메뉴 건너뛰기




Volumn 38, Issue 6, 2013, Pages 946-969

A taxonomy of privacy-preserving record linkage techniques

Author keywords

Data matching; Data quality; Entity resolution; Privacy techniques; Record linkage; Survey

Indexed keywords

CLASSIFICATION (OF INFORMATION); DATA HANDLING; DATA INTEGRATION; DATA MINING; DATA WAREHOUSES; DATABASE SYSTEMS; LEARNING SYSTEMS; SURVEYING; SURVEYS; TAXONOMIES;

EID: 84889599807     PISSN: 03064379     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.is.2012.11.005     Document Type: Article
Times cited : (253)

References (143)
  • 4
    • 0002490026 scopus 로고    scopus 로고
    • Data cleaning: Problems and current approaches
    • E. Rahm, H.H. Do, Data cleaning: problems and current approaches, IEEE Data Engineering Bulletin 23 (4) (2000) 3-13.
    • (2000) IEEE Data Engineering Bulletin , vol.23 , Issue.4 , pp. 3-13
    • Rahm, E.1    Do, H.H.2
  • 5
    • 78449293191 scopus 로고    scopus 로고
    • A comparison of personal name matching: Techniques and practical issues
    • Hong Kong
    • P. Christen, A comparison of personal name matching: techniques and practical issues, in: IEEE ICDM Workshop on Mining Complex Data, Hong Kong, 2006.
    • (2006) IEEE ICDM Workshop on Mining Complex Data
    • Christen, P.1
  • 7
    • 67650258952 scopus 로고    scopus 로고
    • Privacy-preserving data linkage and geocoding: Current approaches and research directions
    • Hong Kong
    • P. Christen, Privacy-preserving data linkage and geocoding: current approaches and research directions, in: IEEE ICDM Workshop on Privacy Aspects of Data Mining, Hong Kong, 2006.
    • (2006) IEEE ICDM Workshop on Privacy Aspects of Data Mining
    • Christen, P.1
  • 11
    • 84863067746 scopus 로고    scopus 로고
    • Data fusion: Resolving data conflicts for integration
    • X. Dong, F. Naumann, Data fusion: resolving data conflicts for integration, Proceedings of the VLDB Endowment 2 (2) (2009) 1654-1655.
    • (2009) Proceedings of the VLDB Endowment , vol.2 , Issue.2 , pp. 1654-1655
    • Dong, X.1    Naumann, F.2
  • 15
    • 0013331361 scopus 로고    scopus 로고
    • Real-world data is dirty: Data cleansing and the merge/purge problem
    • M.A. Hernandez, S.J. Stolfo, Real-world data is dirty: data cleansing and the merge/purge problem, Data Mining and Knowledge Discovery 2 (1) (1998) 9-37. (Pubitemid 128696797)
    • (1998) Data Mining and Knowledge Discovery , vol.2 , Issue.1 , pp. 9-37
    • Hernandez, M.A.1    Stolfo, S.J.2
  • 16
    • 0242540438 scopus 로고    scopus 로고
    • Learning to match and cluster large high-dimensional data sets for data integration
    • Edmonton
    • W.W. Cohen, J. Richman, Learning to match and cluster large high-dimensional data sets for data integration, in: ACM SIGKDD, Edmonton, 2002.
    • (2002) ACM SIGKDD
    • Cohen, W.W.1    Richman, J.2
  • 18
    • 33846428121 scopus 로고    scopus 로고
    • Quality and complexity measures for data linkage and deduplication
    • F. Guillet, H. Hamilton (Eds.), Springer
    • P. Christen, K. Goiser, Quality and complexity measures for data linkage and deduplication, in: F. Guillet, H. Hamilton (Eds.), Quality Measures in Data Mining, Studies in Computational Intelligence, vol. 43, Springer, 2007, pp. 127-151.
    • (2007) Quality Measures in Data Mining, Studies in Computational Intelligence , vol.43 , pp. 127-151
    • Christen, P.1    Goiser, K.2
  • 19
    • 84920595044 scopus 로고    scopus 로고
    • A survey of indexing techniques for scalable record linkage and deduplication
    • P. Christen, A survey of indexing techniques for scalable record linkage and deduplication, IEEE Transactions on Knowledge and Data Engineering 24 (9) (2012) 1537-1555.
