大数据安全与隐私保护冯登国张敏李昊图文精精品文档.docx

上传人:b****8 文档编号:11353668 上传时间:2023-02-28 格式:DOCX 页数:11 大小:800.03KB
下载 相关 举报
大数据安全与隐私保护冯登国张敏李昊图文精精品文档.docx_第1页
第1页 / 共11页
大数据安全与隐私保护冯登国张敏李昊图文精精品文档.docx_第2页
第2页 / 共11页
大数据安全与隐私保护冯登国张敏李昊图文精精品文档.docx_第3页
第3页 / 共11页
大数据安全与隐私保护冯登国张敏李昊图文精精品文档.docx_第4页
第4页 / 共11页
大数据安全与隐私保护冯登国张敏李昊图文精精品文档.docx_第5页
第5页 / 共11页
点击查看更多>>
下载资源
资源描述

大数据安全与隐私保护冯登国张敏李昊图文精精品文档.docx

《大数据安全与隐私保护冯登国张敏李昊图文精精品文档.docx》由会员分享,可在线阅读,更多相关《大数据安全与隐私保护冯登国张敏李昊图文精精品文档.docx(11页珍藏版)》请在冰豆网上搜索。

大数据安全与隐私保护冯登国张敏李昊图文精精品文档.docx

大数据安全与隐私保护冯登国张敏李昊图文精精品文档

256计  算  机  学  报2014年[]Y,L,Y,L27eMenhiun.aoinPeieeWaneneeDik -F-C-L   ggofExloitineorahicalinfluenceforcollaborativeoint--    pgggpp //ierestrecommendationProceedinsofthe34thInternant-     gtionalACMSIGIRConferenceonResearchandDeveloment       p(,,inInformationRetrievalSIGIR’11).BeiinChina2011:

  jg325334-]G[8oelS,HofmanJM,LahaieS,etal.Predictinconsumer2     g ,behaviorwith Websearch.NationalAcademofSciences    y ():

2010,7411174869074-[]N29araananA,ShmatikovV.Howtobreakanonmitofthe      yyy ,rinnetflixrizedataset.ArXivComuterSciencee-ts     ppp:

/102006,arXivcs0610105:

1-[]S:

A a30weeneL.k-nmitmodelforrotectinrivac.no  yyypgpy  ,FInternationalJournalonUncertaintuzzinessandKnowl-     y,):

edSstems2002,10(5557ede-bas570 -yg]S:

A[nokano1weeneL.knmitchievinnmitrivac3-A-yyygyypy   rotectionusineneralizationandsuression.International   pggpp ,FJournalonUncertaintuzzinessandKnowlede-bedas    yg,():

588Sstems2002,105571-y[]B,A32aardoRJrawalR.Datarivacthrouhotimal     ygpygp //k-anonmizationProceedinsfhe1stnternational o t 2 Iyg,,ConferenceonDataEnineerin.TokoJaan2005:

217228   -ggyp]K,D,R[3ristenLeFevreavidJDeWittahuRamakrishnan.3    g//:

EProceedinsInconitofficientfullainnmitdomK-ano  -ggyyofthe2005ACM SIGMODInternationalConferenceon     ,UManaementofData.BaltimoreSA,2005:

4960  -g[]L,R34eFevreK,DeWittDJamakrishnanR.Mondrianmulti-     //dimK-anoProceedinsofthe22ndInternaensionalnmit-     gyy,UnalConferenceonDataEnineerin.GeoriaSA,tio    ggg2006:

2535-,K,G,[]MachanavahalaAshwiniferDanielehrkeJohannes35   jj:

L-dPrivacersitVenkitasubramaniam Muthuramakrishnan.ivyy]W,//[0anKeFunBC M.Anonmizinseuentialreleases4  ggygq   Proceedinsofthe12thACMSIGKDDInternationalConfer-       geeonKnowledeDiscoverandDataMininKDD’06).nc     gyg( ,U423PhiladelhiaSA,2006:

414-p[]X:

,M-i41iaoXiaoaoYu.arianceTowardsrivacuiTeinv-K-F   py//ublreservinre-icationofdnamicdatasetsProceedins   pygpg ofthe2007ACMSIGMODInternationalConferenceon      ,C,ManaementofData(SIGMOD’07).Beiinhina2007:

  gjg689700-[,]B,W,4iFuA2uYindaWaiCheeonRamondChiWin -Y     ggyg etal.Privacreservinserialdataublishinbrolecom-    ypgpgy    //ositionProceedinsofthe34thInternationalConference     pg,NonVerLareDataBases(VLDB’2008).Aucklandew   yg ,Zealand2008:

