Checking for k-Anonymity Violation by Views
暂无分享,去创建一个
[1] Christos H. Papadimitriou,et al. Approximability and completeness in the polynomial hierarchy , 2000 .
[2] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[3] Dan Suciu,et al. Asymptotic Conditional Probabilities for Conjunctive Queries , 2005, ICDT.
[4] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[5] Bart Kuijpers,et al. Introduction to constraint databases , 2002, SGMD.
[6] Dan Suciu,et al. A formal analysis of information disclosure in data exchange , 2004, SIGMOD '04.
[7] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[8] Pierangela Samarati,et al. Generalizing Data to Provide Anonymity when Disclosing Information , 1998, PODS 1998.
[9] Sushil Jajodia,et al. Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures , 2000, IEEE Trans. Knowl. Data Eng..
[10] S. Sudarshan,et al. Extending query rewriting techniques for fine-grained access control , 2004, SIGMOD '04.
[11] Adam Meyerson,et al. On the complexity of optimal K-anonymity , 2004, PODS.
[12] Roberto J. Bayardo,et al. Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).
[13] Alin Deutsch,et al. Privacy in Database Publishing , 2005, ICDT.