메뉴 건너뛰기




Volumn 7, Issue 3, 2013, Pages 272-302

A top-down approach for approximate data anonymisation

Author keywords

approximate algorithm; data anonymisation; k anonymity; privacy protection

Indexed keywords

APPROXIMATE ALGORITHMS; DATA ANONYMISATION; EMPIRICAL EXPERIMENTS; INDIVIDUAL PRIVACY; INFORMATION SOCIETY; K-ANONYMITY; PRIVACY PROTECTION; THEORETICAL PERFORMANCE;

EID: 84882572557     PISSN: 17517575     EISSN: 17517583     Source Type: Journal    
DOI: 10.1080/17517575.2012.688223     Document Type: Article
Times cited : (20)

References (49)
  • 1
    • 3242812017 scopus 로고    scopus 로고
    • Privacy in electronic commerce and the economics of immediate gratification
    • New York, May, New York, NY, New York, NY: ACM Press
    • Acquisti, A. Privacy in electronic commerce and the economics of immediate gratification. Proceedings of ACM electronic commerce conference, New York. May 17-20 2004. pp. 21-29. New York, NY: ACM Press.
    • (2004) Proceedings of ACM electronic commerce conference , pp. 21-29
    • Acquisti, A.1
  • 3
    • 34250661905 scopus 로고    scopus 로고
    • Achieving anonymity via clustering
    • June, Chicago, IL. New York, NY: ACM Press
    • Aggarwal, G. Achieving anonymity via clustering. Proceedings of ACM PODS. June 26-28 2006. pp. 153-162. Chicago, IL. New York, NY: ACM Press
    • (2006) Proceedings of ACM PODS , pp. 153-162
    • Aggarwal, G.1
  • 6
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimal k-anonymization
    • ICDE, April, Tokyo, Japan, Tokyo: IEEE Computer Society
    • Bayardo, R. and Agrawal, R. Data privacy through optimal k-anonymization. ICDE. April 5-8 2005. pp. 217-228. Tokyo, Japan: IEEE Computer Society.
    • (2005) , pp. 217-228
    • Bayardo, R.1    Agrawal, R.2
  • 7
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: a survey on recent developments
    • Benjamin Fung, C.M. 2010. Privacy-preserving data publishing: a survey on recent developments. ACM Computing Surveys, 42 (4): 1-53
    • (2010) ACM Computing Surveys , vol.42 , Issue.4 , pp. 1-53
    • Benjamin Fung, C.M.1
  • 8
    • 33947186222 scopus 로고    scopus 로고
    • Investigating the relationship between internet privacy concerns and online purchase behavior
    • Brown, M. and Muchira, R. 2004. Investigating the relationship between internet privacy concerns and online purchase behavior. Journal of Electronic Commerce Research, 5 (1): 62-70.
    • (2004) Journal of Electronic Commerce Research , vol.5 , Issue.1 , pp. 62-70
    • Brown, M.1    Muchira, R.2
  • 10
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24 (2): 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 11
  • 14
    • 35048856104 scopus 로고    scopus 로고
    • Privacy-preserving data mining on vertically partitioned databases
    • August, Santa Barbara, CA, Santa Barbara: Springer
    • Dwork, C. and Nissim, K. Privacy-preserving data mining on vertically partitioned databases. Advances in cryptology: proceedings of crypto. August 15-19 2004. pp. 528-544. Santa Barbara, CA: Springer.
    • (2004) Advances in cryptology: Proceedings of crypto , pp. 528-544
    • Dwork, C.1    Nissim, K.2
  • 16
    • 33244482849 scopus 로고    scopus 로고
    • Models and methods for privacy-preserving data publishing and analysis
    • 20-23 August, Philadelphia, PA. ACM Press, 20-23 August 2006, Philadelphia
