Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference26 articles.
1. Aiswarya R, Divya R, Sangeetha D, Vaidehi V (2013) Harnessing healthcare data security in cloud. ICRTIT
2. Logeswari G, Sangeetha D, Vaidehi V (2014) A cost effective clustering based anonymization approach for storing PHR’s in cloud. In: International Conference on Recent Trends in Information Technology
3. Sweeney L (2002) k-Anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(5):557–570
4. Terrovitis M, Mamoulis N, Kalnis P (2008) Privacy-preserving anonymization of set-valued data. In: Proc. International Conference on Very Large Data Bases (VLDB), pp 115–125
5. Wong RC-W, Fu AW-C, Wang K, Pei J (2007) Minimality attack in privacy preserving data publishing. In: Proc. International Conference on Very Large Data Bases (VLDB), pp 543–554
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献