    • (2012) IEEE Transactions on Knowledge and Data Engineering , vol.24 , Issue.9 , pp. 1537-1555
    • Christen, P.1
  • 21
    • 40449103107 scopus 로고    scopus 로고
    • Public good through data linkage: Measuring research outputs from the Western Australian Data Linkage System
    • DOI 10.1111/j.1753-6405.2008.00160.x
    • E. Brook, D. Rosman, C. Holman, Public good through data linkage: measuring research outputs from the Western Australian data linkage system, Australian and New Zealand Journal of Public Health 32 (1) (2008) 19-23. (Pubitemid 351351015)
    • (2008) Australian and New Zealand Journal of Public Health , vol.32 , Issue.1 , pp. 19-23
    • Brook, E.L.1    Rosman, D.L.2    Holman, C.D.J.3
  • 22
    • 4344570142 scopus 로고    scopus 로고
    • Practical introduction to record linkage for injury research
    • DOI 10.1136/ip.2003.004580
    • D.E. Clark, Practical introduction to record linkage for injury research, Injury Prevention 10 (2004) 186-191. (Pubitemid 39186474)
    • (2004) Injury Prevention , vol.10 , Issue.3 , pp. 186-191
    • Clark, D.E.1
  • 26
    • 1942443495 scopus 로고    scopus 로고
    • Automatically detecting deceptive criminal identities
    • G. Wang, H. Chen, H. Atabakhsh, Automatically detecting deceptive criminal identities, Communications of the ACM 47 (3) (2004) 70-76.
    • (2004) Communications of the ACM , vol.47 , Issue.3 , pp. 70-76
    • Wang, G.1    Chen, H.2    Atabakhsh, H.3
  • 30
    • 74049138802 scopus 로고    scopus 로고
    • Development and user experiences of an open source data cleaning, deduplication and record linkage system
    • P. Christen, Development and user experiences of an open source data cleaning, deduplication and record linkage system, SIGKDD Explorations 11 (1) (2009) 39-48.
    • (2009) SIGKDD Explorations , vol.11 , Issue.1 , pp. 39-48
    • Christen, P.1
  • 32
    • 65449178105 scopus 로고    scopus 로고
    • Febrl: An open source data cleaning, deduplication and record linkage system with a graphical user interface
    • Las Vegas
    • P. Christen, Febrl: an open source data cleaning, deduplication and record linkage system with a graphical user interface, in: ACM SIGKDD, Las Vegas, 2008, pp. 1065-1068.
    • (2008) ACM SIGKDD , pp. 1065-1068
    • Christen, P.1
  • 34
    • 2942709772 scopus 로고    scopus 로고
    • Methods for evaluating and creating data quality
    • W.E. Winkler, Methods for evaluating and creating data quality, Information Systems 29 (7) (2004) 531-550.
    • (2004) Information Systems , vol.29 , Issue.7 , pp. 531-550
    • Winkler, W.E.1
  • 36
    • 33745266392 scopus 로고    scopus 로고
    • Domain-independent data cleaning via analysis of entity-relationship graph
    • DOI 10.1145/1138394.1138401
    • D. Kalashnikov, S. Mehrotra, Domain-independent data cleaning via analysis of entity-relationship graph, ACM Transactions on Database Systems 31 (2) (2006) 716-767. (Pubitemid 43924953)
    • (2006) ACM Transactions on Database Systems , vol.31 , Issue.2 , pp. 716-767
    • Kalashnikov, D.V.1    Mehrotra, S.2
  • 37
    • 0029822648 scopus 로고    scopus 로고
    • Irreversible encryption method by generation of polynomials
    • C. Quantin, H. Bouzelat, L. Dusserre, Irreversible encryption method by generation of polynomials, Medical Informatics and the Internet in Medicine 21 (2) (1996) 113-121. (Pubitemid 26401860)
    • (1996) Medical Informatics , vol.21 , Issue.2 , pp. 113-121
    • Quantin, C.1    Bouzelat, H.2    Dusserre, L.3
  • 39
    • 47949115568 scopus 로고    scopus 로고
    • On the use of semantic blocking techniques for data cleansing and integration
    • Banff, Canada
    • J. Nin, V. Muntes-Mulero, N. Martinez-Bazan, J.-L. Larriba-Pey, On the use of semantic blocking techniques for data cleansing and integration, in: IDEAS, Banff, Canada, 2007, pp. 190-198.
