메뉴 건너뛰기




Volumn 33, Issue , 2014, Pages 53-63

Measuring the privacy of user profiles in personalized information systems

Author keywords

Kullback Leibler divergence; Personalized information systems; Privacy criterion; Privacy enhancing technologies; Shannon's entropy; User profiling

Indexed keywords

KULLBACK LEIBLER DIVERGENCE; PERSONALIZED INFORMATION SYSTEMS; PRIVACY-ENHANCING TECHNOLOGIES; SHANNON'S ENTROPY; USER PROFILING;

EID: 84892981403     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2013.01.001     Document Type: Article
Times cited : (47)

References (65)
  • 1
    • 0037252945 scopus 로고    scopus 로고
    • Amazon.com recommendations: Item-to-item collaborative filtering
    • G. Linden, B. Smith, and J. York Amazon.com recommendations: item-to-item collaborative filtering IEEE Internet Comput. Mag. 7 1 2003 76 80
    • (2003) IEEE Internet Comput. Mag. , vol.7 , Issue.1 , pp. 76-80
    • Linden, G.1    Smith, B.2    York, J.3
  • 2
  • 4
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • DOI 10.1145/358549.358563
    • D. Chaum Untraceable electronic mail, return addresses, and digital pseudonyms Commun. ACM 24 2 1981 84 88 (Pubitemid 11480996)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum David, L.1
  • 6
    • 33644989680 scopus 로고    scopus 로고
    • Specification of a framework for the anonymous use of privileges
    • V. Benjumea, J. López, and J.M.T. Linero Specification of a framework for the anonymous use of privileges Telemat. Inform. 23 3 2006 179 195
    • (2006) Telemat. Inform. , vol.23 , Issue.3 , pp. 179-195
    • Benjumea, V.1    López, J.2    Linero, J.M.T.3
  • 9
    • 77953499778 scopus 로고    scopus 로고
    • Optimistic fair priced oblivious transfer
    • AFRICACRYPT Springer-Verlag
    • A. Rial, and B. Preneel Optimistic fair priced oblivious transfer Proc. Int. Conf. Cryptology Africa AFRICACRYPT 2010 Springer-Verlag 131 147
    • (2010) Proc. Int. Conf. Cryptology Africa , pp. 131-147
    • Rial, A.1    Preneel, B.2
  • 10
    • 84892207326 scopus 로고    scopus 로고
    • Why adopting privacy enhancing technologies (pets) takes so much time
    • S. Gutwirth, Y. Poullet, P. Hert, R. Leenes, CPD Springer-Verlag
    • J. Borking Why adopting privacy enhancing technologies (pets) takes so much time S. Gutwirth, Y. Poullet, P. Hert, R. Leenes, Proc. Comput. Priv. Data Prot. CPD 2011 Springer-Verlag 309 341
    • (2011) Proc. Comput. Priv. Data Prot. , pp. 309-341
    • Borking, J.1
  • 12
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • DOI 10.1109/69.971193
    • P. Samarati Protecting respondents' identities in microdata release IEEE Trans. Knowl. Data Eng. 13 6 2001 1010 1027 (Pubitemid 34035590)
    • (2001) IEEE Transactions on Knowledge and Data Engineering , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 16
    • 65449147584 scopus 로고    scopus 로고
    • The cost of privacy: Destruction of data-mining utility in anonymized data publishing
    • Las Vegas, NV
    • J. Brickell, V. Shmatikov, The cost of privacy: destruction of data-mining utility in anonymized data publishing, in:Proc. ACM SIGKDD Int. Conf. Knowl. Disc. Data Min., KDD, Las Vegas, NV, 2008, pp. 70-78.
    • (2008) Proc. ACM SIGKDD Int. Conf. Knowl. Disc. Data Min., KDD , pp. 70-78
    • Brickell, J.1    Shmatikov, V.2
  • 18
    • 77956995886 scopus 로고    scopus 로고
    • From t-closeness-like privacy to postrandomization via information theory
    • URL
    • D. Rebollo-Monedero, J. Forné, and J. Domingo-Ferrer From t-closeness-like privacy to postrandomization via information theory IEEE Trans. Knowl. Data Eng. 22 11 2010 1623 1636 URL http://doi.ieeecomputersociety.org/ 10.1109/TKDE.2009.190
    • (2010) IEEE Trans. Knowl. Data Eng. , vol.22 , Issue.11 , pp. 1623-1636
    • Rebollo-Monedero, D.1    Forné, J.2    Domingo-Ferrer, J.3
  • 19
    • 0038041166 scopus 로고    scopus 로고
