메뉴 건너뛰기




Volumn , Issue , 2013, Pages 329-342

Privacy-aware distributed mobility data analytics

Author keywords

[No Author keywords available]

Indexed keywords

DATA COMPRESSION; DATABASE SYSTEMS;

EID: 84903552475     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (17)
  • 1
    • 52649110568 scopus 로고    scopus 로고
    • Never walk alone: Uncertainty for anonymity in moving objects databases
    • O. Abul, F. Bonchi, and M. Nanni. Never walk alone: Uncertainty for anonymity in moving objects databases. In ICDE, pages 376-385, 2008.
    • (2008) ICDE , pp. 376-385
    • Abul, O.1    Bonchi, F.2    Nanni, M.3
  • 2
    • 70449134527 scopus 로고    scopus 로고
    • On privacy-preservation of text and sparse binary data with sketches
    • C. C. Aggarwal and P. S. Yu. On Privacy-Preservation of Text and Sparse Binary Data with Sketches. In SDM, 2007.
    • (2007) SDM
    • Aggarwal, C.C.1    Yu, P.S.2
  • 4
    • 84869447041 scopus 로고    scopus 로고
    • Differentially private smart metering with battery recharging
    • M. Backes, S. Meiser. Differentially Private Smart Metering with Battery Recharging. IACR Cryptology ePrint Archive 2012: 183 (2012).
    • (2012) IACR Cryptology EPrint Archive 2012 , vol.183
    • Backes, M.1    Meiser, S.2
  • 5
    • 84866022540 scopus 로고    scopus 로고
    • Differentially private transit data publication: A case study on the Montreal transportation system
    • R. Chen, B. C.M. Fung, B. C. Desai, and N. M. Sossou. Differentially private transit data publication: A case study on the Montreal transportation system. KDD, 213-221, 2012.
    • (2012) KDD , pp. 213-221
    • Chen, R.1    Fung, B.C.M.2    Desai, B.C.3    Sossou, N.M.4
  • 6
    • 46649103439 scopus 로고    scopus 로고
    • Approximate continuous querying over distributed streams
    • G. Cormode and M. N. Garofalakis. Approximate continuous querying over distributed streams. ACM Trans. Database Syst., 33(2), 2008.
    • (2008) ACM Trans. Database Syst. , vol.33 , Issue.2
    • Cormode, G.1    Garofalakis, M.N.2
  • 9
    • 84863906129 scopus 로고    scopus 로고
    • Differentially private summaries for sparse data
    • G. Cormode, C. M. Procopiuc, D. Srivastava, and T.T. L. Tran. Differentially private summaries for sparse data. In ICDT, pages 299-311, 2012.
    • (2012) ICDT , pp. 299-311
    • Cormode, G.1    Procopiuc, C.M.2    Srivastava, D.3    Tran, T.T.L.4
  • 10
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265-284.
    • TCC , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 11
    • 78650518102 scopus 로고    scopus 로고
    • Boosting the accuracy of differentially private histograms through consistency
    • M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. Proc. VLDB Endow., 3(1-2):1021-1032, 2010.
    • (2010) Proc. VLDB Endow. , vol.3 , Issue.1-2 , pp. 1021-1032
    • Hay, M.1    Rastogi, V.2    Miklau, G.3    Suciu, D.4
  • 12
    • 79959983519 scopus 로고    scopus 로고
    • No free lunch in data privacy
    • ACM
    • D. Kifer and A. Machanavajjhala. No free lunch in data privacy. In SIGMOD, pages 193-204. ACM, 2011.
    • (2011) SIGMOD , pp. 193-204
    • Kifer, D.1    MacHanavajjhala, A.2
  • 13
    • 84874716590 scopus 로고    scopus 로고
    • Differentially-private network trace analysis
    • F. McSherry and R. Mahajan. Differentially-private network trace analysis. In SIGCOMM, pages 123-134, 2010.
    • (2010) SIGCOMM , pp. 123-134
    • McSherry, F.1    Mahajan, R.2
  • 15
    • 77954711910 scopus 로고    scopus 로고
    • Differentially private aggregation of distributed timeseries with transformation and encryption
    • V. Rastogi and S. Nath. Differentially private aggregation of distributed timeseries with transformation and encryption. In SIGMOD, pages 735-746, 2010.
    • (2010) SIGMOD , pp. 735-746
    • Rastogi, V.1    Nath, S.2
  • 16
    • 4344559647 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppresion
    • P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppresion. In IEEE Symp. on Research in Security and Privacy, pages 384-393, 1998.
    • (1998) IEEE Symp. on Research in Security and Privacy , pp. 384-393
    • Samarati, P.1    Sweeney, L.2
  • 17
    • 70349095406 scopus 로고    scopus 로고
    • Anonymizing moving objects: How to hide a mob in a crowd?
    • R. Yarovoy, F. Bonchi, L. V. S. Lakshmanan, and W. H. Wang. Anonymizing moving objects: how to hide a mob in a crowd? In EDBT, pages 72-83, 2009.
    • (2009) EDBT , pp. 72-83
    • Yarovoy, R.1    Bonchi, F.2    Lakshmanan, L.V.S.3    Wang, W.H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.