大数据安全与隐私保护冯登国张敏李昊图文精.docx
- 文档编号:7177300
- 上传时间:2023-01-21
- 格式:DOCX
- 页数:16
- 大小:814.17KB
大数据安全与隐私保护冯登国张敏李昊图文精.docx
《大数据安全与隐私保护冯登国张敏李昊图文精.docx》由会员分享,可在线阅读,更多相关《大数据安全与隐私保护冯登国张敏李昊图文精.docx(16页珍藏版)》请在冰豆网上搜索。
大数据安全与隐私保护冯登国张敏李昊图文精
256计 算 机 学 报2014年[]Y,L,Y,L27eMenhiun.aoinPeieeWaneneeDik -F-C-L ggofExloitineorahicalinfluenceforcollaborativeoint-- pgggpp //ierestrecommendationProceedinsofthe34thInternant- gtionalACMSIGIRConferenceonResearchandDeveloment p(,,inInformationRetrievalSIGIR’11).BeiinChina2011:
jg325334-]G[8oelS,HofmanJM,LahaieS,etal.Predictinconsumer2 g ,behaviorwith Websearch.NationalAcademofSciences y ():
2010,7411174869074-[]N29araananA,ShmatikovV.Howtobreakanonmitofthe yyy ,rinnetflixrizedataset.ArXivComuterSciencee-ts ppp:
/102006,arXivcs0610105:
1-[]S:
A a30weeneL.k-nmitmodelforrotectinrivac.no yyypgpy ,FInternationalJournalonUncertaintuzzinessandKnowl- y,):
edSstems2002,10(5557ede-bas570 -yg]S:
A[nokano1weeneL.knmitchievinnmitrivac3-A-yyygyypy rotectionusineneralizationandsuression.International pggpp ,FJournalonUncertaintuzzinessandKnowlede-bedas yg,():
588Sstems2002,105571-y[]B,A32aardoRJrawalR.Datarivacthrouhotimal ygpygp //k-anonmizationProceedinsfhe1stnternational o t 2 Iyg,,ConferenceonDataEnineerin.TokoJaan2005:
217228 -ggyp]K,D,R[3ristenLeFevreavidJDeWittahuRamakrishnan.3 g//:
EProceedinsInconitofficientfullainnmitdomK-ano -ggyyofthe2005ACM SIGMODInternationalConferenceon ,UManaementofData.BaltimoreSA,2005:
4960 -g[]L,R34eFevreK,DeWittDJamakrishnanR.Mondrianmulti- //dimK-anoProceedinsofthe22ndInternaensionalnmit- gyy,UnalConferenceonDataEnineerin.GeoriaSA,tio ggg2006:
2535-,K,G,[]MachanavahalaAshwiniferDanielehrkeJohannes35 jj:
L-dPrivacersitVenkitasubramaniam Muthuramakrishnan.ivyy]W,//[0anKeFunBC M.Anonmizinseuentialreleases4 ggygq Proceedinsofthe12thACMSIGKDDInternationalConfer- geeonKnowledeDiscoverandDataMininKDD’06).nc gyg( ,U423PhiladelhiaSA,2006:
414-p[]X:
,M-i41iaoXiaoaoYu.arianceTowardsrivacuiTeinv-K-F py//ublreservinre-icationofdnamicdatasetsProceedins pygpg ofthe2007ACMSIGMODInternationalConferenceon ,C,ManaementofData(SIGMOD’07).Beiinhina2007:
gjg689700-[,]B,W,4iFuA2uYindaWaiCheeonRamondChiWin -Y ggyg etal.Privacreservinserialdataublishinbrolecom- ypgpgy //ositionProceedinsofthe34thInternationalConference pg,NonVerLareDataBases(VLDB’2008).Aucklandew yg ,Zealand2008:
845856-]N[ano3araananA,ShmatikovV.Robustdenmizationof4- yy//laresarsedatasetsProceedinsofthe2008IEEESmo -gpgyp),UsmonSecuritandPrivacS&P’2008.OaklandSA,iu yy( 1252008:
111-[]Y:
A44inX,WuX.Randomizinsocialnetworkssectrum ggp //ProceedinsoftheSIAMInternationalreservinaroach gpgpp ,UConferenceonDataMininSDM’08).GeoriaSA, g(g2008:
