메뉴 건너뛰기




Volumn 191, Issue , 2012, Pages 98-127

Limiting disclosure of sensitive data in sequential releases of databases

Author keywords

Continuous Data Publishing; Matching; Multipartite graphs; Privacy Preserving Data Publishing; Sequential release

Indexed keywords

CONTINUOUS DATA; MATCHING; MULTIPARTITE GRAPH; PRIVACY PRESERVING DATA PUBLISHING; SEQUENTIAL RELEASE;

EID: 84857647532     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2011.12.020     Document Type: Article
Times cited : (46)

References (47)
  • 5
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimal k-anonymization
    • Proceedings - 21st International Conference on Data Engineering, ICDE 2005
    • R. Bayardo, R. Agrawal, Data privacy through optimal k-anonymization, in: Proceedings of the 21st International Conference on Data Engineering (ICDE '05), 2005, pp. 217-228. (Pubitemid 41731133)
    • (2005) Proceedings - International Conference on Data Engineering , pp. 217-228
    • Bayardo, R.J.1    Agrawal, R.2
  • 7
    • 0042734800 scopus 로고    scopus 로고
    • The GeneTrustee: A universal identification system that ensures privacy and confidentiality for human genetic databases
    • L. Burnett, K. Barlow-Stewart, A. Proos, and H. Aizenberg The GeneTrustee: a universal identification system that ensures privacy and confidentiality for human genetic databases Journal of Law and Medicine 10 4 2003 506 513
    • (2003) Journal of Law and Medicine , vol.10 , Issue.4 , pp. 506-513
    • Burnett, L.1    Barlow-Stewart, K.2    Proos, A.3    Aizenberg, H.4
  • 9
    • 78751575843 scopus 로고    scopus 로고
    • Sabre: A sensitive attribute bucketization and redistribution framework for t-closeness
    • J. Cao, P. Karras, P. Kalnis, and K. Tan Sabre: a sensitive attribute bucketization and redistribution framework for t-closeness The VLDB Journal 20 1 2011 59 81
    • (2011) The VLDB Journal , vol.20 , Issue.1 , pp. 59-81
    • Cao, J.1    Karras, P.2    Kalnis, P.3    Tan, K.4
  • 12
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey of recent developments
    • B. Fung, K. Wang, R. Chen, and P. Yu Privacy-preserving data publishing: a survey of recent developments ACM Computing Surveys (CSUR) 42 4 2010 1 53
    • (2010) ACM Computing Surveys (CSUR) , vol.42 , Issue.4 , pp. 1-53
    • Fung, B.1    Wang, K.2    Chen, R.3    Yu, P.4
  • 14
    • 28444499680 scopus 로고    scopus 로고
    • Top-down specialization for information and privacy preservation
    • Proceedings - 21st International Conference on Data Engineering, ICDE 2005
    • B. Fung, K. Wang, P. Yu, Top-down specialization for information and privacy preservation, in: Proceedings of the 21st International Conference on Data Engineering (ICDE '05), 2005, IEEE, pp. 205-216. (Pubitemid 41731132)
    • (2005) Proceedings - International Conference on Data Engineering , pp. 205-216
    • Fung, B.C.M.1    Wang, K.2    Yu, P.S.3
  • 18
    • 78651539208 scopus 로고    scopus 로고
    • Efficient anonymizations with enhanced utility
    • J. Goldberger, and T. Tassa Efficient anonymizations with enhanced utility Transactions on Data Privacy 3 2010 149 175
    • (2010) Transactions on Data Privacy , vol.3 , pp. 149-175
    • Goldberger, J.1    Tassa, T.2
  • 21
    • 34250673244 scopus 로고    scopus 로고
    • Injecting utility into anonymized datasets
    • DOI 10.1145/1142473.1142499, SIGMOD 2006 - Proceedings of the ACM SIGMOD International Conference on Management of Data
    • D. Kifer, J. Gehrke, Injecting utility into anonymized datasets, in: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data (SIGMOD '06), 2006, pp. 217-228. (Pubitemid 46946515)
    • (2006) Proceedings of the ACM SIGMOD International Conference on Management of Data , pp. 217-228
    • Kifer, D.1    Gehrke, J.2
  • 26
