参考文献
[1]孟小峰,慈祥.大数据管理:概念、技术与挑战[J].计算机研究与发展,2013,50(1):146-169.
[2]李书宁.用户情景敏感数字信息服务的概念模型[J].图书情报工作,2011,55(7):45-49.
[3]Sweeney L.k-anonymity:A Model for Protecting Privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):557-570.
[4]Machanavajjhala A,Kifer D,Gehrkeetc J,et al.L-diversity:Privacy Beyond k-anonymity[C]//Proceed-ings of the 22nd International Conference on Data Engineering.New York,USA:ACM Press,2006.
[5]Wong R,Li Jiuyong,Fu A,et al.(α,k)-anonymous Data Publishing[J].Journal of Intelligent Information Systems,2009,33(2):209-234.
[6]Meyerson A,Williams R.On the Complexity of Optimal k-anonymity[C]//Proceedings of the 23rd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems.New York,USA:ACM Press,2004:223-228.
[7]Samarati I P,Sweeney L.Generalizing Data to Provide Anonymity when Disclosing Information[C]//Proceed-ings of the 17th ACM SIGACT-SIGMODSIGART Symposium on Principles of Database Systems.New York,USA:ACM Press,1998:188.
(下转第301页)
(上接第294页)
[8]Wang Ke,Benjamin C,Yu P S.Handicapping Attacker’s Confidence:An Alternative to k-anonymi-zation[J].Knowledge and Information Systems,2007,11(3):345-368.
[9]Xiao Xiaokui,Tao Yufei.Anatomy:Simple and Effective Privacy Preservation[C]//Proceedings of the 32nd International Conference on Very Large Data Bases.New York,USA:ACM Press,2006:139-150.
[10]童云海,陶有东,唐世渭,等.隐私保护数据发布中身份保持的匿名方法[J].软件学报,2010,21(4):771-781.
[11]Tao Yufei,Chen Hekang,Xiao Xiaokui.ANGEL:Enhancing the Utility of Generalization for Privacy Preserving Publication[J].IEEE Transactions on Know-ledge and Data Engineering,2009,21(7):1073-1087.
[12]夏赞珠,韩建民,于娟,等.用于实现(k,e)-匿名模型的MDAV算法[J].计算机工程,2010,36(15):159-161.
[13]韩建民,岑婷婷,虞慧群.数据表k-匿名化的微聚集算法研究[J].电子学报,2008,36(10):2021-2029.
[14]Sweeney L.Achieving k-anonymity Privacy Protection Using Generalization and Suppression[J].International Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):571-588.
[15]Ferrer D,Mateo-Sanz J M.Practical Data-oriented Micro-aggregation for Statistical Disclosure Control[J].IEEE Transactions on Knowledge and Data Engineering,2002,14(1):189-201.
[16]钱然.实现(α,k)-匿名模型的MDAV算法[J].电子制作,2013(5):110.
[17]杨静,赵家石,张健沛.一种面向高维数据挖掘的隐私保护方法[J].电子学报,2013,41(11):2187-2192.
编辑顾逸斐 |