Attribute-oriented Granulation for Privacy Protection
暂无分享,去创建一个
[1] Tsan-sheng Hsu,et al. Medical privacy protection based on granular computing , 2004, Artif. Intell. Medicine.
[2] David J. DeWitt,et al. Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.
[3] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[4] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[5] Janusz Zalewski,et al. Rough sets: Theoretical aspects of reasoning about data , 1996 .
[6] Tsan-sheng Hsu,et al. A Logical Model for Privacy Protection , 2001, ISC.
[7] Vijay S. Iyengar,et al. Transforming data to satisfy privacy constraints , 2002, KDD.
[8] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[9] Moshe Sipper,et al. Evolutionary computation in medicine: an overview , 2000, Artif. Intell. Medicine.
[10] Ton de Waal,et al. Statistical Disclosure Control in Practice , 1996 .
[11] Josep Domingo-Ferrer,et al. Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation , 2005, Data Mining and Knowledge Discovery.
[12] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..