期刊文献+

基于隐私保护的语义数据集成 被引量:2

Semantic data integration based on privacy protection
下载PDF
导出
摘要 设计隐私保护策略本体,提出一个基于智能体和本体的数据集成的架构,包括知识浏览器、全局本体、局部本体、映射和上下文、隐私保护知识库、隐私策略本体、数据挖掘本体、数据挖掘智能体、集成智能体等,可在保护用户隐私的基础上有效地实现分布异构环境的语义数据集成.并介绍了一个反洗钱领域隐私保护数据集成的实例. The design of privacy protection ontology is discussed and one data integration architecture is offered based on agents and ontology which can implement effectively semantic data integration in distributed heterogeneous environment based privacy protection.It includes intelligent composer,global ontology,local ontology,mapping and context,privacy protection knowledge base,privacy policy ontology,data mining ontology,data mining agent,and integration agent.An example of privacy protection data integration in anti money laundering is introduced.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2005年第z1期128-130,134,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60403027) 国家"十五"重大科技攻关项目(2001BA102A06-11)
关键词 隐私保护 语义 本体 数据集成 数据挖掘 privacy protection semantic ontology data integration data mining
  • 相关文献

参考文献7

  • 1[1]Goldman K,Valdez E.Matchbox:secure data sharing [J].IEEE Internet Computing,2004,8(6):18-24
  • 2[2]Chris C,Murat K,AnHai D,et al.Privacy-preserving data integration and sharing [A].In:Weikum G,Konig A C,eds.Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery[C].Paris:ACM Press,2004.19-26
  • 3[3]Michalowski M,Ambite J L,Thakkar S,et al.Retrieving and semantically integrating heterogenious data from the Web[J].IEEE Intelligent Systems,2004,19:72-79
  • 4[4]Li Yuhua,Lu Zhengding.Ontology-based universal knowledge grid:enabling knowledge discovery and integration on the grid [A].In:Zhang Liangjie,Li Minglu,eds.Proceedings-2004 IEEE International Conference on Services Computing[C].Los Alamitos:The IEEE Society,2004.557-560
  • 5[5]Wache H,Vogele T,Visser U,et al.Ontology-based integration of information-a survey of existing approaches[A].In:Nebel B ed.Proceedings of IJCAI-01Workshop:Ontologies and Information Sharing[C].Seattle:WA,2001.108-117
  • 6[6]Lindell Y,Pinkas B,Privacy preserving data mining [J].Journal of Cryptology,2002,15(3):177-206
  • 7[7]McGuinness D L,Harmelen F V.OWL Web ontology language overview,http://www.w3.org/2004/OWL/,July 2004.

同被引文献13

  • 1罗永龙,徐致云,黄刘生.安全多方的统计分析问题及其应用[J].计算机工程与应用,2005,41(24):141-143. 被引量:14
  • 2Mohammed N. Privacy-preserving data mashup[C]//Pro- ceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology. Saint Petersburg,Russia: [ s. n. ] ,2009.
  • 3Solanas A. Privacy protection with genetic algorithms [ M 1/! Success in Evolutionary Computation. Berlin:Springer, 2008: 215-237.
  • 4Fienberg S E. Privacy and confidentiality in an e-commerce world: Data mining, data warehousing, matching and disclo- sure limitation [ J ]. Statistical Science, 2006,21 ( 2 ) : 143 - 154.
  • 5Felt A, Evans D. Privacy protection for social networking plat- forms[ C J//Proc of Web 2.0 Security & Privacy (W2SP). Oakland, CA : [ s. n. ] ,2008.
  • 6Zheleva E, Getoor L. Privacy in social networks: A survey [M]//Social Network Data Analytics. [ s. 1. ] : [ s. n. ], 2011:277-306.
  • 7Emekci F. Privacy preserving query processing using third par- ties [ C ]//Proc of ICDE. Washington, DC : IEEE Computer So-eiety ,2006:27-27.
  • 8Naor M, Pinkas B. Oblivious transfer and polynomial evalua- tion [ C ]//Proc of STOC. New York : ACM, 1999:245-254.
  • 9Agrawal R. Information sharing across private databases [ C ]// Proc of SIGMOD. New York : ACM,2003 : 86 -97.
  • 10Shamir A. How to share a secret [ J ]. Communications of the ACM, 1979,22( 11 ) :612-613.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部