[1] OH S,PARK S.Task-role based access control model[J].Information Systems,2014,28(6):533-562. [2] LONG Qin,LIU Peng,PAN Aimin.Research and implementation of an extended administrative role-based access control model[J].Journal of Computer Research and Development,2005,42(5):868-876.(in Chinese)龙勤,刘鹏,潘爱民.基于角色的扩展可管理访问控制模型研究与实现[J].计算机研究与发展,2005,42(5):868-876. [3] AGRAWAL C C,YU P S.Privacy-preserving data mining:models and algorithms[M].[S.1.]:Springer,2008. [4] FUNG B C M.Privacy-preserving data publishing[D].Vancouver,Canada:Simon Fraser University,2007. [5] FUNG B C M,WANG K,CHEN R,et al.Privacy-preserving data publishing:a survey on recent developments[J].ACM Computing Surveys,2010,42(4):14-53. [6] TORE D,REISS S P.Data-swapping:a technique for disclosure control(extended abstract)[C]//Proceedings of Section on Survey Research Methods American Statistical Association.Washington D.C.,USA:IEEE Press,1998:191-194. [7] EVMIFIEVSKI A.Randomization in privacy preserving data mining[J].ACM SIGKDD Explorations News Letter,2002,4(2):43-48. [8] OLIVEIRA S R M,ZAIANE O R.Privacy preservation clustering by data transformation[C]//Proceedings of the 18th Brazilian Symposium on Databases.Washington D.C.,USA:IEEE Press,2003:304-318. [9] OLIVEIRA S R M,ZAIANE O R.Privacy preservation when sharing data for clustering[C]//Proceedings of International Workshop on Secure Data Management in a Connected World.Washington D.C.,USA:IEEE Press,2004:67-82. [10] SAMARATI P,SWEENEY L.Protecting privacy when disclosing information:k-anonymity and its enforcement through generalization and suppresion[C]//Proceedingsof IEEE Symposium on Research in Security and Privacy.Washington D.C.,USA:IEEE Press,1998:384-393. [11] MACHANAVAJJHALA A,GEHRKE J,KIFER D.l-diversity:privacy beyond k-anonymity[C]//Proceedings of the 22nd International Conference on Data Engineering.Atlanta,USA:IEEE Press,2006:24-36. [12] LI Ninghui,LI Tiancheng,VENKATASUBRAMANIAN S.T-closeness:privacy k-anonymity and 1-diversity[C]//Proceedings of the 23rd ICDE'07.Washington D.C.,USA:IEEE Press,2007:106-115. [13] BYUN J W,SOHNY Y,BERTION E,et al.Secure anonymization for incremental datasets[C]//Proceedings of the 3rd VLDB Workshop on Secure Data Management.Berlin,Germany:Springer,2006:48-63. [14] YANG Xiaochun,WANG Yazhe,WANG Bin,et al.Privacy preserving approaches for multiple sensitive attributes in data publishing[J].Chinese Journal of Computers,2008,31(4):574-587.(in Chinese)杨晓春,王雅哲,王斌,等.数据发布中面向多敏感属性的隐私保护方法[J].计算机学报,2008,31(4):574-587. [15] LI Yanjun.Research on privacy preserving methods for multiple sensitive attributes based on attributes classification[D].Chongqing:Chongqing University,2013.(in Chinese)李艳军.基于属性分类的多敏感属性数据隐私保护方法研究[D].重庆:重庆大学,2013. [16] SAMARATI P,SWEENEY L.Generalizing data to provide anonymity when disclosing information(abstract)[C]//Proceedings of the 17th ACM-SIGMOD-SIGACT-SIGART Symposium on the Principles of Database Systems.New York,USA:ACM Press,1998:188-199. [17] QU Shiyan,JIANG Xinghao,SUN Tanfeng,et al.Purpose management-based privacy access control model for his[J].Computer Applications and Software,2011,28(3):74-76.(in Chinese)渠世艳,蒋兴浩,孙锬锋,等.基于目的管理的医疗信息系统隐私保护访问控制模型[J].计算机应用与软件,2011,28(3):74-76. [18] ZHANG Yiyuan.Analysis of assessment methods based on privacy preserving for data mining[D].Changchun:Jilin University,2012.(in Chinese)张苡源.应用面向数据挖掘的基于隐私保护的评估方法的分析[D].长春:吉林大学,2012. [19] XU Xinhui.Anonymization of set-valued data for privacy preserving data publishing[D].Shanghai:Shanghai Jiao Tong University,2013.(in Chinese)许信辉.隐私数据发布下的集合型数据匿名化保护方法[D].上海:上海交通大学,2013. [20] TONG Yunhai,TAO Youdong,TANG Shiwei,et al.Identity-reserved anonymity in privacy preserving data publishing[J].Journal of Software,2010,21(4):771-781.(in Chinese)童云海,陶有东,唐世渭,等.隐私保护数据发布中身份保持的匿名方法[J].软件学报,2010,21(4):771-781. [21] JIANG Baoyan.The design and implementation of the k-anonymity algorithm based on multi-attribute generalization[D].Dalian:Dalian University of Technology,2015.(in Chinese)姜宝彦.基于多属性泛化的k-匿名算法的设计与实现[D].大连:大连理工大学,2015. [22] HAO Zhifeng,WANG Riyu,CAI Ruichu,et al.Privacy data publishing method based on bayesian network and semantic tree[J].Computer Engineering,2019,45(4):124-129.(in Chinese)郝志峰,王日宇,蔡瑞初,等.基于贝叶斯网络与语义树的隐私数据发布方法[J].计算机工程,2019,45(4):124-129. [23] WANG Qun.Research on privacy-preservation anonymity method for data sharing[D].Harbin:Harbin Engineering University,2012.(in Chinese)王群.面向共享的数据隐私保护匿名方法研究[D].哈尔滨:哈尔滨工程大学,2012. |