参考文献/References:
[1] Samarati P.Protecting respondent’s identities in microdata release[J].IEEE Transactions on Knowledge and Data Engineering,2001,13(6):1 010-1 027.
[2]Sweeney L.k-anonymity:A model for protecting privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):557-570.
[3]Machanavajjhala A,Gehrke J,Kifer D.l-diversity:Privacy beyond k-anonymity[C]//Proc of IEEE Int’l Conf on Data Engineering.Piscataway:IEEE Press,2006.
[4]周水庚,李丰,陶宇飞,等.面向数据库应用的隐私保护研究综述[J].计算机学报,2009,32(5):847-858.
[5]Fung B C M,Wang K,Chen R,et al.Privacy-preserving data publishing:A survey on recent developments[J].ACM Computing Surveys,2010,42(4),Article 14:1-53.
[6]Truta T,Vinay B.Privacy protection:p-sensitive k-anonymity property[C]//Proc of the 22nd Int’l Conf on Data Engineering Workshops(ICDEW’06).Atlanta,2006:94.
[7]杨晓春,王雅哲,王斌,等.数据发布中面向多敏感属性的隐私保护方法[J].计算机学报,2008,31(4):574-587.
[8]Nergiz M E,Atzori M,Clifton C.Hiding the presence of individuals from shared databases[C]//SIGMOD.Beijing,2007:531-542.
[9]LeFevre K,DeWitt D J,Ramakrishnan R.Incognito:efficient full-domain k-anonymity[C]//Proc of the ACM SIGMOD Int’l Conf on Management of Data.New York:ACM Press,2005.
[10]Asuncion A,Newman D J.UCI Machine Learning Repository[OL].http://mlearn.ics.uci.edu/ML Repository.html,2007.
[11]Bayardo R,Agrawal R.Data privacy through optimal k-anonymization[C]//Proc of IEEE Int’l Conf on Data Engineering.Piscataway:IEEE Press,2005.
[12]LeFevre K,DeWitt D J,Ramakrishnan R.Mondrian multidimensional k-anonymity[C]//Proc of IEEE Int’l Conf on Data Engineering.Piscataway:IEEE Press,2006.
相似文献/References:
[1]李 江,刘学军,章 玮.基于门限路由的源节点位置隐私保护协议[J].南京师大学报(自然科学版),2014,37(01):117.
Li Jiang,Liu Xuejun,Zhang Wei.Threshold Routing for Source-Location Privacy Protection in Wireless Sensor Networks[J].Journal of Nanjing Normal University(Natural Science Edition),2014,37(04):117.
[2]李邦源,张春辉,常 荣,等.5G边缘计算环境下资源效用与隐私保护权衡的服务迁移方法[J].南京师大学报(自然科学版),2021,44(04):102.[doi:10.3969/j.issn.1001-4616.2021.04.013]
Li Bangyuan,Zhang Chunhui,Chang Rong,et al.A Service Offloading Method for Resource Utilization and PrivacyPreservation Trade-offs in 5G-Enabled Edge Computing[J].Journal of Nanjing Normal University(Natural Science Edition),2021,44(04):102.[doi:10.3969/j.issn.1001-4616.2021.04.013]