448962139 scopus 로고    scopus 로고
    • Approximate algorithms for k-anonymity
    • Park, H., Shim, K.: Approximate algorithms for k-anonymity.In: Proceedings of ACM SIGMOD, pp. 67-78 (2007)
    • (2007) Proceedings of ACM SIGMOD , pp. 67-78
    • Park, H.1    Shim, K.2
  • 24
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdatarelease
    • Samarati, P.: Protecting respondents' identities in microdatarelease. IEEE TKDE 13(6), 1010-1027 (2001)
    • (2001) IEEE TKDE , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 28
    • 84893853914 scopus 로고    scopus 로고
    • Anatomy: Simple and effective privacy preservation
    • Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation.In: Proceedings of VLDB, pp. 139-150 (2006)
    • (2006) Proceedings of VLDB , pp. 139-150
    • Xiao, X.1    Tao, Y.2
  • 30
    • 65449148368 scopus 로고    scopus 로고
    • Anonymizing transactiondatabases for publication
    • Xu, Y., Wang, K., Fu, A.W.-C., Yu, P.S.: Anonymizing transactiondatabases for publication. In: Proceedings of KDD, pp. 767-775 (2008)
    • (2008) Proceedings of KDD , pp. 767-775
    • Xu, Y.1    Wang, K.2    Fu, A.W.-C.3    Yu, P.S.4
  • 32
    • 0035788918 scopus 로고    scopus 로고
    • Real world performance ofassociation rule algorithms
    • Zheng, Z., Kohavi, R., Mason, L.: Real world performance ofassociation rule algorithms. In: Proceedings of KDD, pp. 401-406 (2001)
    • (2001) Proceedings of KDD , pp. 401-406
    • Zheng, Z.1    Kohavi, R.2    Mason, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.