    • (2007) IDEAS , pp. 190-198
    • Nin, J.1    Muntes-Mulero, V.2    Martinez-Bazan, N.3    Larriba-Pey, J.-L.4
  • 40
    • 84943425383 scopus 로고    scopus 로고
    • Efficient record linkage in large data sets
    • Tokyo
    • L. Jin, C. Li, S. Mehrotra, Efficient record linkage in large data sets, in: DASFAA, Tokyo, 2003, pp. 137-146.
    • (2003) DASFAA , pp. 137-146
    • Jin, L.1    Li, C.2    Mehrotra, S.3
  • 41
    • 84976856849 scopus 로고
    • The merge/purge problem for large databases
    • San Jose
    • M.A. Hernandez, S.J. Stolfo, The merge/purge problem for large databases, in: ACM SIGMOD, San Jose, 1995, pp. 127-138.
    • (1995) ACM SIGMOD , pp. 127-138
    • Hernandez, M.A.1    Stolfo, S.J.2
  • 44
    • 0034592784 scopus 로고    scopus 로고
    • Efficient clustering of high-dimensional data sets with application to reference matching
    • Boston
    • A. McCallum, K. Nigam, L.H. Ungar, Efficient clustering of high-dimensional data sets with application to reference matching, in: ACM SIGKDD, Boston, 2000, pp. 169-178.
    • (2000) ACM SIGKDD , pp. 169-178
    • McCallum, A.1    Nigam, K.2    Ungar, L.H.3
  • 45
    • 84976659284 scopus 로고
    • Approximate string matching
    • P. Hall, G. Dowling, Approximate string matching, ACM Computing Surveys 12 (4) (1980) 381-402.
    • (1980) ACM Computing Surveys , vol.12 , Issue.4 , pp. 381-402
    • Hall, P.1    Dowling, G.2
  • 46
    • 0030412523 scopus 로고    scopus 로고
    • A comparison of approximate string matching algorithms
    • P. Jokinen, J. Tarhio, E. Ukkonen, A comparison of approximate string matching algorithms, Software-Practice and Experience 26 (12) (1996) 1439-1458. (Pubitemid 126598523)
    • (1996) Software - Practice and Experience , vol.26 , Issue.12 , pp. 1439-1458
    • Jokinen, P.1    Tarhio, J.2    Ukkonen, E.3
  • 47
    • 0345566149 scopus 로고    scopus 로고
    • A guided tour to approximate string matching
    • G. Navarro, A guided tour to approximate string matching, ACM Computing Surveys 33 (1) (2001) 31-88. (Pubitemid 33768480)
    • (2001) ACM Computing Surveys , vol.33 , Issue.1 , pp. 31-88
    • Navarro, G.1
  • 50
    • 0026979939 scopus 로고
    • Techniques for automatically correcting words in text
    • DOI 10.1145/146370.146380
    • K. Kukich, Techniques for automatically correcting words in text, ACM Computing Surveys 24 (4) (1992) 377-439. (Pubitemid 23687641)
    • (1992) ACM Computing Surveys , vol.24 , Issue.4 , pp. 377-439
    • Kukich Karen1
  • 51
    • 79952272717 scopus 로고
    • Triphone analysis: A combined method for the correction of orthographical and typographical errors
    • Austin, TX, USA
    • B. van Berkel, K. De Smedt, Triphone analysis: a combined method for the correction of orthographical and typographical errors, in: ANLP, Austin, TX, USA, 1988, pp. 77-83.
    • (1988) ANLP , pp. 77-83
    • Van Berkel, B.1    De Smedt, K.2
  • 52
    • 84950419860 scopus 로고
    • Advances in record-linkage methodology as applied to matching the 1985 census of Tampa, Florida
    • M. Jaro, Advances in record-linkage methodology as applied to matching the 1985 census of Tampa, Florida, Journal of American Statistical Association (1989) 414-420.
    • (1989) Journal of American Statistical Association , pp. 414-420
    • Jaro, M.1
  • 53
    • 0008976521 scopus 로고
    • String comparator metrics and enhanced decision rules in the Fellegi-Sunter model of record linkage
    • American Statistical Association
    • W. Winkler, String comparator metrics and enhanced decision rules in the Fellegi-Sunter model of record linkage, in: Survey Research Methods, American Statistical Association, 1990, pp. 778-783.
