期刊文献+

保护隐私的(L,K)-匿名 被引量:3

(L,K)-anonymity for privacy preserving
下载PDF
导出
摘要 提出了一种在K-匿名之上的(L,K)-匿名方法,用于对K-匿名后的数据进行保护,并给出了(L,K)-匿名算法。实验显示该方法能有效地消除K-匿名后秘密属性信息的泄漏,增强了数据发布的安全性。 A new privacy protection method beyond K-anonymity called (L,K) -anonymity. It was used to protect data after K-anonymity, and the algorithm of eliminate the information disclosure was provided. The experiments show that algorithms can eliminate the information disclosure after K-anonymity efficiently, and can enforce the data security.
出处 《计算机应用研究》 CSCD 北大核心 2008年第2期526-528,共3页 Application Research of Computers
基金 国家教育部科学技术研究重点项目(205014)
关键词 数据发布 隐私 K-匿名 信息泄漏 (L K)-匿名 data publishing privacy K-anonymity information disclosure (L,K) -anonymity
  • 相关文献

参考文献8

  • 1SWEENEY L. K-anonymity: a model for protecting privacy[ J]. Int' l Journal on Uncertainty, Fuzziness and Knowledge-based System, 2002,10(5) :557-570. 被引量:1
  • 2ADAM N R, WORTMAN J C. Security-control methods for statistical databases[J]. ACM Computing Surveys,1989,21 (4) :515-556. 被引量:1
  • 3MEYERSON A, WILLIAMS R. On the complexity of optimal K-anonymity[ C ]//Proc of the 23rd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. New York : [ s. n. ] ,2004 : 223-228. 被引量:1
  • 4SWEENEY L. Achieving K-anonymity privacy protection using generalization and suppression [ J ]. Int' l Journal on Uncertainty, Fuzziness and Knowledge-based Systems,2002,10(5) :571-588. 被引量:1
  • 5LeFEVRE K, DeWITr D, RAMAKRISHNAN R. Incognito: efficient full domain K-anonymity [ C ]//Proc of SIGMOD. 2005. 被引量:1
  • 6FUNG B C M, WANG K, YU P S. Top-down specialization for information and privacy preservation [ C ]//Proc of ICDE. 2005:205- 216. 被引量:1
  • 7AGGARWAL G , FEDER T, KENTHAPADI K, Anonymizing tables [ C ]//Proc of ICDT.2005:246-258. 被引量:1
  • 8MACHANAVAJJHALA A, GEHRKE J, KIFER D. I-diversity:privacy beyond K-anonymity [ EB/OL]. [ 2005 ]. http ://www. cs. cornell. edu/_mvnak. 被引量:1

同被引文献25

  • 1吴溥峰,张玉清.数据库安全综述[J].计算机工程,2006,32(12):85-88. 被引量:96
  • 2FUNG B C M, WANG Ke, CHEN Rui, et al. Privacy-preserving data publishing:A survey on recent developments[J]. ACM Computing Surveys (CSUR), 2010, 42(4):1-53. 被引量:1
  • 3SWEENEY L. K-anonymity:a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002,10(5):557-570. 被引量:1
  • 4SAMARATI P. Protecting respondents' identities in microdata release[J]. IEEE Transaetions. on Knowledge and Data Engineering, 2001, 13(6):1010-1027. 被引量:1
  • 5MACHANAVAJJHALA A, GEHRKE J, KIFER D, et al. L-diversity: privacy beyond K-anonymity[C]//Proceedings of the 22nd International Conference on Data Engineering. Piscataway:IEEE Computer Society, 2006:24-35. 被引量:1
  • 6Li Ninghui, Li Tiancheng. T-closeness:privacy beyond K-anonymity and l-diversity[C]//Proceedings of the 23rd International Conference on Data Engineering. Istanbul:IEEE Computer Society, 2007:106-115. 被引量:1
  • 7EMAM K E, DANKAR F K, ISSA R, et al. A globally optimal K-anonymity method for the de-identification of health data[J]. Journal of the American Medical Informatics Association, 2009, 16(5):670-682. 被引量:1
  • 8LEFEVRE K, DEWITT D J, RAMAKRISHNAN R. Incognito:eficient full-domain K-anonymity[C]//Proceedings of SIGMOD'05. Baltimore:ACM Press, 2005:49-60. 被引量:1
  • 9童云海, 陶有东, 唐世渭,等. 隐私保护数据发布中身份保持的匿名方法[J]. Journal of Software, 2010, 21(4):771-781. 被引量:1
  • 10WONG Chi-Wing, LI Jiuyong, FU Ada Wai-Chee, et al. (a,k)-anonymity:an enhanced K-anonymity model for privacy preserving[C]//Procession of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM Press, 2006. 被引量:1

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部