|
[1] R. J. BAYARDO and R. AGRAWAL, Data privacy through optimal k-anonymization, Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on, IEEE, 2005, pp. 217-228. [2] R. DEWRI, I. RAY and D. WHITLEY, On the Optimal Selection of k in the k-Anonymity Problem, Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on, IEEE, 2008, pp. 1364-1366. [3] B. FUNG, K. WANG, R. CHEN and P. S. YU, Privacy-preserving data publishing: A survey of recent developments, ACM Computing Surveys (CSUR), 42 (2010), pp. 14. [4] S. C. HUANG, P.-J. WAN, X. JIA, H. DU and W. SHANG, Minimum-latency broadcast scheduling in wireless ad hoc networks, INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, IEEE, 2007, pp. 733-739. [5] S. KIYOMOTO and Y. MIYAKE, How to Find an Appropriate K for K-Anonymization, Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014 Eighth International Conference on, IEEE, 2014, pp. 273-279. [6] F. KOHLMAYER, F. PRASSER, C. ECKERT, A. KEMPER and K. KUHN, Flash: efficient, stable and optimal k-anonymity, Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom), IEEE, 2012, pp. 708-717. [7] K. LEFEVRE, D. J. DEWITT and R. RAMAKRISHNAN, Incognito: Efficient full-domain k-anonymity, Proceedings of the 2005 ACM SIGMOD international conference on Management of data, ACM, 2005, pp. 49-60. [8] P. SAMARATI, Protecting respondents identities in microdata release, Knowledge and Data Engineering, IEEE Transactions on, 13 (2001), pp. 1010-1027. [9] P. SAMARATI and L. SWEENEY, Generalizing data to provide anonymity when disclosing information, PODS, 1998, pp. 188. [10] P. SAMARATI and L. SWEENEY, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, Technical report, SRI International, 1998. [11] X. SUN, M. LI, H. WANG and A. PLANK, An efficient hash-based algorithm for minimal k-anonymity, Proceedings of the thirty-first Australasian conference on Computer science-Volume 74, Australian Computer Society, Inc., 2008, pp. 101-107. [12] L. SWEENEY, Achieving k-anonymity privacy protection using generalization and suppression, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10 (2002), pp. 571-588. [13] L. SWEENEY, k-anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10 (2002), pp. 557-570.
|