메뉴 건너뛰기




Volumn 24, Issue 3, 2012, Pages 561-574

Slicing: A new approach for privacy preserving data publishing

Author keywords

data anonymization; data publishing; data security; Privacy preservation

Indexed keywords

AMOUNT OF INFORMATION; ANONYMIZATION; DATA ANONYMIZATION; DATA PUBLISHING; DATA UTILITIES; EFFICIENT ALGORITHM; HIGH DIMENSIONAL DATA; MICRODATA; NOVEL TECHNIQUES; PRIVACY PRESERVATION; PRIVACY PRESERVING; SENSITIVE ATTRIBUTE;

EID: 84863050103     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2010.236     Document Type: Article
Times cited : (268)

References (36)
  • 10
    • 84945709355 scopus 로고
    • An algorithm for finding best matches in logarithmic expected time
    • J.H. Friedman, J.L. Bentley, and R.A. Finkel, "An Algorithm for Finding Best Matches in Logarithmic Expected Time" ACM Trans. Math. Software, vol. 3, no. 3, pp. 209-226, 1977.
    • (1977) ACM Trans. Math. Software , vol.3 , Issue.3 , pp. 209-226
    • Friedman, J.H.1    Bentley, J.L.2    Finkel, R.A.3
  • 11
    • 28444499680 scopus 로고    scopus 로고
    • Top-down specialization for information and privacy preservation
    • Proceedings - 21st International Conference on Data Engineering, ICDE 2005
    • B.C.M. Fung, K. Wang, and P.S. Yu, "Top-Down Specialization for Information and Privacy Preservation" Proc. Int'l Conf. Data Eng. (ICDE), pp. 205-216, 2005. (Pubitemid 41731132)
    • (2005) Proceedings - International Conference on Data Engineering , pp. 205-216
    • Fung, B.C.M.1    Wang, K.2    Yu, P.S.3
  • 13
    • 78049372159 scopus 로고    scopus 로고
    • Anonymization of set-valued data via top-down, local generalization
    • Y. He and J. Naughton, "Anonymization of Set-Valued Data via Top-Down, Local Generalization" Proc. Int'l Conf. Very Large Data Bases (VLDB), pp. 934-945, 2009.
    • (2009) Proc. Int'l Conf. Very Large Data Bases (VLDB) , pp. 934-945
    • He, Y.1    Naughton, J.2
  • 22
    • 52649086216 scopus 로고    scopus 로고
    • Injector: Mining background knowledge for data anonymization
    • T. Li and N. Li, "Injector: Mining Background Knowledge for Data Anonymization" Proc. IEEE 24th Int'l Conf. Data Eng. (ICDE), pp. 446-455, 2008.
    • (2008) Proc. IEEE 24th Int'l Conf. Data Eng. (ICDE) , pp. 446-455
    • Li, T.1    Li, N.2
  • 24
  • 28
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • DOI 10.1109/69.971193
    • P. Samarati, "Protecting Respondent's Privacy in Microdata Release" IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp. 1010-1027, Nov./Dec. 2001. (Pubitemid 34035590)
    • (2001) IEEE Transactions on Knowledge and Data Engineering , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 29
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • DOI 10.1142/S021848850200165X
    • L. Sweeney, "Achieving k-Anonymity Privacy Protection Using Generalization and Suppression" Int'l J. Uncertainty Fuzziness and Knowledge-Based Systems, vol. 10, no. 6, pp. 571-588, 2002. (Pubitemid 35384858)
    • (2002) International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.