参考文献
[1]SAMARATI P,SWEENEY L.Generalizing Data to Provide Anonymity When Disclosing Information[C]//Proceedings of the 17th ACM Sigact-Sigmod-Sigart Symposium on Principles of Database Systems.New York,USA:ACM Press,1998:188.
[2]SWEENEY L.Achieving k-anonymity Privacy Protection Using Generalization and Suppression[J].International Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):571-588.
[3]SWEENEY L.k-anonymity:A Model for Protecting Privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(2):557-570.
[4]TRUTA T M,VINAY B.Privacy Protection p-sensitive k-anonymity Property[C]//Proceedings of the 22nd International Conference on Data Engineering Workshops.Washington D.C.,USA:IEEE Press,2006:94.
[5]MACHANAVAJJHALA A,KIFER D,GEHRKE J.l-diversity:Privacy Beyond k-anonymity[C]//Proceedings of the 22nd International Conference on Data Engineering Workshop.Washington D.C.,USA:IEEE Press,2006:24-35.
[6]WONG R C,LI Jiuyong,FU A W,et al.(α,k) -anonymity:An Enhanced k-anonymity Model for Privacy-preserving Data Publishing[C]//Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York,USA:ACM Press,2006:754-759.
[7]LI N H,LI T C,VENKATASUBRAMANIAN S.t-closeness-privacy Beyond k-anonymity and l-diversity[C]//Proceedings of the 23rd International Conference on Data Engineering.Washington D.C.,USA:IEEE Press,2007:106-115.
[8]黄石平,顾金媛.一种基于(p~+,α)-敏感k-匿名的增强隐私保护模型[J].计算机应用研究,2014,31(11):3465-3468.
[9]谭瑛.数据挖掘中匿名化隐私保护研究进展[J].科技导报,2013,31(1):75-79.
[10]韩建民,于娟,慧群,等.面向敏感值的个性化隐私保护[J].电子学报,2010,38(7):1723-1728.
[11]钟浙云,韩建民,王海元,等.抵制敏感属性近似攻击的(k,l,e)-匿名模型[J].小型微型计算机系统,2014,35(7):1491-1495.
[12]LIU Junqiang,WANG Ke.Enforcing Vocabulary k-anonymity by Semantic Similarity Based Clustering[C]//Proceedings of IEEE International Conference on ICDM.Washington D.C.,USA:IEEE Press,2010:899-904.
[13]HAN Jianmin,YU Juan,MO Yuchang,et al.MAGE:A Semantics Retaining k-anonymization Method for Mixed Data[J].Knowledge-based Systems,2014,55:75-86.
[14]FUNG B,WANG Ke,CHEN Rui,et al.Privacy-preserving Data Publishing:A Survey of Recent Developments[J].ACM Computing Surveys,2010,42(4):1-53.
[15]王海元.抵制近似攻击的微数据发布隐私保护匿名模型及算法研究[D].杭州:浙江师范大学,2014.
[16]岑婷婷,韩建民,王基一,等.隐私保护中K-匿名模型的综述[J].计算机工程与应用,2008,44(4):130-134.
[17]于娟,韩建民,郭腾芳,等.基于聚类的高效k-匿名化算法[J].计算机研究与发展,2009,46(s2):480-486.
[18]岑婷婷.数据表匿名化的微聚集算法的研究[D].杭州:浙江师范大学,2009.
[19]LI Jiuyong,WONG R C W,FU A W C,et al.Achieving k-anonymity by Clustering in Attribute Hierarchical Structure[M].Berlin,Germany:Springer,2006.
[20]柴瑞敏,冯慧慧.基于聚类的高效(K,L)-匿名隐私保护[J].计算机工程,2015,41(1):139-142.
[21]王平水,王建东.一种基于聚类的个性化(l,c)-匿名算法[J].计算机工程与应用,2012,48(23):16-20.
编辑顾逸斐 |