An Upper-Bound Control Approach for Cost-Effective Privacy Protection of Intermediate Dataset Storage in Cloud
暂无分享,去创建一个
Jinjun Chen | Chang Liu | Xuyun Zhang | Wan-Chun Dou | Xuyun Zhang | Chang Liu | Jinjun Chen | Wanchun Dou
[1] Xiao Liu,et al. A cost-effective strategy for intermediate data storage in scientific cloud workflow systems , 2010, 2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS).
[2] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[3] Paul T. Groth,et al. Metadata and provenance management , 2010, Scientific Data Management.
[4] Yufei Tao,et al. Anatomy: simple and effective privacy preservation , 2006, VLDB.
[5] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[6] Yufei Tao,et al. M-invariance: towards privacy preserving re-publication of dynamic datasets , 2007, SIGMOD '07.
[7] Wenliang Du,et al. Deriving private information from randomized data , 2005, SIGMOD '05.
[8] Vitaly Shmatikov,et al. Airavat: Security and Privacy for MapReduce , 2010, NSDI.
[9] Debmalya Panigrahi,et al. Preserving Module Privacy in Workflow Provenance , 2010, ArXiv.
[10] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[11] Shankar Pasupathy,et al. Maximizing Efficiency by Trading Storage for Computation , 2009, HotCloud.
[12] Thomas M. Cover,et al. Elements of Information Theory: Cover/Elements of Information Theory, Second Edition , 2005 .
[13] Xiao Liu,et al. Concurrency and Computation: Practice and Experience a Data Dependency Based Strategy for Intermediate Data Storage in Scientific Cloud Workflow Systems ‡ , 2022 .
[14] Miron Livny,et al. The cost of doing science on the cloud: The Montage example , 2008, 2008 SC - International Conference for High Performance Computing, Networking, Storage and Analysis.
[15] Dr B Santhosh Kumar Santhosh Balan,et al. Closeness : A New Privacy Measure for Data Publishing , 2022 .
[16] Wenliang Du,et al. Privacy-MaxEnt: integrating background knowledge in privacy quantification , 2008, SIGMOD Conference.
[17] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[18] Benjamin C. M. Fung,et al. Anonymizing sequential releases , 2006, KDD '06.
[19] Xiao Liu,et al. A Local-Optimisation Based Strategy for Cost-Effective Datasets Storage of Scientific Applications in the Cloud , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[20] Wenliang Du,et al. Understanding Privacy Risk of Publishing Decision Trees , 2010, DBSec.
[21] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[22] David J. DeWitt,et al. Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.
[23] Wenliang Du,et al. Inference Analysis in Privacy-Preserving Data Re-publishing , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[24] Hang Lau,et al. A Java Library of Graph Algorithms and Optimization (Discrete Mathematics and Its Applications) , 2006 .
[25] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[26] Sanjeev Khanna,et al. On provenance and privacy , 2010, ICDT '11.
[27] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.