[1] Samarati P,Sweeney L.Generalizing Data to Provide Anonymity When Disclosing Information[C]//Proceedings of the 17th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems.New York,USA:ACM Press,1998:188. [2] Sweeney L.K-anonymity:A Model for Protecting Pri-vacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):557-570. [3] Machanavajjhala A,Gehrke J,Kifer D.I-diversity:Privacy Beyond k-anonymity[J].ACM Transactions on Knowledge Discovery from Data,2007,1(1):24-35. [4] Wong R,Li J,Fu A,et al.(α,k)-anonymity:An Enhanced k-anonymity Model for Privacy Preserving Data Publishing[C]//Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York,USA:ACM Press,2006:754-759. [5] Traian T M,Bndu V.Privacy Protection:p-sensitive k-anonymity Property[C]//Proceedings of the 22nd Inter-national Conference on Data Engineering Workshops.Washington D.C.,USA:IEEE Computer Society,2006:94-103. [6] Xiao Xiaokui,Tao Yufei.Personalized Privacy Preserva-tion[C]//Proceedings of ACM SIGMOD Conference on Management of Data.Chicago,USA:ACM Press,2006:229-240. [7] 王 波,杨 静.数据发布中的个性化隐私匿名技术研究[J].计算机科学,2012,39(4):168-171. [8] 韩建民,于 娟,虞慧群,等.面向敏感值的个性化隐私保护[J].电子学报,2010,38(7):1723-1728. [9] 王 波,杨 静.一种基于逆聚类的个性化隐私匿名方法[J].电子学报,2012,40(5):883-890. [10] 周水庚,李 丰,陶宇飞,等.面向数据库应用的隐私保护研究综述[J].计算机学报,2009,32(5):847-858. [11] 王平水,王建东.匿名化隐私保护技术研究进展[J].计算机应用研究,2010,27(6):2016-2019. [12] 朱 拯,王智慧,汪 卫.基于个人隐私约束的k-匿名模型[J].计算机研究与发展,2010,47(21):271-278. [13] 王智慧,许 俭,汪 卫,等.一种基于聚类的数据匿名方法[J].软件学报,2010,21(4):680-693. |