参考文献
[1] 陈晓明, 李军怀, 彭 军, 等. 隐私保护数据挖掘算法综 述[J]. 计算机科学, 2007, 34(6): 183-186.
[2] 杨高明, 杨 静, 张健沛. 隐私保护的数据发布研究[J]. 计算机科学, 2011, 38(9): 11-17.
[3] Fung B C M, Wang Ke, Chen Rui, et al. Privacy-preserving Data Publishing: A Survey of Recent Developments[J]. ACM Computing Surveys, 2010, 42(4): 1-55.
[4] Sweeney L. k-anonymity: A Model for Protecting Privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge- based Systems, 2002, 10(5): 557-570.
[5] Chen R, Mohammed N, Fung B C M, et al. Publishing Set- valued Data via Differential Privacy[J]. Proceedings of the VLDB Endowment, 2011, 4(11): 1087-1098.
[6] He Y, Naughton J F. Anonymization of Set-valued Data via Top-down, Local Generalization[J]. Proceedings of the VLDB Endowment, 2009, 2(1): 934-945.
[7] Xu Y, Wang K, Fu A W C, et al. Anonymizing Transaction Databases for Publication[C]//Proceedings of SIGKDD’08. New York, USA: ACM Press, 2008.
[8] Cao J, Karras P, Ra?ssi C, et al. ρ-uncertainty: Inference-proof Transaction Anonymization[J]. Proceedings of the VLDB Endowment, 2010, 3(1): 1033-1044.
[9] Iyengar V S. Transforming Data to Satisfy Privacy Con- straints[C]//Proceedings of ACM SIGKDD’02. New York, USA: ACM Press, 2002.
[10] Xu Jian, Wang Wei, Pei Jian, et al. Utility-based Anonymi- zation Using Local Recoding[C]//Proceedings of ACM SIGKDD’06. New York, USA: ACM Press, 2006.
[11] Atallah M, Bertino E, Elmagarmid A, et al. Disclosure Limitation of Sensitive Rules[C]//Proceedings of Workshop on Knowledge and Data Engineering Exchange. Washington D. C., USA: [s. n.], 1999.
[12] Zheng Z, Kohavi R, Mason L. Real World Performance of Association Rule Algorithms[C]//Proceedings of ACM SIGKDD’01. New York, USA: ACM Press, 2001.
编辑 金胡考 |