Deanonymisation in Linked Data: A research roadmap
暂无分享,去创建一个
David E. Millard | Nigel Shadbolt | Kieron O'Hara | Dalal Al-Azizy | K. O’Hara | N. Shadbolt | D. Millard | Dalal Al-Azizy
[1] Xiangtao Li,et al. Structural Attack to Anonymous Graph of Social Networks , 2013 .
[2] Paul Ohm. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .
[3] Sören Auer,et al. The emerging web of linked data , 2011, ISWSA '11.
[4] Serena Villata,et al. An Access Control Model for Linked Data , 2011, OTM Workshops.
[5] Stefan Decker,et al. An Access Control Framework for the Web of Data , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[6] Hugh Glaser,et al. Managing Co-reference on the Semantic Web , 2009, LDOW.
[7] Benjamin Greschbach,et al. The devil is in the metadata — New privacy challenges in Decentralised Online Social Networks , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.
[8] Kieron O'Hara,et al. Transparent government, not transparent citizens: a report on privacy and transparency for the Cabinet Office , 2011 .
[9] Ming Gu,et al. A Brief Survey on De-anonymization Attacks in Online Social Networks , 2010, 2010 International Conference on Computational Aspects of Social Networks.
[10] Christian Bizer,et al. The Emerging Web of Linked Data , 2009, IEEE Intelligent Systems.
[11] Patricia Serrano-Alvarado,et al. Personal Linked Data: A Solution to Manage User's Privacy on the Web , 2013 .
[12] Yanchun Zhang,et al. On the identity anonymization of high‐dimensional rating data , 2012, Concurr. Comput. Pract. Exp..
[13] Mats Carlsson,et al. Constraint Programming in Sweden , 2009, IEEE Intelligent Systems.
[14] Elaine Shi,et al. Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge , 2011, The 2011 International Joint Conference on Neural Networks.
[15] Jens Lehmann,et al. Introduction to Linked Data and Its Lifecycle on the Web , 2013, Reasoning Web.
[16] Martin M. Merener. Theoretical Results on De-Anonymization via Linkage Attacks , 2012, Trans. Data Priv..
[17] Stefan Decker,et al. Privacy Concerns of FOAF-Based Linked Data , 2009, SPOT@ESWC.
[18] Huajun Chen,et al. The Semantic Web , 2011, Lecture Notes in Computer Science.
[19] Zoltán Alexin. Does fair anonymization exist? , 2014 .
[20] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[21] Ian Horrocks,et al. Reasoning Web. Semantic Technologies for Intelligent Data Access , 2013, Lecture Notes in Computer Science.
[22] Les Carr,et al. A Research Agenda for Linked Closed Data , 2011 .
[23] James A. Hendler,et al. The Semantic Web" in Scientific American , 2001 .