    • Gehrke, J. Models and methods for privacy-preserving data publishing and analysis. Tutorial at the 12th ACM SIGKDD. 20-23 August 2006, Philadelphia, PA. ACM Press
    • (2006) Tutorial at the 12th ACM SIGKDD
    • Gehrke, J.1
  • 17
    • 84988315609 scopus 로고    scopus 로고
    • Fast data anonymization with low information loss
    • September, Austria: ACM Press, University of Vienna
    • Ghinita, G. Fast data anonymization with low information loss. Proceedings of VLDB. September 23-27 2007. pp. 758-769. Austria: ACM Press. University of Vienna
    • (2007) Proceedings of VLDB , pp. 758-769
    • Ghinita, G.1
  • 20
    • 85084162002 scopus 로고    scopus 로고
    • Making mix nets robust for electronic voting by randomized partial checking
    • August, San Francisco, CA, USA, San Francisco, CA, USENIX Association Berkeley, CA
    • Jakobsson, M., Juels, A. and Rivest, R.L. Making mix nets robust for electronic voting by randomized partial checking. Proceedings of the 11th USENIX security symposium. August 5-9 2002. pp. 339-353. San Francisco, CA, USA USENIX Association Berkeley, CA
    • (2002) Proceedings of the 11th USENIX security symposium , pp. 339-353
    • Jakobsson, M.1    Juels, A.2    Rivest, R.L.3
  • 21
    • 84859557518 scopus 로고    scopus 로고
    • A practical approximation algorithm for optimal k-anonymity
    • doi: 10.1007/s 10618-011-0235-9
    • Kenig, B. and Tassa, T. 2012. A practical approximation algorithm for optimal k-anonymity. Data Mining and Knowledge Discovery, 25, 134-168 doi: 10.1007/s 10618-011-0235-9
    • (2012) Data Mining and Knowledge Discovery , vol.25 , pp. 134-168
    • Kenig, B.1    Tassa, T.2
  • 24
    • 34548710709 scopus 로고    scopus 로고
    • Aggregate query answering on anonymized tables
    • ICDE, April, The Marmara Hotel, Istanbul, Turkey, The Marmara Hotel, Istanbul: IEEE Computer Society
    • Koudas, N. Aggregate query answering on anonymized tables. ICDE. April 15-20 2007. pp. 116-125. The Marmara Hotel, Istanbul, Turkey: IEEE Computer Society.
    • (2007) , pp. 116-125
    • Koudas, N.1
  • 25
    • 29844444250 scopus 로고    scopus 로고
    • Incognito: efficient full-domain k-anonymity
    • June, Baltimore, Maryland, Baltimore: ACM Press
    • Lefevre, K., Dewitt, D.J. and Ramakrishnan, R. Incognito: efficient full-domain k-anonymity. Proceedings of ACM SIGMOD. June 14-16 2005. pp. 49-60. Baltimore, Maryland: ACM Press.
    • (2005) Proceedings of ACM SIGMOD , pp. 49-60
    • Lefevre, K.1    Dewitt, D.J.2    Ramakrishnan, R.3
  • 27
    • 33749568323 scopus 로고    scopus 로고
    • Workload-aware anonymization
    • KDD, August, Philadelphia, CA, Philadelphia: ACM
    • Lefevre, K., Dewitt, D.J. and Ramakrishnan, R. Workload-aware anonymization. KDD. August 20-23 2006. pp. 277-286. Philadelphia, CA: ACM.
    • (2006) , pp. 277-286
    • Lefevre, K.1    Dewitt, D.J.2    Ramakrishnan, R.3
  • 28
    • 34548805858 scopus 로고    scopus 로고
    • t-Closeness: privacy beyond k-anonymity and l-diversity
    • April, The Marmara Hotel, Istanbul, Turkey, The Marmara Hotel, Istanbul: IEEE Computer Society
    • Li, N., Li, T. and Venkatasubramanian, S. t-Closeness: privacy beyond k-anonymity and l-diversity. Proceedings of ICDE. April 15-20 2007. pp. 106-115. The Marmara Hotel, Istanbul, Turkey: IEEE Computer Society.
    • (2007) Proceedings of ICDE , pp. 106-115
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 29
    • 63749102777 scopus 로고    scopus 로고