    • (1990) Survey Research Methods , pp. 778-783
    • Winkler, W.1
  • 54
    • 2942702984 scopus 로고
    • Improved decision rules in the Fellegi-Sunter model of record linkage
    • American Statistical Association
    • W. Winkler, Improved decision rules in the Fellegi-Sunter model of record linkage, in: Survey Research Methods, American Statistical Association, vol. 274, 1993, p. 279.
    • (1993) Survey Research Methods , vol.274 , pp. 279
    • Winkler, W.1
  • 55
    • 65449139594 scopus 로고    scopus 로고
    • Automatic record linkage using seeded nearest neighbour and support vector machine classification
    • Las Vegas
    • P. Christen, Automatic record linkage using seeded nearest neighbour and support vector machine classification, in: ACM SIGKDD, Las Vegas, 2008.
    • (2008) ACM SIGKDD
    • Christen, P.1
  • 56
    • 0000251971 scopus 로고
    • Maximum likelihood estimation via the ECM algorithm: A general framework
    • X. Meng, D. Rubin, Maximum likelihood estimation via the ECM algorithm: a general framework, Biometrika 80 (2) (1993) 267.
    • (1993) Biometrika , vol.80 , Issue.2 , pp. 267
    • Meng, X.1    Rubin, D.2
  • 57
    • 0002940254 scopus 로고
    • Using the em algorithm for weight computation in the Fellegi-Sunter model of record linkage
    • American Statistical Association
    • W. Winkler, Using the EM algorithm for weight computation in the Fellegi-Sunter model of record linkage, in: Survey Research Methods, American Statistical Association, vol. 667, 1988, p. 671.
    • (1988) Survey Research Methods , vol.667 , pp. 671
    • Winkler, W.1
  • 58
    • 84876208378 scopus 로고
    • Near automatic weight computation in the Fellegi-Sunter model of record linkage
    • US Bureau of the Census
    • W. Winkler, Near automatic weight computation in the Fellegi-Sunter model of record linkage, in: Fifth Annual Research Conference, US Bureau of the Census, 1989.
    • (1989) Fifth Annual Research Conference
    • Winkler, W.1
  • 59
    • 0036371278 scopus 로고    scopus 로고
    • Analysis of identifier performance using a deterministic linkage algorithm
    • S. Grannis, J. Overhage, C. McDonald, Analysis of identifier performance using a deterministic linkage algorithm, in: AMIA Annual Symposium, 2002, p. 305.
    • (2002) AMIA Annual Symposium , pp. 305
    • Grannis, S.1    Overhage, J.2    McDonald, C.3
  • 60
    • 0000666461 scopus 로고    scopus 로고
    • Data integration using similarity joins and a word-based information representation language
    • W. Cohen, Data integration using similarity joins and a word-based information representation language, ACM Transactions on Information Systems 18 (3) (2000) 288-321.
    • (2000) ACM Transactions on Information Systems , vol.18 , Issue.3 , pp. 288-321
    • Cohen, W.1
  • 62
    • 77952372966 scopus 로고    scopus 로고
    • Adaptive duplicate detection using learnable string similarity measures
    • Washington, DC
    • M. Bilenko, R.J. Mooney, Adaptive duplicate detection using learnable string similarity measures, in: ACM SIGKDD, Washington, DC, 2003, pp. 39-48.
    • (2003) ACM SIGKDD , pp. 39-48
    • Bilenko, M.1    Mooney, R.J.2
  • 73
    • 84870552185 scopus 로고    scopus 로고
    • An empirical comparison of approaches to approximate string matching in private record linkage
    • T. Bachteler, R. Schnell, J. Reiher, An empirical comparison of approaches to approximate string matching in private record linkage, in: Statistics Canada Symposium, 2010.
    • (2010) Statistics Canada Symposium
    • Bachteler, T.1    Schnell, R.2    Reiher, J.3
  • 74
    • 52649087713 scopus 로고    scopus 로고
    • A hybrid approach to private record linkage
    • Cancun, Mexico
    • A. Inan, M. Kantarcioglu, E. Bertino, M. Scannapieco, A hybrid approach to private record linkage, in: IEEE ICDE, Cancun, Mexico, 2008, pp. 496-505.
