期刊文献+

支持信息共享的有效的安全数据发布算法 被引量:1

原文传递
导出
摘要 在许多数据共享的应用中,要求发布的共享信息可以保护个体的敏感信息,例如,患者的疾病、客户的信誉等级、雇员的工资等涉及个人隐私的信息.同时,另一些信息也需要被共享.文中考虑了数据发布应用中同时存在的信息保护与信息共享问题.攻击者能够使用发布的信息以很高的置信度推断出敏感数据的真实值.目的是防止在发布数据上利用关联规则进行数据推演.对攻击框架进行了形式化定义,并研究了复杂性问题.证明了计算安全的可发布数据表的计算复杂性为NP难.根据信息发布的要求对问题进行了分类,提出了相应的计算安全可发布数据表的算法.基于实际数据集的实验分析表明所提出的算法可以产生近似最多的发布数据,并且改善了现有算法的运算效率.
出处 《中国科学(F辑:信息科学)》 CSCD 2009年第8期799-808,共10页
基金 国家自然科学基金(批准号:60828004 60503036) 教育部新世纪优秀人才支持计划(批准号:NCET-06-0290) 霍英东教育基金会青年教师基金优选资助课题(批准号:104027)资助项目
  • 相关文献

参考文献24

  • 1ZHANG Hong,HE YePing,SHI ZhiGuo.A formal model for access control with supporting spatial context[J].Science in China(Series F),2007,50(3):419-439. 被引量:7
  • 2Sweeney L.Datafly:A system for providing anonymity in medical data. Database SecurtyⅪ: Status and Prospects,IFIP TC11 WG11.3 Eleventh International Conference on Database Security(DBSec),IFIP Conference Proceedings . 1997 被引量:1
  • 3Meyerson A,Williams R.On the complexity of optimal k-anonymity. Proceedings of the Twenty-third ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems(PODS) . 2004 被引量:1
  • 4Atallah M,Bertino E,Elmagarmid A,et al.Disclosure limitation of sensitive rules. Proceedings of 1999 IEEE Knowledge and Data Engineering Exchange Workshop(KDEX‘99) . 1999 被引量:1
  • 5Brodskyand A,Farkas C,Jajodia S.Secure databases:Constraints,inference channels,and monitoring disclosures. IEEE Trans Knowl Data En . 2000 被引量:1
  • 6Hochbaum D S.Approximation Algorithms for NP-Hard Problems. . 1997 被引量:1
  • 7Sweeney L.K-anonymity: a model for protecting privacy. International Journal on Uncertainty,Fuzziness and Knowledge-Based Systems . 2002 被引量:1
  • 8Agrawal R,Srikant R.Privacy-preserving data mining. Proceedings of the 2000 ACM SIGMOD Conference on Management of Data . 2000 被引量:1
  • 9Damiani E,di Vimercati S D,Paraboschi S,et al.Design and implementation of an access control processor for XML documents. Computer Networks . 2000 被引量:1
  • 10Agrawal R,Srikant R.Fast Algorithms for Mining Association Rules. Proceedings of the 20th International Conference on Very Large Databases(VLDB’94) . 1994 被引量:1

二级参考文献30

  • 1[1]Sandhu R,Coyne E,Feinstein H,et al.Role base access control models.IEEE Comp,1996,29(2):38-47 被引量:1
  • 2[2]Ferraolo D,Sandhu R,Gavrila S,et al.Proposed NIST standard for role-based access control.ACM Trans Inf Syst Sec,2001,4(3):224-274 被引量:1
  • 3[3]Covington M,Long W,Srinivasan S,et al.Securing context-aware applications using environment roles.In:Proceedings of the 6th ACM Symposium on Access Control Models and Technologies.New York:ACM Press,2001.10-20 被引量:1
  • 4[4]Cuppens F,Miège A.Modelling contexts in the Or-BAC model.In:Proceedings of the 19th Annual Computer Security Applications Conference.Washington:IEEE Computer Society Press,2003.416-427 被引量:1
  • 5[5]Wilikens M,Feriti S,Sanna A,et al.A context-related authorization and access control method based on RBAC:A case study from the health care domain.In:Proceedings of the 7th ACM Symposium on Access Control Models and Technologies.New York:ACM Press,2002.117-124 被引量:1
  • 6[6]Georgiadis C,Mavridis I,Pangalos G,et al.Flexible team-based access control using contexts.In:Proceedings of 6th ACM symposium on Access Control Models and Technologies.New York:ACM Press,2001.21 -27 被引量:1
  • 7[7]Thomas R.Team-based access control (TMAC):A primitive for applying role-based access controls in collaborative environments.In:Proceedings of 2nd ACM Workshop on Role-based Access Control.New York:ACM Press,1997.13-19 被引量:1
  • 8[8]Wolf R,Keinz T,Schenider M.A model for context-dependent access control for web-based services with role-based approach.In:Proceedings of 14th International Workshop on Database and Expert Systems Applications.Washington:IEEE Computer Society Press,2003.209-214 被引量:1
  • 9[9]Kumar A,Karnik N,Chafle G.Context sensitivity in role-based access control.ACM SIGPOS Op Syst Rev,2002,36(3):53-66 被引量:1
  • 10[10]Covington M,Moyer M,Ahamad M.Generalized role-based access control for securing future applications.In:Proceedings of 23rd National Information Systems Security Conference.Washington:IEEE Computer Society,2003.416-427 被引量:1

共引文献6

同被引文献3

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部