    • 2942522665 scopus 로고    scopus 로고
    • How (not) to protect genomic data privacy in a distributed network: Using trail re-identification to evaluate and design anonymity protection systems
    • DOI 10.1016/j.jbi.2004.04.005, PII S153204640400053X
    • B. Malin, and L. Sweeney How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems Journal of Biomedical Informatics 37 3 2004 179 192 (Pubitemid 38757792)
    • (2004) Journal of Biomedical Informatics , vol.37 , Issue.3 , pp. 179-192
    • Malin, B.1    Sweeney, L.2
  • 27
    • 77958579043 scopus 로고    scopus 로고
    • Privacy-preserving data mining: A feature set partitioning approach
    • N. Matatov, L. Rokach, and O. Maimon Privacy-preserving data mining: a feature set partitioning approach Information Sciences 180 14 2010 2696 2720
    • (2010) Information Sciences , vol.180 , Issue.14 , pp. 2696-2720
    • Matatov, N.1    Rokach, L.2    Maimon, O.3
  • 29
    • 34548689125 scopus 로고    scopus 로고
    • Thoughts on k-anonymization
    • DOI 10.1016/j.datak.2007.03.009, PII S0169023X07000468
    • M. Nergiz, and C. Clifton Thoughts on k-anonymization Data and Knowledge Engineering 63 3 2007 622 645 (Pubitemid 47418332)
    • (2007) Data and Knowledge Engineering , vol.63 , Issue.3 , pp. 622-645
    • Nergiz, M.E.1    Clifton, C.2
  • 30
    • 35448962139 scopus 로고    scopus 로고
    • Approximate algorithms for K-anonymity
    • DOI 10.1145/1247480.1247490, SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data
    • H. Park, K. Shim, Approximate algorithms for k-anonymity, in: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data (SIGMOD '07), 2007, pp. 67-78. (Pubitemid 47630797)
    • (2007) Proceedings of the ACM SIGMOD International Conference on Management of Data , pp. 67-78
    • Park, H.1    Shim, K.2
  • 33
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • DOI 10.1109/69.971193
    • P. Samarati Protecting respondent's privacy in microdata release IEEE Transactions on Knowledge and Data Engineering 13 2001 1010 1027 (Pubitemid 34035590)
    • (2001) IEEE Transactions on Knowledge and Data Engineering , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 38
    • 34147125465 scopus 로고    scopus 로고
    • Handicapping attacker's confidence: An alternative to k-anonymization
    • K. Wang, B. Fung, and P. Yu Handicapping attacker's confidence: an alternative to k-anonymization Knowledge and Information Systems 11 3 2007 345 368
    • (2007) Knowledge and Information Systems , vol.11 , Issue.3 , pp. 345-368
    • Wang, K.1    Fung, B.2    Yu, P.3
  • 39
    • 33749568934 scopus 로고    scopus 로고
    • Template-based privacy preservation in classification problems KeWang
    • DOI 10.1109/ICDM.2005.142, 1565713, Proceedings - Fifth IEEE International Conference on Data Mining, ICDM 2005
    • K. Wang, B.C.M. Fung, P.S. Yu, Template-based privacy preservation in classification problems, in: Proceedings of the 4th IEEE International Conference on Data Mining (ICDM '05), 2005, pp. 466-473. (Pubitemid 47385727)
    • (2005) Proceedings - IEEE International Conference on Data Mining, ICDM , pp. 466-473
    • Wang, K.1    Fung, B.C.M.2    Yu, P.S.3
  • 46
    • 35448967088 scopus 로고    scopus 로고
    • M-invariance: Towards privacy preserving re-publication of dynamic datasets
    • DOI 10.1145/1247480.1247556, SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data
    • X. Xiao, Y. Tao, M-invariance: towards privacy preserving re-publication of dynamic datasets, in: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data (SIGMOD '07), 2007, pp. 689-700. (Pubitemid 47630845)
    • (2007) Proceedings of the ACM SIGMOD International Conference on Management of Data , pp. 689-700
    • Xiao, X.1    Tao, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.