[1] |
周水庚, 李 丰, 陶宇飞, 等. 面向数据库应用的隐私保护研究综述[J]. 计算机学报, 2009, 32(5): 847-860. |
[2] |
黄春梅, 费耀平, 李 敏, 等. 基于多维泛化路径的k-匿名算 法[J].计算机工程.2009, 35(2):154-156 浏览 |
[3] |
Fung B C M, Wang Ke, Chen Rui, et al. Privacy-preserving Data Publishing: A Survey on Recent Developments[J]. ACM Computing Surveys, 2010, 42(4): 1-55. |
[4] |
Meyerson A, Williams R. On the Complexity of Optimal k- anonymity[C]//Proc. of the 23rd ACM Symposium on Principles of Database Systems. Paris, France: ACM Press, 2004: 223-228. |
[5] |
Machanavajjhala A, Gehrke J, Kifer D, et al. L-diversity: Privacy Beyond k-anonymity[C]//Proc. of the 22nd International Conference on Data Engineering. Atlanta, Georgia, USA: IEEE Press, 2006: 24-36. |
[6] |
Wong R C, Li Jiuyong, Fu A W, et al. (α, k)-anonymous Data Publishing[J].Journal of Intelligent Information Systems.2009, 33(2):209-234 |
[7] |
Li Ninghui, Li Tiancheng, Venkatasubramanian S. T-closeness: Privacy Beyond k-anonymity and L-diversity[C]//Proc. of the 23rd International Conference on Data Engineering. Istanbul, Turkey: IEEE Press, 2007: 44-56. |
[8] |
韩建民, 岑婷婷, 虞慧群. 数据表k-匿名化的微聚集算法研 究[J]. 电子学报, 2008, 36(11): 2021-2029. |
[9] |
Han Jianmin, Yu Huiqun, Yu Juan. An Improved L-diversity Model for Numerical Sensitive Attributes[C]//Proc. of the 3rd International Conference on Communications and Networking in China. Hangzhou, China: [s. n.], 2008: 938-943. |
[10] |
Xiao Xiaokui, Tao Yufei. Anatomy: Simple and Effective Privacy Preservation[C]//Proc. of the 32nd International Conference on Very Large Data Bases. Seoul, Korea: [s. n.], 2006: 139-150. |
[11] |
LeFevre K, DeWitt D J, Ramakrishnan R. Incognito: Efficient Full-domain k-anonymity[C]//Proc. of SIGMOD’05. Baltimore, Maryland, USA: ACM Press, 2005: 49-60. |
|