    • (2008) IEEE ICDE , pp. 496-505
    • Inan, A.1    Kantarcioglu, M.2    Bertino, E.3    Scannapieco, M.4
  • 75
    • 67649644357 scopus 로고    scopus 로고
    • Efficient private record linkage
    • Shanghai
    • M. Yakout, M. Atallah, A. Elmagarmid, Efficient private record linkage, in: IEEE ICDE, Shanghai, 2009, pp. 1283-1286.
    • (2009) IEEE ICDE , pp. 1283-1286
    • Yakout, M.1    Atallah, M.2    Elmagarmid, A.3
  • 78
    • 84861588233 scopus 로고    scopus 로고
    • Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage
    • E. Durham, Y. Xue, M. Kantarcioglu, B. Malin, Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage, Information Fusion 13 (4) (2012) 245-259.
    • (2012) Information Fusion , vol.13 , Issue.4 , pp. 245-259
    • Durham, E.1    Xue, Y.2    Kantarcioglu, M.3    Malin, B.4
  • 80
    • 70349844175 scopus 로고    scopus 로고
    • Privacy-preserving string comparisons in record linkage systems: A review
    • S. Trepetin, Privacy-preserving string comparisons in record linkage systems: a review, Information Security Journal: A Global Perspective 17 (5) (2008) 253-266.
    • (2008) Information Security Journal: A Global Perspective , vol.17 , Issue.5 , pp. 253-266
    • Trepetin, S.1
  • 83
    • 78049357399 scopus 로고    scopus 로고
    • Secure multiparty computation for privacy-preserving data mining
    • Y. Lindell, B. Pinkas, Secure multiparty computation for privacy-preserving data mining, Journal of Privacy and Confidentiality 1 (1) (2009) 5.
    • (2009) Journal of Privacy and Confidentiality , vol.1 , Issue.1 , pp. 5
    • Lindell, Y.1    Pinkas, B.2
  • 84
    • 38049136534 scopus 로고    scopus 로고
    • An efficient protocol for secure two-party computation in the presence of malicious adversaries
    • Y. Lindell, B. Pinkas, An efficient protocol for secure two-party computation in the presence of malicious adversaries, EUROCRYPT (2007) 52-78.
    • (2007) EUROCRYPT , pp. 52-78
    • Lindell, Y.1    Pinkas, B.2
  • 85
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti, Security and composition of multiparty cryptographic protocols, Journal of Cryptology 13 (1) (2000) 143-202.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 86
    • 18144444441 scopus 로고
    • A one way public key cryptosystem for the linkage of nominal files in epidemiological studies
    • L. Dusserre, C. Quantin, H. Bouzelat, A one way public key cryptosystem for the linkage of nominal files in epidemiological studies, Medinfo 8 (1995) 644-647.
    • (1995) Medinfo , vol.8 , pp. 644-647
    • Dusserre, L.1    Quantin, C.2    Bouzelat, H.3
  • 87
    • 0032032036 scopus 로고    scopus 로고
    • How to ensure data security of an epidemiological follow-up:Quality assessment of an anonymous record linkage procedure
    • DOI 10.1016/S1386-5056(98)00019-7, PII S1386505698000197, Common Security Solutions for Communicating Patient Data
    • C. Quantin, H. Bouzelat, F. Allaert, A. Benhamiche, J. Faivre, L. Dusserre, How to ensure data security of an epidemiological follow-up: quality assessment of an anonymous record linkage procedure, International Journal of Medical Informatics 49 (1) (1998) 117-122. (Pubitemid 28353812)
    • (1998) International Journal of Medical Informatics , vol.49 , Issue.1 , pp. 117-122
    • Quantin, C.1    Bouzelat, H.2    Allaert, F.A.A.3    Benhamiche, A.M.4    Faivre, J.5    Dusserre, L.6
  • 88
  • 96
    • 1142303699 scopus 로고    scopus 로고
    • Information sharing across private databases
    • San Diego
    • R. Agrawal, A. Evfimievski, R. Srikant, Information sharing across private databases, in: ACM SIGMOD, San Diego, 2003, pp. 86-97.
