Outsourcing privacy-preserving social networks to a cloud
暂无分享,去创建一个
Jie Wu | Feng Li | Qin Liu | Guojun Wang | Shuhui Yang | Jie Wu | Feng Li | Guojun Wang | Qin Liu | Shuhui Yang
[1] Jon M. Kleinberg,et al. Wherefore art thou R3579X? , 2011, Commun. ACM.
[2] Xiaowei Ying,et al. On link privacy in randomizing social networks , 2010, Knowledge and Information Systems.
[3] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[4] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[5] David D. Jensen,et al. Accurate Estimation of the Degree Distribution of Private Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[6] Alina Campan,et al. A Clustering Approach for Data and Structural Anonymity in Social Networks , 2008 .
[7] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[8] R. Rothenberg,et al. Risk network structure in the early epidemic phase of HIV transmission in Colorado Springs , 2002, Sexually transmitted infections.
[9] Siddharth Srivastava,et al. Anonymizing Social Networks , 2007 .
[10] Philip S. Yu,et al. Privacy-preserving social network publication against friendship attacks , 2011, KDD.
[11] Marco Gori,et al. A unified probabilistic framework for Web page scoring systems , 2004, IEEE Transactions on Knowledge and Data Engineering.
[12] Jian Pei,et al. A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.
[13] Tom A. B. Snijders,et al. Social Network Analysis , 2011, International Encyclopedia of Statistical Science.
[14] Marco Gori,et al. Exact and approximate graph matching using random walks , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[15] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.
[16] Lei Zou,et al. DistanceJoin: Pattern Match Query In a Large Graph Database , 2009, Proc. VLDB Endow..
[17] Lise Getoor,et al. Link mining: a survey , 2005, SKDD.
[18] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[19] Lise Getoor,et al. Preserving the Privacy of Sensitive Relationships in Graph Data , 2007, PinKDD.
[20] Jeffrey Xu Yu,et al. Neighborhood-privacy protected shortest distance computing in cloud , 2011, SIGMOD '11.
[21] Jia Liu,et al. K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.
[22] Lei Zou,et al. K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..
[23] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.