메뉴 건너뛰기




Volumn , Issue , 2011, Pages 603-608

LiDSec: A lightweight pseudonymization approach for privacy-preserving publishing of textual personal information

Author keywords

Personal information; Privacy; Pseudonymization; Security

Indexed keywords

DATA PUBLISHING; INFORMATION OBJECT; LIFE EVENTS; LIFELOGGING; PERSONAL INFORMATION; PRIVACY PRESERVING; PSEUDONYMIZATION; SECURITY;

EID: 80455162336     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2011.93     Document Type: Conference Paper
Times cited : (5)

References (23)
  • 1
    • 84856157372 scopus 로고    scopus 로고
    • Last Access July 2010
    • The Web's New Gold Mine: Your Secrets. http://online.wsj.com/article/ SB10001424052748703940904575395073512989404.html, 2010. Last Access July 2010.
    • (2010) The Web's New Gold Mine: Your Secrets
  • 4
    • 79955854747 scopus 로고    scopus 로고
    • The privacy jungle: On the market for data protection in social networks
    • Springer US
    • J. Bonneau and S. Preibusch. The Privacy Jungle: On the Market for Data Protection in Social Networks. In Economics of Information Security and Privacy, pages 121-167. Springer US, 2010.
    • (2010) Economics of Information Security and Privacy , pp. 121-167
    • Bonneau, J.1    Preibusch, S.2
  • 5
    • 36349019854 scopus 로고    scopus 로고
    • The future of social networks on the internet: The need for semantics
    • DOI 10.1109/MIC.2007.138
    • J. Breslin and S. Decker. The Future of Social Networks on the Internet: The Need for Semantics. IEEE Internet Computing, pages 86-90, 2007. (Pubitemid 350148370)
    • (2007) IEEE Internet Computing , vol.11 , Issue.6 , pp. 86-90
    • Breslin, J.1    Decker, S.2
  • 7
    • 0022145479 scopus 로고
    • Security without identification: transaction systems to make big brother obsolete
    • DOI 10.1145/4372.4373
    • D. Chaum. Security Without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM, 28(10):1030-1044, 1985. (Pubitemid 15587967)
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum David1
  • 8
    • 0003187764 scopus 로고
    • Directive 95/46/EC of the european parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • European Union
    • European Union. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with regard to the Processing of Personal Data and on the Free Movement of such Data. Official Journal of the European Communities, L 281:31-50, 1995.
    • (1995) Official Journal of the European Communities L , vol.281 , pp. 31-50
  • 17
    • 0028561148 scopus 로고
    • Medical requirements for data protection
    • K. Pommerening. Medical Requirements for Data Protection. In Proceedings of IFIP Congress, volume 2, pages 533-540, 1994.
    • (1994) Proceedings of IFIP Congress , vol.2 , pp. 533-540
    • Pommerening, K.1
  • 18
    • 20444375246 scopus 로고    scopus 로고
    • Secondary use of the EHR via pseudonymisation
    • IOS Press
    • K. Pommerening and M. Reng. Secondary Use of the EHR via Pseudonymisation. Medical Care Compunetics 1, IOS Press, pages 441-446, 2004.
    • (2004) Medical Care Compunetics , vol.1 , pp. 441-446
    • Pommerening, K.1    Reng, M.2
  • 20
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • P. Samarati and L. Sweeney. Protecting Privacy when Disclosing Information: k-anonymity and its Enforcement through Generalization and Suppression. Technical report, SRI International, 1998.
    • (1998) Technical Report SRI International
    • Samarati, P.1    Sweeney, L.2
  • 23
    • 70350632870 scopus 로고    scopus 로고
    • A brief survey on anonymization techniques for privacy preserving publishing of social network data
    • B. Zhou, J. Pei, and W. Luk. A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data. ACM SIGKDD Explorations Newsletter, 10:12-22, 2008.
    • (2008) ACM SIGKDD Explorations Newsletter , vol.10 , pp. 12-22
    • Zhou, B.1    Pei, J.2    Luk, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.