739750-[,Z]Z4Jiein.E5hanLihanWeideanonmitinsocial--N ggg gyy //networkrahsProceedinsoftheInternationalConference gpg)CSE’09.onomutationalciencendnineerin C S a Epgg(,,VancouverCanada2009:
18-[]L,kad46iNandaDasSaalK.Alicationsofnmitersitnoiv-- jppyyy //onlinesocialnetworksProceedinsoftheinublishin gpg ,Uonference.CambrideSA,IEEESocialomutin Cgpg C2012:
153180-]Z,,[k-a7ouLeiChenLeizsuM T.omorhism:
Aeneral4ut pg//networkublicationProframeworkforrivacreservin- ppypg Laredinsofthe35thInternationalConferenceonVercee ggy ),DataBases(VLDB’2009.Lon,France2009:
946957 -y]C,T[8amanAlinarutaTraianMarius.Dataandstructural4 p//k-anoinsocialnetworksProceedinsofthe2ndnmit gyy )ACMSIGKDDInternationalWorkshoPinKDD2008.Las p(,UVeasSA,2008:
110-g[]S49aroachforstructuralVikasKumar.Aclusteriniha gppg //k-anonmitinsocialnetworksusineneticalorithm yyggg ProceedinsoftheCUBEInternationalInformationTechnol- g),,o706nference(CUBE’12.PuneIndia2012:
701Co-gy ]H,M,,[0aMichaeliklauGeromeJensenDavidetal.Resistin5 yg //structuralreidentificationinanonmizedsocialnetworks - yProceedinsofthe34thInternationalConferenceonVer gy,N,LareDataBases(VLDB’2008).AucklandewZealand g2008:
102114-[,]Z5JieZin.1hanLihanWeiEfficientedeanonmization--N ggg gy :
////oflaresocialrahs.httvom.cs.utsa.edudmzen ggpp//techre2011CS-T1df.2013R201004.0610----pp,F,L[]CheisohenJamesuAdaWaieiuJia.K-morhism:
52-C gp Privacreservinnetworkublicationaainststructural ypgpg k-anobeondnmit.ACM Transactionsnnowlede o Kyyyg,():
from Data2007,111Discover52-y ,T:
[]XuieiiaoXiaoaoYu.AnatomSimleandeffective36-K-F py//Proceedinsofthe32ndInternationalrivacreservation gpyp ,LareDataBases(VLDB’06).SeoulConferenceonVer gy ,Korea2006:
139150-[,K]Q3Yu.AreateZhanoudasN,SrivastavaD,Tin7in gggggg //Proceedinsoftheueranswerinonanonmizedtables gqygy IEEE23rdInternationalConferenceonDataEnineerin gg(),,ICDE’2007.IstanbulTurke2007:
116125-y,V,L[]Liiannenkatasubramanianuihe38iin T S.-H-C Ngg:
P//tclok-anoldivsenessrivacbeondnmitandersit-- yyyyy ProceedinsoftheIEEE23rdInternationalConferenceon g,T,2DataEnineerinICDE’2007).Istanbulurke007:
gg(y106115-/[]Z/Proceed39enK.Publiclverifiableremotedatainterit- gygy insofthe10thInternationalConferenceonInformationand gCommunicationsSecuritICICS’2008).Birminham,UK, y(g2008:
419434-
1期冯登国等:
大数据安全与隐私保护257//attacksProceedinsofthe2010ACM SIGMODInterna- g,tionalConferenceonManaementofData.Indianaolis gpUSA,2010:
459470-]L:
T[3üL,ZhouT.Linkredictioninweihtednetworkshe5 pg,(
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 数据 安全 隐私 保护 冯登国张敏李昊 图文