    • (2003) ACM SIGMOD , pp. 86-97
    • Agrawal, R.1    Evfimievski, A.2    Srikant, R.3
  • 98
    • 58549089788 scopus 로고
    • How to construct pseudo-random permutations from pseudo-random functions
    • M. Luby, C. Rackoff, How to construct pseudo-random permutations from pseudo-random functions, in: CRYPTO, vol. 85, 1986, p. 447.
    • (1986) CRYPTO , vol.85 , pp. 447
    • Luby, M.1    Rackoff, C.2
  • 100
    • 24144488603 scopus 로고    scopus 로고
    • Keyword search and oblivious pseudorandom functions
    • Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
    • M. Freedman, Y. Ishai, B. Pinkas, O. Reingold, Keyword search and oblivious pseudorandom functions, Theory of Cryptography (2005) 303-324. (Pubitemid 41231171)
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 303-324
    • Freedman, M.J.1    Ishai, Y.2    Pinkas, B.3    Reingold, O.4
  • 104
    • 84870477881 scopus 로고    scopus 로고
    • An efficient two-party protocol for approximate matching in private record linkage
    • Ballarat, Australia
    • D. Vatsalan, P. Christen, V.S. Verykios, An efficient two-party protocol for approximate matching in private record linkage, in: AusDM, CRPIT, vol. 121, Ballarat, Australia, 2011, pp. 125-136.
    • (2011) AusDM, CRPIT , vol.121 , pp. 125-136
    • Vatsalan, D.1    Christen, P.2    Verykios, V.S.3
  • 108
    • 56749163236 scopus 로고    scopus 로고
    • A privacy-preserving framework for integrating person-specific databases
    • Springer
    • M. Kantarcioglu, W. Jiang, B. Malin, A privacy-preserving framework for integrating person-specific databases, in: Privacy in Statistical Databases, Springer, 2008, pp. 298-314.
    • (2008) Privacy in Statistical Databases , pp. 298-314
    • Kantarcioglu, M.1    Jiang, W.2    Malin, B.3
  • 109
    • 79960442271 scopus 로고    scopus 로고
    • Anonymity meets game theory: Secure data integration with malicious participants
    • N. Mohammed, B. Fung, M. Debbabi, Anonymity meets game theory: secure data integration with malicious participants, International Journal on Very Large Databases 20 (4) (2011) 567-588.
    • (2011) International Journal on Very Large Databases , vol.20 , Issue.4 , pp. 567-588
    • Mohammed, N.1    Fung, B.2    Debbabi, M.3
  • 111
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. Bloom, Space/time trade-offs in hash coding with allowable errors, Communications of the ACM 13 (7) (1970) 422-426.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 112
    • 70450232823 scopus 로고    scopus 로고
    • Network applications of bloom filters: A survey
    • A. Broder, M. Mitzenmacher, Network applications of bloom filters: a survey, Internet Mathematics 1 (4) (2004) 485-509.
    • (2004) Internet Mathematics , vol.1 , Issue.4 , pp. 485-509
    • Broder, A.1    Mitzenmacher, M.2
  • 113
    • 84964941330 scopus 로고    scopus 로고
    • Private medical record linkage with approximate matching
    • Washington, DC
    • E. Durham, Y. Xue, M. Kantarcioglu, B. Malin, Private medical record linkage with approximate matching, in: AMIA Annual Symposium, Washington, DC, 2010, p. 182.
    • (2010) AMIA Annual Symposium , pp. 182
    • Durham, E.1    Xue, Y.2    Kantarcioglu, M.3    Malin, B.4
  • 116
    • 66149159225 scopus 로고    scopus 로고
    • An efficient Bloom filter based solution for multiparty private matching
    • Las Vegas
    • P. Lai, S. Yiu, K. Chow, C. Chong, L. Hui, An efficient Bloom filter based solution for multiparty private matching, in: SAM, Las Vegas, 2006, p. 7.
    • (2006) SAM , pp. 7
    • Lai, P.1    Yiu, S.2    Chow, K.3    Chong, C.4    Hui, L.5
  • 117
    • 84962835282 scopus 로고    scopus 로고
    • An iterative two-party protocol for scalable privacy-preserving record linkage
    • Sydney, Australia
    • D. Vatsalan, P. Christen, An iterative two-party protocol for scalable privacy-preserving record linkage, in: AusDM, CRPIT, vol. 134, Sydney, Australia, 2012.
