메뉴 건너뛰기




Volumn 25, Issue 1, 2012, Pages 134-168

A practical approximation algorithm for optimal k-anonymity

Author keywords

Diversity; Approximation algorithms for NP hard problems; Frequent generalized itemsets; k Anonymity; Privacy preserving data mining

Indexed keywords

ANONYMIZATION; DATA BASE THEORY; DATABASE TABLES; INFORMATION LOSS; ITEM SETS; K-ANONYMITY; K-ANONYMIZATION; NP-HARD; PRIVACY PRESERVING; PRIVACY PRESERVING DATA MINING; PRIVATE INFORMATION;

EID: 84859557518     PISSN: 13845810     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10618-011-0235-9     Document Type: Conference Paper
Times cited : (38)

References (28)
  • 5
    • 38049126170 scopus 로고    scopus 로고
    • Efficient k-anonymization using clustering techniques
    • Byun J-W, Kamra A, Bertino E, Li N (2007) Efficient k-anonymization using clustering techniques. In: DASFAA, pp 188-200
    • (2007) DASFAA , pp. 188-200
    • Byun, J.-W.1    Kamra, A.2    Bertino, E.3    Li, N.4
  • 6
    • 68649129111 scopus 로고    scopus 로고
    • A framework for efficient data anonymization under privacy and accuracy constraints
    • Ghinita G, Karras P, Kalnis P, Mamoulis N (2009) A framework for efficient data anonymization under privacy and accuracy constraints. ACM Trans Database Syst 34(2)
    • (2009) ACM Trans Database Syst , vol.34 , Issue.2
    • Ghinita, G.1    Karras, P.2    Kalnis, P.3    Mamoulis, N.4
  • 7
    • 69549119179 scopus 로고    scopus 로고
    • K-anonymization with minimal loss of information
    • 10.1109/TKDE.2008.129
    • A Gionis T Tassa 2009 k-anonymization with minimal loss of information IEEE Trans Knowl Data Eng 21 2 206 219 10.1109/TKDE.2008.129
    • (2009) IEEE Trans Knowl Data Eng , vol.21 , Issue.2 , pp. 206-219
    • Gionis, A.1    Tassa, T.2
  • 9
    • 78651539208 scopus 로고    scopus 로고
    • Efficient anonymizations with enhanced utility
    • 2725423
    • J Goldberger T Tassa 2010 Efficient anonymizations with enhanced utility TDP 3 149 175 2725423
    • (2010) TDP , vol.3 , pp. 149-175
    • Goldberger, J.1    Tassa, T.2
  • 10
    • 27644510774 scopus 로고    scopus 로고
    • Fast algorithms for frequent itemset mining using FP-trees
    • DOI 10.1109/TKDE.2005.166
    • G Grahne J Zhu 2005 Fast algorithms for frequent itemset mining using fp-trees IEEE Trans Knowl Data Eng 17 10 1347 1362 10.1109/TKDE.2005.166 (Pubitemid 41560422)
    • (2005) IEEE Transactions on Knowledge and Data Engineering , vol.17 , Issue.10 , pp. 1347-1362
    • Grahne, G.1    Zhu, J.2
  • 11
    • 17044438212 scopus 로고    scopus 로고
    • Efficient algorithms for mining closed itemsets and their lattice structure
    • DOI 10.1109/TKDE.2005.60
    • C-J Hsiao 2005 Efficient algorithms for mining closed itemsets and their lattice structure IEEE Trans Knowl Data Eng 17 4 462 478 10.1109/TKDE.2005.60 (Pubitemid 40495590)
    • (2005) IEEE Transactions on Knowledge and Data Engineering , vol.17 , Issue.4 , pp. 462-478
    • Zaki, M.J.1    Hsiao, C.-J.2
  • 18
    • 34548689125 scopus 로고    scopus 로고
    • Thoughts on k-anonymization
    • DOI 10.1016/j.datak.2007.03.009, PII S0169023X07000468
    • M Nergiz C Clifton 2007 Thoughts on k-anonymization Data Knowl Eng 63 3 622 645 10.1016/j.datak.2007.03.009 (Pubitemid 47418332)
    • (2007) Data and Knowledge Engineering , vol.63 , Issue.3 , pp. 622-645
    • Nergiz, M.E.1    Clifton, C.2
  • 19
    • 35448962139 scopus 로고    scopus 로고
    • Approximate algorithms for K-anonymity
    • DOI 10.1145/1247480.1247490, SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data
    • Park H, Shim K (2007) Approximate algorithms for k-anonymity. In: SIGMOD '07: proceedings of the 2007 ACM SIGMOD international conference on management of data, pp 67-78 (Pubitemid 47630797)
    • (2007) Proceedings of the ACM SIGMOD International Conference on Management of Data , pp. 67-78
    • Park, H.1    Shim, K.2
  • 21
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • DOI 10.1109/69.971193
    • P Samarati 2001 Protecting respondents' identities in microdata release IEEE Trans Knowl Data Eng 13 6 1010 1027 10.1109/69.971193 (Pubitemid 34035590)
    • (2001) IEEE Transactions on Knowledge and Data Engineering , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 23
    • 0002880407 scopus 로고
    • Minning generalized association rules
    • Srikant R, Agrawal R (1995) Minning generalized association rules. In: VLDB, pp 407-419
    • (1995) VLDB , pp. 407-419
    • Srikant, R.1    Agrawal, R.2
  • 26
    • 38049087648 scopus 로고    scopus 로고
    • Generating microdata with p-sensitive k-anonymity property
    • Truta T, Campan A, Meyer P (2007) Generating microdata with p-sensitive k-anonymity property. In: SDM, pp 124-141
    • (2007) SDM , pp. 124-141
    • Truta, T.1    Campan, A.2    Meyer, P.3
  • 28
    • 84893853914 scopus 로고    scopus 로고
    • Anatomy: Simple and effective privacy preservation
    • Xiao X, Tao Y (2006) Anatomy: simple and effective privacy preservation. In: VLDB, pp 139-150
    • (2006) VLDB , pp. 139-150
    • Xiao, X.1    Tao, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.