메뉴 건너뛰기




Volumn 231, Issue , 2013, Pages 83-97

Privacy-preserving trajectory data publishing by local suppression

Author keywords

Frequent sequence; Local suppression; Privacy preservation; Trajectory data

Indexed keywords

ANONYMIZATION; DATA MINING TASKS; DATA UTILITIES; FREQUENT SEQUENCES; HIGH DIMENSIONALITY; LOCAL SUPPRESSION; LOCATION-AWARE; PRIVACY ISSUE; PRIVACY MODELS; PRIVACY PRESERVATION; PRIVACY PRESERVING; REAL LIFE DATASETS; REAL-LIFE APPLICATIONS; SEQUENTIALITY; SUPPRESSION METHOD; TRAJECTORY DATA; TRAJECTORY DATA MININGS; TRAJECTORY DATABASE;

EID: 84874108609     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2011.07.035     Document Type: Article
Times cited : (232)

References (40)
  • 8
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey of recent developments
    • B.C.M. Fung, K. Wang, R. Chen, and P.S. Yu Privacy-preserving data publishing: a survey of recent developments ACM Computing Surveys 42 4 2010 14:1 14:53
    • (2010) ACM Computing Surveys , vol.42 , Issue.4 , pp. 141-1453
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 23
    • 77958579043 scopus 로고    scopus 로고
    • Privacy-preserving data mining: A feature set partitioning approach
    • N. Matatov, L. Rokach, and O. Maimon Privacy-preserving data mining: a feature set partitioning approach Information Sciences 180 4 2010 2696 2720
    • (2010) Information Sciences , vol.180 , Issue.4 , pp. 2696-2720
    • Matatov, N.1    Rokach, L.2    Maimon, O.3
  • 25
    • 84874112371 scopus 로고    scopus 로고
    • Preserving privacy and utility in RFID data publishing
    • Concordia University, Montreal, Canada, September 2010
    • N. Mohammed, B.C.M. Fung, M. Debbabi, Preserving privacy and utility in RFID data publishing, Technical Report 6850, Concordia University, Montreal, Canada, September 2010.
    • Technical Report 6850
    • Mohammed, N.1    Fung, B.C.M.2    Debbabi, M.3
  • 34
    • 34147125465 scopus 로고    scopus 로고
    • Handicapping attacker's confidence: An alternative to k-anonymization
    • K. Wang, B.C.M. Fung, and P.S. Yu Handicapping attacker's confidence: an alternative to k-anonymization Knowledge and Information Systems 11 3 2007 345 368
    • (2007) Knowledge and Information Systems , vol.11 , Issue.3 , pp. 345-368
    • Wang, K.1    Fung, B.C.M.2    Yu, P.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.