    • An efficient clustering method for k-anonymization
    • 29 March 2008, Nantes, France. IOS Press
    • Lin, J.L. and Wei, M.C. An efficient clustering method for k-anonymization. Proceedings of PAIS, 29 March 2008, Nantes, France. IOS Press, 46-50.
    • Proceedings of PAIS , pp. 46-50
    • Lin, J.L.1    Wei, M.C.2
  • 30
    • 35248900307 scopus 로고    scopus 로고
    • Capturing data usefulness and privacy protection in k-anonymisation
    • Convention Center Seoul, March, Korea: ACM Press
    • Loukides, G. and Shao, J. Capturing data usefulness and privacy protection in k-anonymisation. Proceedings of the 2007 ACM symposium on applied computing, Convention Center Seoul. March 11-15 2007. pp. 370-374. Korea: ACM Press.
    • (2007) Proceedings of the 2007 ACM symposium on applied computing , pp. 370-374
    • Loukides, G.1    Shao, J.2
  • 31
    • 38149078956 scopus 로고    scopus 로고
    • Speeding up clustering-based k-anonymisation algorithms with pre-partitioning
    • BNCOD, July, Glasgow, UK, Glasgow: Springer
    • Loukides, G. and Shao, J. Speeding up clustering-based k-anonymisation algorithms with pre-partitioning. BNCOD. July 3-5 2007. pp. 203-214. Glasgow, UK: Springer.
    • (2007) , pp. 203-214
    • Loukides, G.1    Shao, J.2
  • 32
    • 33749607006 scopus 로고    scopus 로고
    • l-diversity: privacy beyond k-anonymity
    • 3-7 April 2006, Atlanta, GA. IEEE Press
    • Machanavajjhala, A. l-diversity: privacy beyond k-anonymity. Proceedings of ICDE, 3-7 April 2006, Atlanta, GA. IEEE Press, 24-24.
    • Proceedings of ICDE , pp. 24
    • Machanavajjhala, A.1
  • 33
    • 3142691086 scopus 로고    scopus 로고
    • On the complexity of optimal k-anonymity
    • June, Paris, France, Paris: ACM Press
    • Meyerson, A. and Williams, R. On the complexity of optimal k-anonymity. Proceedings of ACM PODS. June 13-18 2004. pp. 223-228. Paris, France: ACM Press.
    • (2004) Proceedings of ACM PODS , pp. 223-228
    • Meyerson, A.1    Williams, R.2
  • 34
    • 0035049112 scopus 로고    scopus 로고
    • Analysis of the clustering properties of the Hilbert space-filling curve
    • Moon, B., Jagadish, H. and Faloutsos, C. 2001. Analysis of the clustering properties of the Hilbert space-filling curve. IEEE TKDE, 13 (1): 124-141.
    • (2001) IEEE TKDE , vol.13 , Issue.1 , pp. 124-141
    • Moon, B.1    Jagadish, H.2    Faloutsos, C.3
  • 35
    • 35448962139 scopus 로고    scopus 로고
    • Approximate algorithms for k-anonymity
    • Beijing, China, Beijing: ACM Press
    • Park, H. and Shim, K. Approximate algorithms for k-anonymity. Proceedings of the SIGMOD. 12-14 2007. pp. 67-78. Beijing, China: ACM Press.
    • (2007) Proceedings of the SIGMOD , pp. 67-78
    • Park, H.1    Shim, K.2
  • 36
    • 77955553620 scopus 로고    scopus 로고
    • Approximate algorithms with generalizing attribute values for k-anonymity
    • Park, H. and Shim, K. 2010. Approximate algorithms with generalizing attribute values for k-anonymity. Information System, 35: 933-955.
    • (2010) Information System , vol.35 , pp. 933-955
    • Park, H.1    Shim, K.2
  • 37
    • 0002008071 scopus 로고    scopus 로고
    • Discovering frequent closed itemsets for association rules
    • ICDT, January, Jerusalem, Israel, Jerusalem: Springer
    • Pasquier, N. Discovering frequent closed itemsets for association rules. ICDT. January 10-12 1999. pp. 398-416. Jerusalem, Israel: Springer.
    • (1999) , pp. 398-416
