Providing privacy preserving in Cloud computing
暂无分享,去创建一个
Yan Zhao | Jiajin Le | Shuo Jiang | Jian Wang | Jian Wang | Shuo Jiang | Jiajin Le | Yan Zhao
[1] Wenjing Lou,et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, INFOCOM.
[2] Roberto J. Bayardo,et al. Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).
[3] Yufei Tao,et al. Anatomy: simple and effective privacy preservation , 2006, VLDB.
[4] Wenjing Lou,et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.
[5] David J. DeWitt,et al. Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.
[6] Panos Kalnis,et al. Fast Data Anonymization with Low Information Loss , 2007, VLDB.
[7] Yufei Tao,et al. Personalized privacy preservation , 2006, Privacy-Preserving Data Mining.
[8] Qing Zhang,et al. Aggregate Query Answering on Anonymized Tables , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[9] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[10] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[11] Charu C. Aggarwal,et al. On k-Anonymity and the Curse of Dimensionality , 2005, VLDB.
[12] Panos Kalnis,et al. Privacy-preserving anonymization of set-valued data , 2008, Proc. VLDB Endow..
[13] Chris Clifton,et al. Hiding the presence of individuals from shared databases , 2007, SIGMOD '07.