    • (2012) AusDM, CRPIT , vol.134
    • Vatsalan, D.1    Christen, P.2
  • 118
    • 78149340011 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • Florida, USA
    • H. Kargupta, S. Datta, Q. Wang, K. Sivakumar, On the privacy preserving properties of random data perturbation techniques, in: IEEE ICDM, Florida, USA, 2003, pp. 99-106.
    • (2003) IEEE ICDM
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 119
    • 77952279809 scopus 로고    scopus 로고
    • Private record matching using differential privacy
    • Lausanne, Switzerland
    • A. Inan, M. Kantarcioglu, G. Ghinita, E. Bertino, Private record matching using differential privacy, in: EDBT, Lausanne, Switzerland, 2010, pp. 123-134.
    • (2010) EDBT , pp. 123-134
    • Inan, A.1    Kantarcioglu, M.2    Ghinita, G.3    Bertino, E.4
  • 122
    • 79961178764 scopus 로고    scopus 로고
    • A constraint satisfaction cryptanalysis of Bloom filters in private record linkage
    • Springer
    • M. Kuzu, M. Kantarcioglu, E. Durham, B. Malin, A constraint satisfaction cryptanalysis of Bloom filters in private record linkage, in: Privacy Enhancing Technologies, Springer, 2011, pp. 226-245.
    • (2011) Privacy Enhancing Technologies , pp. 226-245
    • Kuzu, M.1    Kantarcioglu, M.2    Durham, E.3    Malin, B.4
  • 124
    • 67650700151 scopus 로고    scopus 로고
    • Accurate synthetic generation of realistic personal information
    • Springer, Bangkok, Thailand
    • P. Christen, A. Pudjijono, Accurate synthetic generation of realistic personal information, in: PAKDD, Lecture Notes in Artificial Intelligence, vol. 5476, Springer, Bangkok, Thailand, 2009, pp. 507-514.
    • (2009) PAKDD, Lecture Notes in Artificial Intelligence , vol.5476 , pp. 507-514
    • Christen, P.1    Pudjijono, A.2
  • 125
    • 34249878982 scopus 로고    scopus 로고
    • A parallel general-purpose synthetic data generator
    • J. Hoag, C. Thompson, A parallel general-purpose synthetic data generator, ACM SIGMOD 36 (1) (2007) 19-24.
    • (2007) ACM SIGMOD , vol.36 , Issue.1 , pp. 19-24
    • Hoag, J.1    Thompson, C.2
  • 127
    • 70449677016 scopus 로고    scopus 로고
    • Protocols for secure remote database access with approximate matching
    • Springer
    • W. Du, M. Atallah, Protocols for secure remote database access with approximate matching, in: E-Commerce Security and Privacy, Springer, 2001.
    • (2001) E-Commerce Security and Privacy
    • Du, W.1    Atallah, M.2
  • 133
    • 0005180705 scopus 로고    scopus 로고
    • An information-theoretic definition of similarity
    • Madison, WI, USA
    • D. Lin, An information-theoretic definition of similarity, in: ICML, vol. 1, Madison, WI, USA, 1998, pp. 296-304.
    • (1998) ICML , vol.1 , pp. 296-304
    • Lin, D.1
  • 140
    • 84880102424 scopus 로고    scopus 로고
    • Reconstruction from randomized graph via low rank approximation
    • Columbus, Ohio, USA
    • L. Wu, X. Ying, X. Wu, Reconstruction from randomized graph via low rank approximation, in: SIAM, Columbus, Ohio, USA, 2010, pp. 60-71.
    • (2010) SIAM , pp. 60-71
    • Wu, L.1    Ying, X.2    Wu, X.3
  • 141
    • 41849118008 scopus 로고    scopus 로고
    • Preserving the privacy of sensitive relationships in graph data
    • Springer-Verlag, San Jose, USA
    • E. Zheleva, L. Getoor, Preserving the privacy of sensitive relationships in graph data, in: 1st ACM SIGKDD Workshop on Privacy, Security, and Trust, Springer-Verlag, San Jose, USA, 2007, pp. 153-171.
    • (2007) 1st ACM SIGKDD Workshop on Privacy, Security, and Trust , pp. 153-171
    • Zheleva, E.1    Getoor, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.