Tài liệu tham khảo |
Loại |
Chi tiết |
1. N.R. Adam and J.C. Wortmann, Security Control Methods for Statistical Databases: A Com- parative Study, ACM Computing Surveys 21(4) (1989), pp. 515–556 |
Sách, tạp chí |
Tiêu đề: |
ACM Computing Surveys |
Tác giả: |
N.R. Adam and J.C. Wortmann, Security Control Methods for Statistical Databases: A Com- parative Study, ACM Computing Surveys 21(4) |
Năm: |
1989 |
|
2. G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu, Anonymizing Tables, in: Proceedings of the International Conference on Database Theory, 2005, pp. 246–258 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the International Conference on Database Theory |
|
3. R. Agrawal, J. Kiernan, R. Srikant, R. and Y. Xu. Hippocratic Databases, in: Proceedings of the Very Large Data Base Conference, 2002, pp. 143–154 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of"the Very Large Data Base Conference |
|
4. R.J. Bayardo and R. Agrawal, Data Privacy through Optimal k-Anonymization, in: Proceed- ings of the IEEE International Conference on Data Engineering, 2005, pp. 217–228 |
Sách, tạp chí |
Tiêu đề: |
Proceed-"ings of the IEEE International Conference on Data Engineering |
|
5. J.W. Byun, A. Kamra, E. Bertino and N. Li, Efficient k-Anonymity using Clustering Tech- niques, in: Proceedings of Database Systems for Advanced Applications, 2006, pp. 188–200 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of Database Systems for Advanced Applications |
|
6. A. Campan and T.M. Truta, Extended P-Sensitive K-Anonymity, Studia Universitatis Babes- Bolyai Informatica 51(2) (2006), pp. 19–30 |
Sách, tạp chí |
Tiêu đề: |
Studia Universitatis Babes-"Bolyai Informatica |
Tác giả: |
A. Campan and T.M. Truta, Extended P-Sensitive K-Anonymity, Studia Universitatis Babes- Bolyai Informatica 51(2) |
Năm: |
2006 |
|
7. A. Campan, T.M. Truta, J. Miller and R.A. Sinca, Clustering Approach for Achieving Data Privacy, in: Proceedings of the International Data Mining Conference, 2007, pp. 321–327 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the International Data Mining Conference |
|
8. A. Campan and T.M. Truta, A Clustering Approach for Data and Structural Anonymity in Social Networks, in: Proceedings of the Privacy, Security, and Trust in KDD Workshop, 2008 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the Privacy, Security, and Trust in KDD Workshop |
|
9. D. Lambert, Measures of Disclosure Risk and Harm, Journal of Official Statistics 9 (1993), pp. 313–331 |
Sách, tạp chí |
Tiêu đề: |
Journal of Official Statistics |
Tác giả: |
D. Lambert, Measures of Disclosure Risk and Harm, Journal of Official Statistics 9 |
Năm: |
1993 |
|
10. K. LeFevre, D. DeWitt and R. Ramakrishnan, Incognito: Efficient Full-Domain K- Anonymity, in: Proceedings of the ACM SIGMOD, 2005, pp. 49–60 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the ACM SIGMOD |
|
11. K. LeFevre, D. DeWitt and R. Ramakrishnan, Mondrian Multidimensional K-Anonymity, in:Proceedings of the IEEE International Conference on Data Engineering, 2006, 25 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the IEEE International Conference on Data Engineering |
|
12. N. Li, T. Li and S. Venkatasubramanian, T-Closeness: Privacy Beyond k-Anonymity and l- Diversity, in: Proceedings of the IEEE International Conference on Data Engineering, 2007, pp. 106–115 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the IEEE International Conference on Data Engineering |
|
13. A. Machanavajjhala, J. Gehrke and D. Kifer, L-Diversity: Privacy beyond K-Anonymity, in:Proceedings of the IEEE International Conference on Data Engineering, 2006, 24 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the IEEE International Conference on Data Engineering |
|
14. J. Miller, A. Campan and T.M. Truta, Constrained K-Anonymity: Privacy with Generalization Boundaries, in: Proceedings of the Practical Preserving Data Mining Workshop, 2008 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the Practical Preserving Data Mining Workshop |
|
15. M.C. Mont, S. Pearson and R. Thyne, A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises, in: Proceedings of the Trust and Privacy in Dig- ital Business Conference, 2006, pp. 91–102 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the Trust and Privacy in Dig-"ital Business Conference |
|
18. P. Samarati, Protecting Respondents Identities in Microdata Release, IEEE Transactions on Knowledge and Data Engineering 13(6) (2001), pp. 1010–1027 |
Sách, tạp chí |
Tiêu đề: |
IEEE Transactions on"Knowledge and Data Engineering |
Tác giả: |
P. Samarati, Protecting Respondents Identities in Microdata Release, IEEE Transactions on Knowledge and Data Engineering 13(6) |
Năm: |
2001 |
|
19. L. Sweeney, k-Anonymity: A Model for Protecting Privacy, International Journal on Uncer- tainty, Fuzziness, and Knowledge-based Systems 10(5) (2002), pp. 557–570 |
Sách, tạp chí |
Tiêu đề: |
International Journal on Uncer-"tainty, Fuzziness, and Knowledge-based Systems |
Tác giả: |
L. Sweeney, k-Anonymity: A Model for Protecting Privacy, International Journal on Uncer- tainty, Fuzziness, and Knowledge-based Systems 10(5) |
Năm: |
2002 |
|
20. L. Sweeney, Achieving k-Anonymity Privacy Protection Using Generalization and Suppres- sion, International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems 10(5) (2002), pp. 571–588 |
Sách, tạp chí |
Tiêu đề: |
International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems |
Tác giả: |
L. Sweeney, Achieving k-Anonymity Privacy Protection Using Generalization and Suppres- sion, International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems 10(5) |
Năm: |
2002 |
|
21. T.M. Truta and V. Bindu, Privacy Protection: P-Sensitive K-Anonymity Property, in: Proceed- ings of the ICDE Workshop on Privacy Data Management, 2006, 94 |
Sách, tạp chí |
Tiêu đề: |
Proceed-"ings of the ICDE Workshop on Privacy Data Management |
|
16. MSNBC, Privacy Lost, 2006, Available online at http://www.msnbc.msn.com/id/15157222 |
Link |
|