共 30 条
[11]
Sweeney L., Achieving k-anonymity privacy protection using generalization and suppression, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10, 5, pp. 571-588, (2002)
[12]
Wong R.C.W., Li J., Fu A.W.C., Et al., (α, k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing, Proc of the 12th Int Conf on Knowledge Discovery and Data Mining, pp. 754-759, (2006)
[13]
Xiao X., Tao Y., Personalized privacy preservation, Proc of the 2006 Int Conf on Management of Data, pp. 229-240, (2006)
[14]
Machanavajjhala A., Kifer D., Gehrke J., Et al., l-diversity: Privacy beyond k-anonymity, ACM Trans on Knowledge Discovery from Data, 1, 1, (2007)
[15]
Li N., Li T., Venkatasubramanian S., t-closeness: Privacy beyond k-anonymity and l-diversity, Proc of the 23rd Int Conf on Data Engineering, pp. 106-115, (2007)
[16]
Xiao X., Wang G., Gehrke J., Differential privacy via wavelet transforms, IEEE Trans on Knowledge and Data Engineering, 23, 8, pp. 1200-1214, (2011)
[17]
Barak B., Chaudhuri K., Dwork C., Et al., Privacy, accuracy, and consistency too: A holistic solution to contingency table release, Proc of the 26th Symp on Principles of Database Systems, pp. 273-282, (2007)
[18]
LeFevre K., DeWitt D.J., Ramakrishnan R., Incognito: Efficient full-domain k-anonymity, Proc of the 2005 Int Conf on Management of Data, pp. 49-60, (2005)
[19]
Xiao X., Wang G., Gehrke J., Interactive anonymization of sensitive data, Proc of the 2009 Int Conf on Management of Data, pp. 1051-1054, (2009)
[20]
McSherry F., Talwar K., Mechanism design via differential privacy, Proc of the 48th Annual IEEE Symp on Foundations of Computer Science, pp. 94-103, (2007)