메뉴 건너뛰기




Volumn , Issue , 2013, Pages 479-485

Preserving privacy and frequent sharing patterns for social network data publishing

Author keywords

[No Author keywords available]

Indexed keywords

DATA MINING; SOCIAL NETWORKING (ONLINE);

EID: 84893331803     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2492517.2492603     Document Type: Conference Paper
Times cited : (9)

References (19)
  • 1
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey of recent developments
    • June
    • B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, "Privacy-preserving data publishing: A survey of recent developments," ACM Computing Surveys, vol. 42, no. 4, pp. 14:1-14:53, June 2010.
    • (2010) ACM Computing Surveys , vol.42 , Issue.4 , pp. 141-1453
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 5
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • P. Samarati and L. Sweeney, "Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression," SRI International, Tech. Rep., 1998.
    • (1998) SRI International, Tech. Rep.
    • Samarati, P.1    Sweeney, L.2
  • 7
    • 34147125465 scopus 로고    scopus 로고
    • Handicapping attacker's confidence: An alternative to k-anonymization
    • April
    • K. Wang, B. C. M. Fung, and P. S. Yu, "Handicapping attacker's confidence: an alternative to k-anonymization," Knowledge and Information Systems, vol. 11, pp. 345-368, April 2007.
    • (2007) Knowledge and Information Systems , vol.11 , pp. 345-368
    • Wang, K.1    Fung, B.C.M.2    Yu, P.S.3
  • 11
    • 79960442271 scopus 로고    scopus 로고
    • Anonymity meets game theory: Secure data integration with malicious participants
    • August
    • N. Mohammed, B. C. M. Fung, and M. Debbabi, "Anonymity meets game theory: secure data integration with malicious participants," Very Large Data Bases Journal (VLDBJ), vol. 20, no. 4, pp. 567-588, August 2011.
    • (2011) Very Large Data Bases Journal (VLDBJ) , vol.20 , Issue.4 , pp. 567-588
    • Mohammed, N.1    Fung, B.C.M.2    Debbabi, M.3
  • 16
    • 84859194833 scopus 로고    scopus 로고
    • Resisting structural re-identification in anonymized social networks
    • M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis, "Resisting structural re-identification in anonymized social networks," Proceedings of the VLDB Endowment, vol. 1, no. 1, pp. 102-114, 2008.
    • (2008) Proceedings of the VLDB Endowment , vol.1 , Issue.1 , pp. 102-114
    • Hay, M.1    Miklau, G.2    Jensen, D.3    Towsley, D.4    Weis, P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.