参考文献
[1]王逸鹤, 黄亦芃. 面向网络安全防御防护的大数据平台架构研究[J]. 信息安全研究, 2021, 7(1): 7580[2]江茜. 大数据安全审计框架及关键技术研究[J]. 信息安全研究, 2019, 5(5): 400405[3]Samarati P, Sweeney L. Protecting privacy when disclosing information: kanonymity and its enforcement through generalization and suppression[JOL]. 1998 [20221118]. https:xueshu.baidu.comusercenterpapershow?paperid=fd2eb8edd82d1687dbf1b92cd8977a93[4]Meyerson A, Williams R. On the complexity of optimal kanonymity[C] Proc of the 23rd ACM SIGMODSIGACTSIGART Symp on Principles of Database Systems. New York: ACM, 2004: 223228[5]Sweeney L. Achieving kanonymity privacy protection using generalization and suppression[J]. International Journal of Uncertainty, Fuzziness and KnowledgeBased Systems, 2002, 10(5): 571588[6]LeFevre K, DeWitt D J, Ramakrishnan R. Incognito: Efficient fulldomain kanonymity[C] Proc of the 2005 ACM SIGMOD Int Conf on Management of Data. New York: ACM, 2005: 4960[7]Zhang Jianpei, Zhao Ying, Yang Yue, et al. A kanonymity clustering algorithm based on the information entropy[C] Proc of the 18th IEEE Int Conf on Computer Supported Cooperative Work in Design (CSCWD). Piscataway, NJ: IEEE, 2014: 319324[8]Li Jiuyong, Wong R C W, Fu A W C, et al. Achieving kanonymity by clustering in attribute hierarchical structures[C] Proc of Int Conf on Data Warehousing and Knowledge Discovery. Berlin: Springer, 2006: 405416[9]Byun J W, Kamra A, Bertino E, et al. Efficient kanonymization using clustering techniques[C] Proc of Int Conf on Database Systems for Advanced Applications. Berlin: Springer, 2007: 188200[10]Yan Yan, Herman E A, Mahmood A, et al. A weighted Kmember clustering algorithm for Kanonymization[J]. Computing, 2021, 103(10): 22512273[11]Lin Junlin, Wei Mengcheng. An efficient clustering method for kanonymization[C] Proc of the 2008 Int Workshop on Privacy and Anonymity in Information Society. New York: ACM, 2008: 4650[12]Guo Naixuan, Yang Ming, Gong Qiyuan, et al. Data anonymization based on natural equivalent class[C] Proc of the 23rd IEEE Int Conf on Computer Supported Cooperative Work in Design (CSCWD). Piscataway, NJ: IEEE, 2019: 2227[13]姜火文, 曾国荪, 马海英. 面向表数据发布隐私保护的贪心聚类匿名方法[J]. 软件学报, 2017, 28(2): 341351[14]Wang Kun, Zhao Wei, Cui Junjie, et al. A Kanonymous clustering algorithm based on the analytic hierarchy process[J]. Journal of Visual Communication and Image Representation, 2019, 59: 7683[15]Zheng Wantong, Wang Zhongyue, Lv Tongtong, et al. Kanonymity algorithm based on improved clustering[C] Proc of Int Conf on Algorithms and Architectures for Parallel Processing. Berlin: Springer, 2018: 462476[16]Arava K, Lingamgunta S. Adaptive kanonymity approach for privacy preserving in cloud[J]. Arabian Journal for Science and Engineering, 2020, 45(4): 24252432[17]张强, 叶阿勇, 叶帼华, 等. 最优聚类的k匿名数据隐私保护机制[J]. 计算机研究与发展, 2022, 59(7): 16251635[18]刘晓迁, 李千目. 基于聚类匿名化的差分隐私保护数据发布方法[J]. 通信学报, 2016, 37(5): 125129
|