[1] |
周水庚, 李丰, 陶宇飞 , 等. 面向数据库应用的隐私保护研究综述[J]. 计算机学报, 2009,32(5):847-861. ZHOU S G , LI F , TAO Y F , et al. Privacy preservation in database ap-plications: a survey[J]. Chinese Journal of Computers, 2009,32(5):847-861.
|
[2] |
田秀霞, 王晓玲, 高明 , 等. 数据库服务—安全与隐私保护[J]. 软件学报, 2010,21(5):991-1006. TIAN X X , WANG X L , GAO M , et al. Database as a ser-vice—security and privacy preserving[J]. Journal of Software, 2010,21(5):991-1006.
|
[3] |
CRAIG G . Fully homomorphic encryption using ideal lattices[C]// The 41st Annual ACM Symposium on Theory of Computing(STOC). Bethesda, MD, USA, c2009:169-178.
|
[4] |
SWEENEY L . k-anonymity:a model for protecting privacy[J]. Inter-national Journal on Uncertainty, Fuzziness and Knowledge Based Systems, 2002,10(5):557-570.
|
[5] |
WONG R C , LI J , FU A W , et al. (a,k)-anonymity: an en-hanced k-anonymity model for privacy preserving data publishing[C]// ACM SIGKDD International Conference on Knowledge Discovery and Data Mining(SIGKDD). Philadelphia, PA, USA, c2006:754-759.
|
[6] |
JIANG W , CLIFTON C . A secure distributed framework for achieving anonymity[J]. The International Journal on Very Large Data Bases, 2006,15(4):316-333.
|
[7] |
CLIFTON C , KANTARCIOGLU , VAIDYA J . Tools for privacy pre-serving distributed data mining[J]. ACM SIGKDD Explorations, 2003,4(2):1-7.
|
[8] |
MOHAMMED N , FUNG B C M , DEBBABI M . Anonymity meets game theory: secure data integration with malicious participants[J]. Very Large Data Bases Journal(VLDBJ), 2011,20(4):567-588.
|
[9] |
MOHAMMED N , FUNG B C M , et al. Centralized and distrib anonymization for high-dimensional healthcare data[J]. ACM Trans-actions on Knowledge Discovery from Data(TKDD), 2010,4(4):18:1-18:33.
|
[10] |
JIANG W , CLIFTON C , KANTARCIOGLU M . Transforming semi-honest protocols to ensure accountability[J]. Data Knowl Eng, 2008,65(1):57-74.
|
[11] |
DU W. , HAN Y S , CHEN S . Privacy-preserving multivariate statistic cal analysis: linear regression and classification[C]// SIAM Interna-tional Conference on Data Mining. Florida, c2014:222-233.
|
[12] |
PINKAS B . Cryptographic techniques for privacy-preserving data mining[J]. ACM SIGKDD Explor News, 2002,4(2):12-19.
|
[13] |
VAIDYA J , CLIFTON C . Privacy preserving k-means clustering over vertically partitioned data[C]// The ACM SIGKDD, c2003:206-215.
|
[14] |
CIRIANI V , VIMERCATI S , FORESTI S . Fragmentation design for efficient query execution over sensitive distributed databases[C]// The 29th ICDCS. Canada, c2009:32-39.
|
[15] |
CIRIANI V , VIMERCATI S , FORESTI S . Selective data outs for enforcing privacy[J]. Journal of Computer Security, 2011,19:531-566.
|
[16] |
VIMERCATI S , FORESTI S , JAJODIA S . Fragments and loose asso-ciations: respecting privacy in data publishing[J]. Proceeding of the VLDB Endowment, 2010,3(12):1370-1381.
|
[17] |
张坤, 李庆忠, 史玉良 . 面向 SaaS 应用的数据组合隐私保护机制研究[J]. 计算机学报, 2010,33(11):2044-2054. ZHANG K , LI Q Z , SHI Y L . Research on data combination privacy preservation mechanism for SaaS[J]. Chinese Journal of Computers, 2010,33(11):2044-2054.
|
[18] |
ZHANG K , SHI Y , LI Q . Data privacy preserving mechanism based on tenant customization for SaaS[C]// The International Conference on Multimedia Information Networking and Security. Wuhan, China, c2009:599-603.
|
[19] |
OSBORNE M J , RUBINSTEIN A . A course in game theory[M]. The MIT Press, Cambridge, UK, 1994.
|