메뉴 건너뛰기




Volumn , Issue , 2010, Pages 809-812

Anonymizing set-valued social data

Author keywords

k anonymity; Privacy preserving; Set valued data; Suppressioning

Indexed keywords

ANONYMIZATION; CURRENT PRACTICES; DATA SETS; K-ANONYMITY; K-ANONYMIZATION; NETWORK NODE; NUMERICAL EXPERIMENTS; PERSONAL INFORMATION; PERSONAL PRIVACY; PRIVACY PRESERVING; SET-VALUED DATA; SOCIAL NETWORKS; SOCIAL SECURITY NUMBERS; SUPPRESSIONING;

EID: 79953087401     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GreenCom-CPSCom.2010.33     Document Type: Conference Paper
Times cited : (9)

References (13)
  • 1
    • 33749575022 scopus 로고    scopus 로고
    • Group formation in large social networks: Membership, growth, and evolution
    • L. Backstrom, D. P. Huttenlocher, J. M. Kleinberg, and X. Lan. Group formation in large social networks: membership, growth, and evolution. In KDD, pages 44-54, 2006.
    • (2006) KDD , pp. 44-54
    • Backstrom, L.1    Huttenlocher, D.P.2    Kleinberg, J.M.3    Lan, X.4
  • 2
    • 34250017239 scopus 로고    scopus 로고
    • A face is exposed for AOL searcher no. 4417749
    • Aug
    • M. Barbaro and T. Z. Jr. A face is exposed for AOL searcher no. 4417749. New York Times, Aug 2006.
    • (2006) New York Times
    • Barbaro, M.1    Z Jr., T.2
  • 3
    • 77954728128 scopus 로고    scopus 로고
    • K-isomorphism: Privacy preserving network publication against structural attacks
    • J. Cheng, A. Fu, and J. Liu, K-isomorphism: privacy preserving network publication against structural attacks, In SIGMOD conference, 459-470, 2010.
    • (2010) SIGMOD Conference , pp. 459-470
    • Cheng, J.1    Fu, A.2    Liu, J.3
  • 4
    • 84859194833 scopus 로고    scopus 로고
    • Resisting structural re-identification in anonymized social networks
    • M. Hay, G. Miklau, D. Jensen, D. F. Towsley, and P. Weis. Resisting structural re-identification in anonymized social networks. PVLDB, 1(1):102-114, 2008.
    • (2008) PVLDB , vol.1 , Issue.1 , pp. 102-114
    • Hay, M.1    Miklau, G.2    Jensen, D.3    Towsley, D.F.4    Weis, P.5
  • 5
    • 78049372159 scopus 로고    scopus 로고
    • Anonymization of set-valued data via topdown, local generalization
    • Y. He and J.F. Naughton, Anonymization of set-valued data via topdown, local generalization, in VLDB 2009.
    • (2009) VLDB
    • He, Y.1    Naughton, J.F.2
  • 6
    • 57149126815 scopus 로고    scopus 로고
    • Towards identity anonymization on graphs
    • K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD Conference, pages 93-106, 2008.
    • (2008) SIGMOD Conference , pp. 93-106
    • Liu, K.1    Terzi, E.2
  • 7
    • 33745587324 scopus 로고    scopus 로고
    • On the complexity of optimal kanonymity
    • A. Meyerson and R. Williams. On the complexity of optimal kanonymity. In Proc. of PODS, 2004.
    • (2004) Proc. of PODS
    • Meyerson, A.1    Williams, R.2
  • 12
    • 52649120205 scopus 로고    scopus 로고
    • Preserving privacy in social networks against neighborhood attacks
    • B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE, pages 506-515, 2008.
    • (2008) ICDE , pp. 506-515
    • Zhou, B.1    Pei, J.2
  • 13
    • 84865065669 scopus 로고    scopus 로고
    • K-automorphism: A general framework for privacy preserving network publication
    • L. Zou, L. Chen, and M. T. Ozsu. K-automorphism: A general framework for privacy preserving network publication. In VLDB, 2009.
    • (2009) VLDB
    • Zou, L.1    Chen, L.2    Ozsu, M.T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.