    • Pasquier, N.1
  • 38
    • 60449089117 scopus 로고    scopus 로고
    • Privacy & American Business (P&AB), Conducted by Harris Interactive, May 2005. Available from: [Accessed 18 June 2011]
    • Privacy & American Business (P&AB). 2005. New survey reports an increase in ID theft and decrease in consumer confidence [online] Conducted by Harris Interactive, May 2005. Available from: http://www.pandab.org/deloitteidsurveypr.html [Accessed 18 June 2011]
    • (2005) New survey reports an increase in ID theft and decrease in consumer confidence [online]
  • 43
    • 0003430416 scopus 로고    scopus 로고
    • Amsterdam, Amsterdam: Sentient Machine Research, Available from: [Accessed 20 June 2011]
    • van der Putten, P. and van Someren, M. 2000. CoIL challenge 2000: the insurance company case [online], Amsterdam: Sentient Machine Research. Available from: http://archive.ics.uci.edu/ml/datasets/Insurance+Company+Benchmark+%28COIL+2000%29 [Accessed 20 June 2011]
    • (2000) CoIL challenge 2000: The insurance company case [online]
    • van der Putten, P.1    van Someren, M.2
  • 44
    • 0013776710 scopus 로고
    • Randomized response: a survey technique for eliminating evasive answer bias
    • Warner, S.L. 1965. Randomized response: a survey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 60 (309): 63-69.
    • (1965) Journal of the American Statistical Association , vol.60 , Issue.309 , pp. 63-69
    • Warner, S.L.1
  • 45
    • 33749571958 scopus 로고    scopus 로고
    • (α, k)-anonymity: an enhanced k-anonymity model for privacy-preserving data publishing
    • August, Philadelphia, PA, New York, Philadelphia, PA: ACM Press
    • Wong, R.C.W. (α, k)-anonymity: an enhanced k-anonymity model for privacy-preserving data publishing. Proceedings of the ACM KDD. August 20-23 2006. pp. 754-759. Philadelphia, PA, New York: ACM Press.
    • (2006) Proceedings of the ACM KDD , pp. 754-759
    • Wong, R.C.W.1
  • 46
    • 34250680246 scopus 로고    scopus 로고
    • Personalized privacy preservation
    • June, Chicago, IL, Chicago: ACM Press
    • Xiao, X. and Tao, Y. Personalized privacy preservation. Proceedings of ACM SIGMOD. June 27-29 2006. pp. 229-240. Chicago, IL: ACM Press.
    • (2006) Proceedings of ACM SIGMOD , pp. 229-240
    • Xiao, X.1    Tao, Y.2
  • 47
    • 33749582207 scopus 로고    scopus 로고
    • Utility-based anonymization using local recoding
    • August, Philadelphia, PA, Philadelphia: ACM Press
    • Xu, J. Utility-based anonymization using local recoding. Proceedings of SIGKDD. August 20-23 2006. pp. 785-790. Philadelphia, PA: ACM Press.
    • (2006) Proceedings of SIGKDD , pp. 785-790
    • Xu, J.1
  • 48
    • 32344451483 scopus 로고    scopus 로고
    • Anonymity-preserving data collection
    • August, Chicago, IL, Chicago: ACM Press
    • Yang, Z., Zhong, S. and Wright, R.N. Anonymity-preserving data collection. Proceedings of the 11th ACM SIGKDD. August 21-25 2005. pp. 334-343. Chicago, IL: ACM Press.
    • (2005) Proceedings of the 11th ACM SIGKDD , pp. 334-343
    • Yang, Z.1    Zhong, S.2    Wright, R.N.3
  • 49
    • 33745214431 scopus 로고    scopus 로고
    • Generalized multidimensional data mapping and query processing
    • Zhang, R. 2005. Generalized multidimensional data mapping and query processing. ACM TODS, 30 (3): 661-697.
    • (2005) ACM TODS , vol.30 , Issue.3 , pp. 661-697
    • Zhang, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.