-
1
-
-
84856191070
-
A Survey of Privacy-Preservation of Graphs and Social Networks
-
X. Wu, et al., "A Survey of Privacy-Preservation of Graphs and Social Networks," Managing and Mining Graph Data, pp. 421-453, 2010.
-
(2010)
Managing and Mining Graph Data
, pp. 421-453
-
-
Wu, X.1
-
2
-
-
70350632870
-
A brief survey on anonymization techniques for privacy preserving publishing of social network data
-
B. Zhou, et al., "A brief survey on anonymization techniques for privacy preserving publishing of social network data," ACM SIGKDD Explorations Newsletter, vol. 10, pp. 12-22, 2008.
-
(2008)
ACM SIGKDD Explorations Newsletter
, vol.10
, pp. 12-22
-
-
Zhou, B.1
-
4
-
-
34250001672
-
What anyone can know: The privacy risks of social networking sites
-
D. Rosenblum, "What anyone can know: The privacy risks of social networking sites," IEEE Security & Privacy, pp. 40-49, 2007.
-
(2007)
IEEE Security & Privacy
, pp. 40-49
-
-
Rosenblum, D.1
-
5
-
-
41849097852
-
AOL removes search data on vast group of web users
-
S. Hansell, "AOL removes search data on vast group of web users," New York Times, vol. 8, p. C4, 2006.
-
(2006)
New York Times
, vol.8
-
-
Hansell, S.1
-
6
-
-
77954581824
-
How to break anonymity of the netflix prize dataset
-
A. Narayanan and V. Shmatikov, "How to break anonymity of the netflix prize dataset," Proc. of IEEE S, vol. 38.
-
Proc. of IEEE S
, vol.38
-
-
Narayanan, A.1
Shmatikov, V.2
-
7
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
B. Fung, et al., "Privacy-preserving data publishing: A survey of recent developments," ACM Computing Surveys (CSUR), vol. 42, pp. 1-53, 2010.
-
(2010)
ACM Computing Surveys (CSUR)
, vol.42
, pp. 1-53
-
-
Fung, B.1
-
8
-
-
71149088987
-
Users of the world, unite! The challenges and opportunities of Social Media
-
A. M. Kaplan and M. Haenlein, "Users of the world, unite! The challenges and opportunities of Social Media," Business Horizons, vol. 53, pp. 59-68, 2010.
-
(2010)
Business Horizons
, vol.53
, pp. 59-68
-
-
Kaplan, A.M.1
Haenlein, M.2
-
9
-
-
77952944272
-
-
Available
-
Facebook. (2011, Facebook Statistic. Available: http://www.facebook.com/ press/info.php?statistics
-
(2011)
Facebook Statistic
-
-
-
11
-
-
57149126815
-
Towards identity anonymization on graphs
-
presented at the
-
K. Liu and E. Terzi, "Towards identity anonymization on graphs,"presented at the Proceedings of the 2008 ACM SIGMOD international conference on Management of data, Vancouver, Canada, 2008.
-
Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, Vancouver, Canada, 2008
-
-
Liu, K.1
Terzi, E.2
-
13
-
-
84856185416
-
The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks
-
B. Zhou and J. Pei, "The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks," Knowledge and Information Systems, pp. 1-31, 2010.
-
(2010)
Knowledge and Information Systems
, pp. 1-31
-
-
Zhou, B.1
Pei, J.2
-
14
-
-
84865065669
-
K-automorphism: A general framework for privacy preserving network publication
-
L. Zou, et al., "K-automorphism: A general framework for privacy preserving network publication," Proceedings of the VLDB Endowment, vol. 2, pp. 946-957, 2009.
-
(2009)
Proceedings of the VLDB Endowment
, vol.2
, pp. 946-957
-
-
Zou, L.1
-
15
-
-
77954728128
-
K-isomorphism: Privacy preserving network publication against structural attacks
-
presented at the
-
J. Cheng, et al., "K-isomorphism: privacy preserving network publication against structural attacks," presented at the Proceedings of the 2010 international conference on Management of data, Indianapolis, Indiana, USA, 2010.
-
Proceedings of the 2010 International Conference on Management of Data, Indianapolis, Indiana, USA, 2010
-
-
Cheng, J.1
-
16
-
-
77952279599
-
k-symmetry model for identity anonymization in social networks
-
presented at the
-
W. Wu, et al., "k-symmetry model for identity anonymization in social networks," presented at the Proceedings of the 13th International Conference on Extending Database Technology, Lausanne, Switzerland, 2010.
-
Proceedings of the 13th International Conference on Extending Database Technology, Lausanne, Switzerland, 2010
-
-
Wu, W.1
-
17
-
-
67650219221
-
Preserving the privacy of sensitive relationships in graph data
-
presented at the
-
E. Zheleva and L. Getoor, "Preserving the privacy of sensitive relationships in graph data," presented at the Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD, San Jose, CA, USA, 2008.
-
Proceedings of the 1st ACM SIGKDD International Conference on Privacy, Security, and Trust in KDD, San Jose, CA, USA, 2008
-
-
Zheleva, E.1
Getoor, L.2
-
18
-
-
79952432617
-
A Clustering Approach for Data and Structural Anonymity in Social Networks
-
A. Campan and T. Truta, "A Clustering Approach for Data and Structural Anonymity in Social Networks," in In Privacy, Security, and Trust in KDD Workshop, 2008.
-
In Privacy, Security, and Trust in KDD Workshop, 2008
-
-
Campan, A.1
Truta, T.2
-
19
-
-
84859194833
-
Resisting structural re-identification in anonymized social networks
-
M. Hay, et al., "Resisting structural re-identification in anonymized social networks," Proceedings of the VLDB Endowment, vol. 1, pp. 102-114, 2008.
-
(2008)
Proceedings of the VLDB Endowment
, vol.1
, pp. 102-114
-
-
Hay, M.1
-
21
-
-
35348848696
-
-
L. Backstrom, et al., "Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography,"2007, pp. 181-190.
-
(2007)
Wherefore Art Thou R3579x?: Anonymized Social Networks, Hidden Patterns, and Structural Steganography
, pp. 181-190
-
-
Backstrom, L.1
-
22
-
-
0036811662
-
k-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: a model for protecting privacy,"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, pp. 557-570, 2002.
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, pp. 557-570
-
-
Sweeney, L.1
-
23
-
-
84856191070
-
-
C. C. Aggarwal and H. Wang, Eds., ed: Springer US
-
X. Wu, et al., "A Survey of Privacy-Preservation of Graphs and Social Networks Managing and Mining Graph Data." vol. 40, C. C. Aggarwal and H. Wang, Eds., ed: Springer US, 2010, pp. 421-453.
-
(2010)
A Survey of Privacy-Preservation of Graphs and Social Networks Managing and Mining Graph Data
, vol.40
, pp. 421-453
-
-
Wu, X.1
-
26
-
-
80455144561
-
Privacy Threat Analysis of Social Network Data
-
M. I. H. Ninggal and J. Abawajy, "Privacy Threat Analysis of Social Network Data," in The 11th International Conference on Algorithms and Architectures for Parallel Processing ICA3PP-11, Melbourne, 2011, pp. 165-174.
-
The 11th International Conference on Algorithms and Architectures for Parallel Processing ICA3PP-11, Melbourne, 2011
, pp. 165-174
-
-
Ninggal, M.I.H.1
Abawajy, J.2
|