메뉴 건너뛰기




Volumn , Issue , 2011, Pages

PCTA: Privacy-constrained clustering-based transaction data anonymization

Author keywords

Anonymity; Clustering; Database utility; Privacy preserving data mining; Transaction data

Indexed keywords

DATA MINING; PRIVACY-PRESERVING TECHNIQUES; PUBLISHING;

EID: 79955987566     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1971690.1971695     Document Type: Conference Paper
Times cited : (5)

References (38)
  • 4
    • 38049126170 scopus 로고    scopus 로고
    • Efficient k-anonymity using clustering technique
    • J. Byun, A. Kamra, E. Bertino, and N. Li. Efficient k-anonymity using clustering technique. In DASFAA, pages 188-200, 2007.
    • (2007) DASFAA , pp. 188-200
    • Byun, J.1    Kamra, A.2    Bertino, E.3    Li, N.4
  • 5
    • 79956041471 scopus 로고    scopus 로고
    • Rho-uncertainty: Inference-proof transaction anonymization
    • J. Cao, P. Karras, C. Raïssi, and K. Tan. rho-uncertainty: Inference-proof transaction anonymization. PVLDB, 3(1):1033-1044, 2010.
    • (2010) PVLDB , vol.3 , Issue.1 , pp. 1033-1044
    • Cao, J.1    Karras, P.2    Raïssi, C.3    Tan, K.4
  • 8
    • 26944448516 scopus 로고    scopus 로고
    • Ordinal, continuous and heterogeneous k-anonymity through microaggregation
    • DOI 10.1007/s10618-005-0007-5
    • J. Domingo-Ferrer and V. Torra. Ordinal, continuous and heterogeneous k-anonymity through microaggregation. DMKD, 11(2):195-212, 2005. (Pubitemid 41476765)
    • (2005) Data Mining and Knowledge Discovery , vol.11 , Issue.2 , pp. 195-212
    • Domingo-Ferrer, J.1    Torra, V.2
  • 9
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey on recent developments
    • B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey on recent developments. ACM Comput. Surv., 42, 2010.
    • ACM Comput. Surv. , vol.42 , pp. 2010
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 11
    • 52649106883 scopus 로고    scopus 로고
    • On the anonymization of sparse high-dimensional data
    • G. Ghinita, Y. Tao, and P. Kalnis. On the anonymization of sparse high-dimensional data. In ICDE, pages 715-724, 2008.
    • (2008) ICDE , pp. 715-724
    • Ghinita, G.1    Tao, Y.2    Kalnis, P.3
  • 12
    • 52949107266 scopus 로고    scopus 로고
    • A free terrain model for trajectory k-anonymity
    • A. Gkoulalas-Divanis and V. Verykios. A free terrain model for trajectory k-anonymity. In DEXA, pages 49-56, 2008.
    • (2008) DEXA , pp. 49-56
    • Gkoulalas-Divanis, A.1    Verykios, V.2
  • 14
    • 78049372159 scopus 로고    scopus 로고
    • Anonymization of set-valued data via top-down, local generalization
    • Y. He and J. F. Naughton. Anonymization of set-valued data via top-down, local generalization. PVLDB, 2(1):934-945, 2009.
    • (2009) PVLDB , vol.2 , Issue.1 , pp. 934-945
    • He, Y.1    Naughton, J.F.2
  • 15
    • 0242625276 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • V. S. Iyengar. Transforming data to satisfy privacy constraints. In KDD, pages 279-288, 2002.
    • (2002) KDD , pp. 279-288
    • Iyengar, V.S.1
  • 16
    • 33646017451 scopus 로고    scopus 로고
    • Privacy preserving clustering
    • S. Jha, L. Kruger, and P. McDaniel. Privacy preserving clustering. In ESORICS, pages 397-417, 2005.
    • (2005) ESORICS , pp. 397-417
    • Jha, S.1    Kruger, L.2    McDaniel, P.3
  • 17
    • 76749111694 scopus 로고    scopus 로고
    • Efficient multidimensional suppression for k-anonymity
    • S. Kisilevich, L. Rokach, Y. Elovici, and B. Shapira. Efficient multidimensional suppression for k-anonymity. TKDE, 22:334-347, 2010.
    • (2010) TKDE , vol.22 , pp. 334-347
    • Kisilevich, S.1    Rokach, L.2    Elovici, Y.3    Shapira, B.4
  • 20
    • 57149126815 scopus 로고    scopus 로고
    • Towards identity anonymization on graphs
    • K. Liu and E. Terzi. Towards identity anonymization on graphs. In 2008 SIGMOD, pages 93-106, 2008.
    • (2008) 2008 SIGMOD , pp. 93-106
