参考文献
|
-
The House of Commons in Canada. The personal information protection and electronic documents act, April 2000. http://www.privcom.gc.ca/.
-
UCI Machine Learning Repository. http://archive.ics.uci.edu/ml/datasets/Adult
-
T. Kuipers and J. van der Hoeven, “Insight into digital preservation of research output in Europe,” http://www.parse-insight.eu/publications.php#d3-4, 2009
-
Taxonomy trees of the Adult data set. http://ddm.cs.sfu.ca/software.html
-
Laws And Regulations Database of The Republic of China, Personal Information Protection Act, April 2010, http://law.moj.gov.tw/Eng/LawClass/LawContent.aspx?PCODE=I0050021
-
Byun, J-W,Kamra, A.,Bertino, E.,Li, N.(2007).Efficient k-Anonymization Using Clustering Techniques.12th International Conference on Database Systems for Advanced Applications (DASFAA'2007)
-
Fu, Y.,Chen, Z.Y.,Koru, G.,Gangopadhyay, A.(2010).A privacy protection technique for publishing data mining models and research data.ACM Transactions on Management, Information Systems,1(1),7:1-7:20.
-
Fung, B.C.M.,Wang, K.,Yu, P. S.(2005).Top-Down Specialization for Information and
Privacy Preservation.Proceedings of the 21st International Conference on Data Engineering (ICDE 2005)
-
Gunn, P.,Fremont, A.,Bottrell, M,Shugarman, L,Galegher, J,Bikson, T.(2004).The Health Insurance Portability and Accountability Act privacy rule: a practical guide for researchers.Medical Care,42(4),321-327.
-
LeFevre, K.,DeWitt, D.J.,Ramakrishnan, R.(2005).Incognito: Efficient Full-Domain k-Anonymity.Proc. 24th ACM SIGMOD '05
-
LeFevre, K.,DeWitt, D.J.,Ramakrishnan, R.(2006).Mondrian Multidimensional k-Anonymity.Proceedings of the 22st International Conference on Data Engineering (ICDE 2006)
-
Nosowsky, R.,Giordano, T.(2006).The Health Insurance Portability and Accountability Act of 1996 (HIPAA) privacy rule: implications for clinical research.Medicine,57(1),575.
-
Samarati, P.(2001).Protecting respondents' identities in microdata release.IEEE Transactions on Knowledge and Data Engineering,1010-1027.
-
Samarati, P.,Sweeney, L.(1998).Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression.Proceedings of the IEEE Symposium on Research in Security and Privacy,Oakland, CA:
-
Sweeney, L.(2002).K-anonymity: a model for protecting privacy.International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems,10(5),571-588.
-
Xu, J.,Wang, W. ,Pei, J. ,Wang, X-Y ,Shi, B. ,Fu, A. W-C(2006).Utility-Based Anonymization Using Local Recoding.Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
-
Ye, H.,Chen, E.S.(2011).Attribute Utility Motivated k-anonymization of Datasets to Support the Heterogeneous Needs of Biomedical Researchers.AMIA Annu Symp Proc.
|