메뉴 건너뛰기




Volumn 5, Issue 3, 2012, Pages 373-386

Service-oriented architecture for high-dimensional private data mashup

Author keywords

anonymity; data integration; data mashup; high dimensionality; Privacy protection; service oriented architecture

Indexed keywords

ANONYMITY; DATA INTEGRATION; DATA MASHUP; HIGH DIMENSIONALITY; PRIVACY PROTECTION;

EID: 84865689933     PISSN: 19391374     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSC.2011.13     Document Type: Article
Times cited : (37)

References (42)
  • 1
    • 33749319132 scopus 로고    scopus 로고
    • Mix, match, and mutate
    • July
    • R.D. Hof, "Mix, Match, and Mutate," Business Week, July 2005.
    • (2005) Business Week
    • Hof, R.D.1
  • 2
    • 0005685575 scopus 로고
    • C4.5: Programs for machine learning
    • J.R. Quinlan, C4.5: Programs for Machine Learning. Morgan Kaufmann, 1993.
    • (1993) Morgan Kaufmann
    • Quinlan, J.R.1
  • 3
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • DOI 10.1109/69.971193
    • P. Samarati, "Protecting Respondents' Identities in Microdata Release," IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp. 1010-1027, Nov. 2001. (Pubitemid 34035590)
    • (2001) IEEE Transactions on Knowledge and Data Engineering , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 4
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • DOI 10.1142/S021848850200165X
    • L. Sweeney, "Achieving k-Anonymity Privacy Protection Using Generalization and Suppression," Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems, vol. 10, no. 5, pp. 571-588, 2002. (Pubitemid 35384858)
    • (2002) International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1
  • 6
    • 34147125465 scopus 로고    scopus 로고
    • Handicapping attacker's confidence: An alternative to k-Anonymization
    • Apr
    • K. Wang, B.C.M. Fung, and P.S. Yu, "Handicapping Attacker's Confidence: An Alternative to k-Anonymization," Knowledge and Information Systems, vol. 11, no. 3, pp. 345-368, Apr. 2007.
    • (2007) Knowledge and Information Systems , vol.11 , Issue.3 , pp. 345-368
    • Wang, K.1    Fung, B.C.M.2    Yu, P.S.3
  • 8
    • 34047165799 scopus 로고    scopus 로고
    • Anonymizing classification data for privacy preservation
    • DOI 10.1109/TKDE.2007.1015
    • B.C.M. Fung, K. Wang, and P.S. Yu, "Anonymizing Classification Data for Privacy Preservation," IEEE Trans. Knowledge and Data Eng., vol. 19, no. 5, pp. 711-725, May 2007. (Pubitemid 46509408)
    • (2007) IEEE Transactions on Knowledge and Data Engineering , vol.19 , Issue.5 , pp. 711-725
    • Fung, B.C.M.1    Wang, K.2    Yu, P.S.3
  • 12
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey of recent developments
    • June
    • B.C.M. Fung, K. Wang, R. Chen, and P.S. Yu, "Privacy-Preserving Data Publishing: A Survey of Recent Developments," ACM Computing Surveys, vol. 42, no. 4, pp. 14:1-14:53, June 2010.
    • (2010) ACM Computing Surveys , vol.42 , Issue.4 , pp. 141-1453
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 14
    • 78149335185 scopus 로고    scopus 로고
    • Centralized and distributed anonymization for high-dimensional healthcare data
    • Oct.
    • N. Mohammed, B.C.M. Fung, P.C.K. Hung, and C.K. Lee, "Centralized and Distributed Anonymization for High-Dimensional Healthcare Data," ACM Trans. Knowledge Discovery from Data, vol. 4, no. 4, pp. 18:1-18:33, Oct. 2010.
    • (2010) ACM Trans. Knowledge Discovery from Data , vol.4 , Issue.4 , pp. 181-1833
    • Mohammed, N.1    Fung, B.C.M.2    Hung, P.C.K.3    Lee, C.K.4
  • 15
    • 84893871762 scopus 로고    scopus 로고
    • Enterprise information mashups: Integrating information, simply
    • A. Jhingran, "Enterprise Information Mashups: Integrating Information, Simply," Proc. 32nd Int'l Conf. Very Large Data Bases, pp. 3-4, 2006.
    • (2006) Proc. 32nd Int'l Conf. Very Large Data Bases , pp. 3-4
    • Jhingran, A.1
  • 19
    • 78049357399 scopus 로고    scopus 로고
    • Secure multiparty computation for privacy-preserving data mining
    • Y. Lindell and B. Pinkas, "Secure Multiparty Computation for Privacy-Preserving Data Mining," J. Privacy and Confidentiality, vol. 1, no. 1, pp. 59-98, 2009.
    • (2009) J. Privacy and Confidentiality , vol.1 , Issue.1 , pp. 59-98
    • Lindell, Y.1    Pinkas, B.2
  • 23
    • 84880121624 scopus 로고    scopus 로고
    • Privacy-preserving classification of customer data without loss of accuracy
    • Z. Yang, S. Zhong, and R.N. Wright, "Privacy-Preserving Classification of Customer Data without Loss of Accuracy," Proc. Fifth SIAM Int'l Conf. Data Mining, pp. 92-102, 2005.
    • (2005) Proc. Fifth SIAM Int'l Conf. Data Mining , pp. 92-102
    • Yang, Z.1    Zhong, S.2    Wright, R.N.3
  • 27
    • 36048997303 scopus 로고    scopus 로고
    • A secure distributed framework for achieving k-Anonymity
    • Nov
    • W. Jiang and C. Clifton, "A Secure Distributed Framework for Achieving k-Anonymity," J. Very Large Data Bases, vol. 15, no. 4, pp. 316-333, Nov. 2006.
    • (2006) J. Very Large Data Bases , vol.15 , Issue.4 , pp. 316-333
    • Jiang, W.1    Clifton, C.2
  • 29
    • 79960442271 scopus 로고    scopus 로고
    • Anonymity meets game theory: Secure data integration with malicious participants
    • N. Mohammed, B.C.M. Fung, and M. Debbabi, "Anonymity Meets Game Theory: Secure Data Integration with Malicious Participants," Int'l J. Very Large Data Bases, vol. 20, pp. 567-588, 2011.
    • Int'l J. Very Large Data Bases , vol.20 , Issue.2011 , pp. 567-588
    • Mohammed, N.1    Fung, B.C.M.2    Debbabi, M.3
  • 33
    • 35348905576 scopus 로고    scopus 로고
    • Subspace: Secure cross-domain communication for web mashups
    • DOI 10.1145/1242572.1242655, 16th International World Wide Web Conference, WWW2007
    • C. Jackson and H.J. Wang, "Subspace: Secure Cross-Domain Communication for Web Mashups," Proc. 16th Int'l Conf. World Wide Web, pp. 611-620, 2007. (Pubitemid 47582290)
    • (2007) 16th International World Wide Web Conference, WWW2007 , pp. 611-620
    • Jackson, C.1    Wang, H.J.2
  • 35
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • p. 379
    • C.E. Shannon, "A Mathematical Theory of Communication," The Bell System Technical J., vol. 27, p. 379, p. 623, 1948.
    • (1948) The Bell System Technical J. , vol.27 , pp. 623
    • Shannon, C.E.1
  • 42
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-Anonymity and its enforcement through generalization and suppression
    • Mar.
    • P. Samarati and L. Sweeney, "Protecting Privacy When Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression," Technical Report, SRI Int'l, Mar. 1998.
    • (1998) Technical Report, SRI Int'l
    • Samarati, P.1    Sweeney, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.