메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1168-1179

Obfuscating the topical intention in enterprise text search

Author keywords

[No Author keywords available]

Indexed keywords

BUSINESS INFORMATION; ENTERPRISE SEARCHES; PRIVACY MODELS; PRIVACY REQUIREMENTS; TEXT SEARCH; USER INTENTION;

EID: 84864199805     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDE.2012.43     Document Type: Conference Paper
Times cited : (23)

References (52)
  • 1
    • 34250017239 scopus 로고    scopus 로고
    • A Face Is Exposed for AOL Searcher No. 4417749
    • 9 August
    • M. Barbaro and T. Z. Jr., "A Face Is Exposed for AOL Searcher No. 4417749," The New York Times, 9 August 2006, http://www.nytimes.com/2006/ 08/09/technology/09aol.html.
    • (2006) The New York Times
    • Barbaro, M.1    Z Jr., T.2
  • 13
    • 58349110852 scopus 로고    scopus 로고
    • Privacy Protection in Personalized Search
    • June
    • X. Shen, B. Tan, and C. Zhai, "Privacy Protection in Personalized Search," ACM SIGIR Forum, vol. 41, no. 1, pp. 4-17, June 2007.
    • (2007) ACM SIGIR Forum , vol.41 , Issue.1 , pp. 4-17
    • Shen, X.1    Tan, B.2    Zhai, C.3
  • 19
    • 1942420748 scopus 로고    scopus 로고
    • Oblivious Keyword Search
    • April/June
    • K. Kurosawa and W. Ogata, "Oblivious Keyword Search," Journal of Complexity, vol. 20, no. 2-3, pp. 356-371, April/June 2004.
    • (2004) Journal of Complexity , vol.20 , Issue.2-3 , pp. 356-371
    • Kurosawa, K.1    Ogata, W.2
  • 20
    • 36749033301 scopus 로고    scopus 로고
    • Private Searching on Streaming Data
    • October
    • R. Ostrovsky and W. E. Skeith, "Private Searching on Streaming Data," Journal of Cryptology, vol. 20, no. 4, pp. 397-430, October 2007.
    • (2007) Journal of Cryptology , vol.20 , Issue.4 , pp. 397-430
    • Ostrovsky, R.1    Skeith, W.E.2
  • 24
    • 33244488406 scopus 로고    scopus 로고
    • Secure Indexes
    • ePrint Archive, Report 2003/216
    • E. Goh, "Secure Indexes," in Cryptology ePrint Archive, Report 2003/216, 2003.
    • (2003) Cryptology
    • Goh, E.1
  • 25
    • 0014814325 scopus 로고
    • Space/Time Trade-Offs in Hash Coding with Allowable Errors
    • July
    • B. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Communications of the ACM, vol. 13, no. 7, pp. 422-426, July 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 27
    • 0035517699 scopus 로고    scopus 로고
    • Protecting Respondents' Identities in Microdata Release
    • P. Samarati, "Protecting Respondents' Identities in Microdata Release," IEEE Transactions on Knowledge and Data Engineering, vol. 13, no. 6, pp. 1010-1027, 2001.
    • (2001) IEEE Transactions on Knowledge and Data Engineering , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 35
    • 0002956175 scopus 로고
    • A Method for Limiting Disclosure in Microdata based on Random Noise and Transformation
    • American Statistical Association
    • J. Kim, "A Method for Limiting Disclosure in Microdata based on Random Noise and Transformation," in Section on Survey Research Methods, American Statistical Association, 1986, pp. 303-308.
    • (1986) Section on Survey Research Methods , pp. 303-308
    • Kim, J.1
  • 38
    • 0036563104 scopus 로고    scopus 로고
    • Confidentiality via Camouflage: The CVC Approach to Disclosure Limitation When Answering Queries to Databases
    • R. Gopal, R. Garfinkel, and P. Goes, "Confidentiality via Camouflage: The CVC Approach to Disclosure Limitation When Answering Queries to Databases," Operations Research, vol. 50, no. 3, pp. 501-516, 2002.
    • (2002) Operations Research , vol.50 , Issue.3 , pp. 501-516
    • Gopal, R.1    Garfinkel, R.2    Goes, P.3
  • 39
    • 33847045247 scopus 로고    scopus 로고
    • Minimizing Information Loss and Preserving Privacy
    • S. Menon and S. Sarkar, "Minimizing Information Loss and Preserving Privacy," Management Science, vol. 53, no. 1, pp. 101-116, 2007.
    • (2007) Management Science , vol.53 , Issue.1 , pp. 101-116
    • Menon, S.1    Sarkar, S.2
  • 40
    • 33749672242 scopus 로고    scopus 로고
    • A Data Disclosure Policy for Count Data Based on the COM-Poisson Distribution
    • J. B. Kadane, R. Krishnan, and G. Shmueli, "A Data Disclosure Policy for Count Data Based on the COM-Poisson Distribution," Management Science, vol. 52, no. 10, pp. 1610-1617, 2006.
    • (2006) Management Science , vol.52 , Issue.10 , pp. 1610-1617
    • Kadane, J.B.1    Krishnan, R.2    Shmueli, G.3
  • 41
    • 0038589165 scopus 로고    scopus 로고
    • The Anatomy of a Large-Scale Hypertextual Web Search Engine
    • S. Brin and L. Page, "The Anatomy of a Large-Scale Hypertextual Web Search Engine," Computer Networks and ISDN Systems, vol. 30, no. 1-7, pp. 107-117, 1998.
    • (1998) Computer Networks and ISDN Systems , vol.30 , Issue.1-7 , pp. 107-117
    • Brin, S.1    Page, L.2
  • 42
    • 4243148480 scopus 로고    scopus 로고
    • Authoritative sources in a hyperlinked environment
    • September
    • J. M. Kleinberg, "Authoritative sources in a hyperlinked environment," Journal of the ACM, vol. 46, pp. 604-632, September 1999.
    • (1999) Journal of the ACM , vol.46 , pp. 604-632
    • Kleinberg, J.M.1
  • 45
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
    • February
    • D. L. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Communications of the ACM, vol. 24, no. 2, pp. 84-90, February 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.