    • A new privacy model for hiding group interests while accessing the Web
    • ACM Washington, DC
    • Y. Elovici, B. Shapira, and A. Maschiach A new privacy model for hiding group interests while accessing the Web Proc. Workshop Priv. Electron. Society 2002 ACM Washington, DC 63 70
    • (2002) Proc. Workshop Priv. Electron. Society , pp. 63-70
    • Elovici, Y.1    Shapira, B.2    Maschiach, A.3
  • 23
    • 77955802941 scopus 로고    scopus 로고
    • Optimal query forgery for private information retrieval
    • D. Rebollo-Monedero, and J. Forné Optimal query forgery for private information retrieval IEEE Trans. Inform. Theory 56 9 2010 4631 4642
    • (2010) IEEE Trans. Inform. Theory , vol.56 , Issue.9 , pp. 4631-4642
    • Rebollo-Monedero, D.1    Forné, J.2
  • 24
    • 78049382830 scopus 로고    scopus 로고
    • A privacy-preserving architecture for the semantic Web based on tag suppression
    • Bilbao, Spain
    • J. Parra-Arnau, D. Rebollo-Monedero, J. Forné, A privacy-preserving architecture for the semantic Web based on tag suppression, in: Proc. Int. Conf. Trust, Priv. Secur. Digit. Bus., TRUSTBUS, Bilbao, Spain, 2010, pp. 58-68.
    • (2010) Proc. Int. Conf. Trust, Priv. Secur. Digit. Bus., TRUSTBUS , pp. 58-68
    • Parra-Arnau, J.1
  • 26
    • 84864742451 scopus 로고    scopus 로고
    • Coprivate query profile obfuscation by means of optimal query exchange between users
    • URL
    • D. Rebollo-Monedero, J. Forné, and J. Domingo-Ferrer Coprivate query profile obfuscation by means of optimal query exchange between users IEEE Trans. Depend. Secure Comput. 9 5 2012 641 654 URL http://doi. ieeecomputersociety.org/10.1109/TDSC.2012.16
    • (2012) IEEE Trans. Depend. Secure Comput. , vol.9 , Issue.5 , pp. 641-654
    • Rebollo-Monedero, D.1    Forné, J.2    Domingo-Ferrer, J.3
  • 27
    • 84867573877 scopus 로고    scopus 로고
    • OB-PWS: Obfuscation-based private Web search
    • SP IEEE Comput. Soc.
    • E. Balsa, C. Troncoso, and C. Díaz OB-PWS: obfuscation-based private Web search Proc. IEEE Symp. Secur. Priv. SP 2012 IEEE Comput. Soc. 491 505
    • (2012) Proc. IEEE Symp. Secur. Priv. , pp. 491-505
    • Balsa, E.1    Troncoso, C.2    Díaz, C.3
  • 28
    • 84867575341 scopus 로고    scopus 로고
    • Optimal tag suppression for privacy protection in the semantic Web data
    • URL
    • J. Parra-Arnau, D. Rebollo-Monedero, J. Forné, J.L. Muñoz, and O. Esparza Optimal tag suppression for privacy protection in the semantic Web data Knowl. Eng. 81-82 0 2012 46 66 URL http://dx.doi.org/10.1016/j.datak. 2012.07.004
    • (2012) Knowl. Eng. , vol.81-82 , Issue.0 , pp. 46-66
    • Parra-Arnau, J.1    Rebollo-Monedero, D.2    Forné, J.3    Muñoz, J.L.4    Esparza, O.5
  • 30
    • 84855380857 scopus 로고    scopus 로고
    • An information-theoretic privacy criterion for query forgery in information retrieval
    • SecTech Lecture Notes Comput. Sci. (LNCS) Springer-Verlag Jeju Island, South Korea invited paper
    • D. Rebollo-Monedero, J. Parra-Arnau, and J. Forné An information-theoretic privacy criterion for query forgery in information retrieval Proc. Int. Conf. Secur. Technol. SecTech Lecture Notes Comput. Sci. (LNCS) 2011 Springer-Verlag Jeju Island, South Korea 146 154 invited paper
    • (2011) Proc. Int. Conf. Secur. Technol. , pp. 146-154
    • Rebollo-Monedero, D.1    Parra-Arnau, J.2    Forné, J.3
  • 35
    • 8344276595 scopus 로고    scopus 로고
    • Privacy Preservation Improvement by Learning Optimal Profile Generation Rate
    • T. Kuflik, B. Shapira, Y. Elovici, and A. Maschiach Privacy preservation improvement by learning optimal profile generation rate User Modeling Lecture Notes Comput. Sci. (LNCS) vol. 2702 2003 Springer-Verlag 168 177 (Pubitemid 36768562)
    • (2003) Lecture notes in computer science , Issue.2702 , pp. 168-177
    • Kuflik, T.1    Shapira, B.2    Elovici, Y.3    Maschiach, A.4