    • Liu, K.1    Terzi, E.2
  • 21
    • 84864258789 scopus 로고    scopus 로고
    • Coat: Constraint-based anonymization of transactions
    • To Appear
    • G. Loukides, A. Gkoulalas-Divanis, and B. Malin. COAT: COnstraint-based Anonymization of Transactions. KAIS. To Appear.
    • KAIS
    • Loukides, G.1    Gkoulalas-Divanis, A.2    Malin, B.3
  • 22
    • 77952390550 scopus 로고    scopus 로고
    • Anonymization of electronic medical records for validating genome-wide association studies
    • G. Loukides, A. Gkoulalas-Divanis, and B. Malin. Anonymization of electronic medical records for validating genome-wide association studies. PNAS, 17:7898-7903, 2010.
    • (2010) PNAS , vol.17 , pp. 7898-7903
    • Loukides, G.1    Gkoulalas-Divanis, A.2    Malin, B.3
  • 23
    • 78049360732 scopus 로고    scopus 로고
    • Anonymizing transaction data to eliminate sensitive inferences
    • G. Loukides, A. Gkoulalas-Divanis, and J. Shao. Anonymizing transaction data to eliminate sensitive inferences. In DEXA, pages 400-415, 2010.
    • (2010) DEXA , pp. 400-415
    • Loukides, G.1    Gkoulalas-Divanis, A.2    Shao, J.3
  • 24
    • 35248900307 scopus 로고    scopus 로고
    • Capturing data usefulness and privacy protection in K-anonymisation
    • DOI 10.1145/1244002.1244091, Proceedings of the 2007 ACM Symposium on Applied Computing
    • G. Loukides and J. Shao. Capturing data usefulness and privacy protection in k-anonymisation. In SAC, pages 370-374, 2007. (Pubitemid 47568317)
    • (2007) Proceedings of the ACM Symposium on Applied Computing , pp. 370-374
    • Loukides, G.1    Shao, J.2
  • 25
    • 50249142450 scopus 로고    scopus 로고
    • Robust de-anonymization of large sparse datasets
    • A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In IEEE S&P, pages 111-125, 2008.
    • (2008) IEEE S&P , pp. 111-125
    • Narayanan, A.1    Shmatikov, V.2
  • 26
    • 34548689125 scopus 로고    scopus 로고
    • Thoughts on k-anonymization
    • DOI 10.1016/j.datak.2007.03.009, PII S0169023X07000468
    • M. E. Nergiz and C. Clifton. Thoughts on k-anonymization. DKE, 63(3):622-645, 2007. (Pubitemid 47418332)
    • (2007) Data and Knowledge Engineering , vol.63 , Issue.3 , pp. 622-645
    • Nergiz, M.E.1    Clifton, C.2
  • 29
    • 1142294784 scopus 로고    scopus 로고
    • Maintaining data privacy in association rule mining
    • S. J. Rizvi and J. R. Haritsa. Maintaining data privacy in association rule mining. In VLDB, pages 682-693, 2002.
    • (2002) VLDB , pp. 682-693
    • Rizvi, S.J.1    Haritsa, J.R.2
  • 32
    • 84886640241 scopus 로고    scopus 로고
    • Local and global recoding methods for anonymizing set-valued data
    • To appear
    • M. Terrovitis, N. Mamoulis, and P. Kalnis. Local and global recoding methods for anonymizing set-valued data. VLDB J. To appear.
    • VLDB J
    • Terrovitis, M.1    Mamoulis, N.2    Kalnis, P.3
  • 33
    • 84859177489 scopus 로고    scopus 로고
    • Privacy-preserving anonymization of set-valued data
    • M. Terrovitis, N. Mamoulis, and P. Kalnis. Privacy-preserving anonymization of set-valued data. PVLDB, 1(1):115-125, 2008.
    • (2008) PVLDB , vol.1 , Issue.1 , pp. 115-125
    • Terrovitis, M.1    Mamoulis, N.2    Kalnis, P.3
  • 37
    • 65449148368 scopus 로고    scopus 로고
    • Anonymizing transaction databases for publication
    • Y. Xu, K. Wang, A. W.-C. Fu, and P. S. Yu. Anonymizing transaction databases for publication. In KDD, pages 767-775, 2008.
    • (2008) KDD , pp. 767-775
    • Xu, Y.1    Wang, K.2    Fu, A.W.-C.3    Yu, P.S.4
  • 38
    • 0035788918 scopus 로고    scopus 로고
    • Real world performance of association rule algorithms
    • Z. Zheng, R. Kohavi, and L. Mason. Real world performance of association rule algorithms. In KDD, pages 401-406, 2001.
    • (2001) KDD , pp. 401-406
    • Zheng, Z.1    Kohavi, R.2    Mason, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.