Tuning anonymity level for assuring high data quality: an empirical study.
暂无分享,去创建一个
[1] Charles P. Pfleeger,et al. Security in computing , 1988 .
[2] Rafael Accorsi,et al. Personalization in privacy-aware highly dynamic systems , 2006, CACM.
[3] Brian Subirana,et al. Legal programming , 2004, CACM.
[4] Vijay S. Iyengar,et al. Transforming data to satisfy privacy constraints , 2002, KDD.
[5] Mare Langheinrich,et al. Personal privacy in ubiquitous computing: Tools and system support , 2005 .
[6] Beng Chin Ooi,et al. Privacy and ownership preserving of outsourced medical data , 2005, 21st International Conference on Data Engineering (ICDE'05).
[7] Roberto J. Bayardo,et al. Technological Solutions for Protecting Privacy , 2003, Computer.
[8] Philip S. Yu,et al. Bottom-up generalization: a data mining solution to privacy protection , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[9] Ramakrishnan Srikant,et al. Hippocratic Databases , 2002, VLDB.
[10] Ueli Maurer. The role of cryptography in database security , 2004, SIGMOD '04.
[11] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[12] Philip S. Yu,et al. Top-down specialization for information and privacy preservation , 2005, 21st International Conference on Data Engineering (ICDE'05).
[13] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[14] Douglas C. Schmidt,et al. Ultra-large-scale systems , 2006, OOPSLA '06.