A reciprocal framework for spatial K-anonymity
暂无分享,去创建一个
Panos Kalnis | Dimitris Papadias | Gabriel Ghinita | Keliang Zhao | Panos Kalnis | D. Papadias | Gabriel Ghinita | Keliang Zhao
[1] Marco Gruteser,et al. Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[2] Hanan Samet,et al. The Design and Analysis of Spatial Data Structures , 1989 .
[3] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[4] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[5] Samir Khuller,et al. Achieving anonymity via clustering , 2006, PODS '06.
[6] Yufei Tao,et al. Anatomy: simple and effective privacy preservation , 2006, VLDB.
[7] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[8] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[9] D. DeWitt,et al. K-Anonymization as Spatial Indexing: Toward Scalable and Incremental Anonymization , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[10] Arthur R. Butz,et al. Alternative Algorithm for Hilbert's Space-Filling Curve , 1971, IEEE Transactions on Computers.
[11] Yufei Tao,et al. Historical spatio-temporal aggregation , 2005, TOIS.
[12] David J. DeWitt,et al. Mondrian Multidimensional K-Anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[13] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[14] Sushil Jajodia,et al. Protecting Privacy Against Location-Based Personal Identification , 2005, Secure Data Management.
[15] Panos Kalnis,et al. Fast Data Anonymization with Low Information Loss , 2007, VLDB.
[16] Marco Gruteser,et al. USENIX Association , 1992 .
[17] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[18] Qing Zhang,et al. Aggregate Query Answering on Anonymized Tables , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[19] David J. DeWitt,et al. Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.
[20] Panos Kalnis,et al. PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.
[21] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[22] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[23] Haibo Hu,et al. Range Nearest-Neighbor Query , 2006, IEEE Trans. Knowl. Data Eng..
[24] Hans-Peter Kriegel,et al. The R*-tree: an efficient and robust access method for points and rectangles , 1990, SIGMOD '90.
[25] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[26] Yu Zhang,et al. Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.
[27] Jian Pei,et al. Utility-based anonymization using local recoding , 2006, KDD '06.
[28] Pierangela Samarati,et al. Location privacy in pervasive computing , 2008 .
[29] Mario A. López,et al. STR: a simple and efficient algorithm for R-tree packing , 1997, Proceedings 13th International Conference on Data Engineering.
[30] Chi-Yin Chow,et al. Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.
[31] D. J. Abel,et al. A B+-tree structure for large quadtrees , 1983, Comput. Vis. Graph. Image Process..
[32] Cyrus Shahabi,et al. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , 2007, SSTD.
[33] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[34] Liang Zhang,et al. Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.
[35] Roberto J. Bayardo,et al. Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).
[36] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).