  • 36
    • 24944589228 scopus 로고    scopus 로고
    • Enhancing customer privacy while searching for products and services on the world wide web
    • DOI 10.1108/10662240510615164
    • Y. Elovici, C. Glezer, and B. Shapira Enhancing customer privacy while searching for products and services on the World Wide Web Internet Res. 15 4 2005 378 399 (Pubitemid 41314574)
    • (2005) Internet Research , vol.15 , Issue.4 , pp. 378-399
    • Elovici, Y.1    Glezer, C.2    Shapira, B.3
  • 38
    • 76049114679 scopus 로고    scopus 로고
    • Private location-based information retrieval through user collaboration
    • URL
    • D. Rebollo-Monedero, J. Forné, A. Solanas, and T. Martínez-Ballesté Private location-based information retrieval through user collaboration Comput. Commun. 33 6 2010 762 774 URL http://dx.doi.org/10.1016/j.comcom.2009.11.024
    • (2010) Comput. Commun. , vol.33 , Issue.6 , pp. 762-774
    • Rebollo-Monedero, D.1    Forné, J.2    Solanas, A.3    Martínez- Ballesté, T.4
  • 41
    • 0020187981 scopus 로고
    • On the rationale of maximum-entropy methods
    • E.T. Jaynes On the rationale of maximum-entropy methods Proc. IEEE 70 9 1982 939 952
    • (1982) Proc. IEEE , vol.70 , Issue.9 , pp. 939-952
    • Jaynes, E.T.1
  • 46
    • 0002652285 scopus 로고    scopus 로고
    • A maximum entropy approach to natural language processing
    • A.L. Berger, J. della Pietra, and A. della Pietra A maximum entropy approach to natural language processing MIT Comput. Ling. 22 1 1996 39 71
    • (1996) MIT Comput. Ling. , vol.22 , Issue.1 , pp. 39-71
    • Berger, A.L.1    Della Pietra, J.2    Della Pietra, A.3
  • 47
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C.E. Shannon Communication theory of secrecy systems Tech. J. Bell Syst. 1949
    • (1949) Tech. J. Bell Syst.
    • Shannon, C.E.1
  • 49
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • I. Csiszár, and J. Körner Broadcast channels with confidential messages IEEE Trans. Inform. Theory 24 1978 339 348
    • (1978) IEEE Trans. Inform. Theory , vol.24 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 50
    • 84957800033 scopus 로고    scopus 로고
    • Towards Measuring Anonymity
    • Privacy Enhancing Technologies
    • C. Díaz, S. Seys, J. Claessens, and B. Preneel Towards measuring anonymity Proc. Workshop Priv. Enhanc. Technol. PET Lecture Notes Comput. Sci. (LNCS) vol. 2482 2002 Springer-Verlag 54 68 (Pubitemid 36309879)
    • (2003) Lecture notes in computer science , Issue.2482 , pp. 54-68
    • Diaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 52
    • 56749173427 scopus 로고    scopus 로고
    • From t-closeness to PRAM and noise addition via information theory
    • PSD Lecture Notes Comput. Sci. (LNCS) Springer-Verlag Istambul, Turkey
    • D. Rebollo-Monedero, J. Forné, and J. Domingo-Ferrer From t-closeness to PRAM and noise addition via information theory Priv. Stat. Databases PSD Lecture Notes Comput. Sci. (LNCS) 2008 Springer-Verlag Istambul, Turkey 100 112
    • (2008) Priv. Stat. Databases , pp. 100-112
    • Rebollo-Monedero, D.1    Forné, J.2    Domingo-Ferrer, J.3
  • 53
    • 11944275853 scopus 로고
    • Information theory and statistical mechanics II
    • E.T. Jaynes Information theory and statistical mechanics II Phys. Review Ser. II 108 2 1957 171 190
    • (1957) Phys. Review Ser. II , vol.108 , Issue.2 , pp. 171-190
    • Jaynes, E.T.1
  • 54
    • 85009212427 scopus 로고    scopus 로고
    • An efficient integrated gender detection scheme and time mediated averaging of gender dependent acoustic models
    • P.A. Olsen, S. Dharanipragada, An efficient integrated gender detection scheme and time mediated averaging of gender dependent acoustic models, in: Proc. European Conf. Speech Commun. Technol., EUROSPEECH, 2003, pp. 2509-2512.
    • (2003) Proc. European Conf. Speech Commun. Technol., EUROSPEECH , pp. 2509-2512
