Author:
Sun Yan,Yin Lihua,Liu Licai,Xin Shuang
Publisher
Springer Science and Business Media LLC
Subject
Management Science and Operations Research,Computer Science Applications,Hardware and Architecture
Reference17 articles.
1. Samarati P, Sweeney L (1998) Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Technical Report SRI-CSL-98-04
2. Machanavajjhala A, Gehrke J, Venkitasubramaniam M (2006) l-diversity: privacy beyond k-anonymity, In: Proceedings of ICDE
3. Li N, Li T, Venkatasubramanian S (2007) t-Closeness: privacy beyond k-anonymity and l-Diversity. In: Proceedings of ICDE, pp 106–115
4. Wong RC, Li J, Fu AW et a1 (2006) (α, k)-Anonymity:an enhanced k-anonymity model for privacy-preserving data publishing. In: Proceedings of the 12th ACM SIGKDD, ACM Press, New York, pp 754–759
5. Terrovitis M, Mamoulis N, Kalnis P (2008), Privacy preserving anonymization of set-valued data. In: VLDB, pp 115–125
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献