845856-]N[ano3araananA,ShmatikovV.Robustdenmizationof4-    yy//laresarsedatasetsProceedinsofthe2008IEEESmo      -gpgyp),UsmonSecuritandPrivacS&P’2008.OaklandSA,iu   yy( 1252008:

111-[]Y:

A44inX,WuX.Randomizinsocialnetworkssectrum   ggp  //ProceedinsoftheSIAMInternationalreservinaroach    gpgpp ,UConferenceonDataMininSDM’08).GeoriaSA,   g(g2008:

739750-[,Z]Z4Jiein.E5hanLihanWeideanonmitinsocial--N  ggg gyy  //networkrahsProceedinsoftheInternationalConference     gpg)CSE’09.onomutationalciencendnineerin C S a Epgg(,,VancouverCanada2009:

18-[]L,kad46iNandaDasSaalK.Alicationsofnmitersitnoiv--     jppyyy //onlinesocialnetworksProceedinsoftheinublishin     gpg ,Uonference.CambrideSA,IEEESocialomutin  Cgpg C2012:

153180-]Z,,[k-a7ouLeiChenLeizsuM T.omorhism:

Aeneral4ut    pg//networkublicationProframeworkforrivacreservin-   ppypg  Laredinsofthe35thInternationalConferenceonVercee       ggy ),DataBases(VLDB’2009.Lon,France2009:

946957 -y]C,T[8amanAlinarutaTraianMarius.Dataandstructural4     p//k-anoinsocialnetworksProceedinsofthe2ndnmit     gyy )ACMSIGKDDInternationalWorkshoPinKDD2008.Las   p(,UVeasSA,2008:

110-g[]S49aroachforstructuralVikasKumar.Aclusteriniha    gppg  //k-anonmitinsocialnetworksusineneticalorithm    yyggg  ProceedinsoftheCUBEInternationalInformationTechnol-      g),,o706nference(CUBE’12.PuneIndia2012:

701Co-gy ]H,M,,[0aMichaeliklauGeromeJensenDavidetal.Resistin5   yg //structuralreidentificationinanonmizedsocialnetworks -    yProceedinsofthe34thInternationalConferenceonVer       gy,N,LareDataBases(VLDB’2008).AucklandewZealand   g2008:

102114-[,]Z5JieZin.1hanLihanWeiEfficientedeanonmization--N  ggg gy :

////oflaresocialrahs.httvom.cs.utsa.edudmzen   ggpp//techre2011CS-T1df.2013R201004.0610----pp,F,L[]CheisohenJamesuAdaWaieiuJia.K-morhism:

52-C   gp Privacreservinnetworkublicationaainststructural   ypgpg  k-anobeondnmit.ACM Transactionsnnowlede  o Kyyyg,():

from Data2007,111Discover52-y ,T:

[]XuieiiaoXiaoaoYu.AnatomSimleandeffective36-K-F    py//Proceedinsofthe32ndInternationalrivacreservation    gpyp ,LareDataBases(VLDB’06).SeoulConferenceonVer    gy ,Korea2006:

139150-[,K]Q3Yu.AreateZhanoudasN,SrivastavaD,Tin7in  gggggg  //Proceedinsoftheueranswerinonanonmizedtables    gqygy  IEEE23rdInternationalConferenceonDataEnineerin      gg(),,ICDE’2007.IstanbulTurke2007:

116125-y,V,L[]Liiannenkatasubramanianuihe38iin T S.-H-C Ngg:

P//tclok-anoldivsenessrivacbeondnmitandersit--  yyyyy  ProceedinsoftheIEEE23rdInternationalConferenceon       g,T,2DataEnineerinICDE’2007).Istanbulurke007:

 gg(y106115-/[]Z/Proceed39enK.Publiclverifiableremotedatainterit-   gygy  insofthe10thInternationalConferenceonInformationand        gCommunicationsSecuritICICS’2008).Birminham,UK, y(g2008:

419434-

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > IT计算机 > 计算机硬件及网络

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1