    • Olsen, P.A.1    Dharanipragada, S.2
  • 55
    • 0036460984 scopus 로고    scopus 로고
    • Theory and practice of acoustic confusability
    • H. Printz, and P. Olsen Theory and practice of acoustic confusability Comput. Speech Lang. 16 1 2002 131 164
    • (2002) Comput. Speech Lang. , vol.16 , Issue.1 , pp. 131-164
    • Printz, H.1    Olsen, P.2
  • 56
    • 34047272127 scopus 로고    scopus 로고
    • Average divergence distance as a statistical discrimination measure for hidden Markov models
    • DOI 10.1109/TSA.2005.858059
    • J. Silva, and S. Narayanan Average divergence distance as a statistical discrimination measure for hidden Markov models IEEE Trans. Audio, Speech, Lang. Process. 14 3 2006 890 906 (Pubitemid 46547651)
    • (2006) IEEE Transactions on Audio, Speech and Language Processing , vol.14 , Issue.3 , pp. 890-906
    • Silva, J.1    Narayanan, S.2
  • 57
    • 34547501979 scopus 로고    scopus 로고
    • A dtw-based dissimilarity measure for left-to-right hidden Markov models and its application to word confusability analysis
    • Q. Huo, W. Li, A dtw-based dissimilarity measure for left-to-right hidden Markov models and its application to word confusability analysis, in: Proc. Interspeech, 2006, pp. 2338-2341.
    • (2006) Proc. Interspeech , pp. 2338-2338
    • Huo, Q.1    Li, W.2
  • 58
    • 0345414074 scopus 로고    scopus 로고
    • An efficient image similarity measure based on approximations of kl-divergence between two Gaussian mixtures
    • J. Goldberger, S. Gordon, H. Greenspan, An efficient image similarity measure based on approximations of kl-divergence between two Gaussian mixtures, in: Proc. Int. Conf. Comput. Vision, ICCV, 2003, pp. 487-493.
    • (2003) Proc. Int. Conf. Comput. Vision, ICCV , pp. 487-493
    • Goldberger, J.1    Gordon, S.2    Greenspan, H.3
  • 59
    • 79955094273 scopus 로고    scopus 로고
    • Fraud detection in telecommunications using Kullback-Leibler divergence and latent Dirichlet allocation
    • Springer-Verlag
    • D. Olszewski Fraud detection in telecommunications using Kullback-Leibler divergence and latent Dirichlet allocation Proc. Adap. Nat. Comput. Alg. 2011 Springer-Verlag 71 80
    • (2011) Proc. Adap. Nat. Comput. Alg. , pp. 71-80
    • Olszewski, D.1
  • 60
    • 29244457315 scopus 로고    scopus 로고
    • Discovering evolutionary theme patterns from text - An exploration of Temporal Text Mining
    • KDD-2005 - Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
    • Q. Mei, and C. Zhai Discovering evolutionary theme patterns from text: an exploration of temporal text mining Proc. ACM SIGKDD Int. Conf. Knowl. Disc. Data Min. KDD 2005 ACM 198 207 (Pubitemid 43218281)
    • (2005) Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , pp. 198-207
    • Mei, Q.1    Zhai, C.2
  • 61
    • 72849133477 scopus 로고    scopus 로고
    • Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
    • X. Sun, H. Wang, J. Li, and T.M. Truta Enhanced p-sensitive k-anonymity models for privacy preserving data publishing Trans. Data Priv. 1 2 2008 53 66
    • (2008) Trans. Data Priv. , vol.1 , Issue.2 , pp. 53-66
    • Sun, X.1    Wang, H.2    Li, J.3    Truta, T.M.4
  • 64
    • 84863121329 scopus 로고    scopus 로고
    • How much privacy? - A system to safe guard personal privacy while releasing databases
    • RSCTC Lecture Notes in Artif. Intell. (LNAI) Springer-Verlag
    • Y.T. Chiang, Y.C. Chiang, T.S. Hsu, C.J. Liau, and D.W. Wang How much privacy? - a system to safe guard personal privacy while releasing databases Proc. Int. Conf. Rough Sets, Curr. Trends Comput. RSCTC Lecture Notes in Artif. Intell. (LNAI) vol. 2475 2002 Springer-Verlag 226 233
    • (2002) Proc. Int. Conf. Rough Sets, Curr. Trends Comput. , vol.2475 , pp. 226-233
    • Chiang, Y.T.1    Chiang, Y.C.2    Hsu, T.S.3    Liau, C.J.4    Wang, D.W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.