期刊文献+

基于熵的视图安全性判定 被引量:4

Security Decision of Views Based on Entropy
下载PDF
导出
摘要 视图发布已经成为数据交换的一个便利的手段.但是随着数据交换量的增大,信息泄漏的问题日益严重.基于概率数据库知识,建立了一个判定发布视图安全性的概率模型,给出了发布视图、隐私信息、先验知识等的形式化定义,并在此基础上提出了一个新的基于熵的判定定理.最后用实验进行了证明.
作者 张坤 刘国华
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第z2期122-127,共6页 Journal of Computer Research and Development
基金 教育部科学技术研究重点基金项目(205014)
  • 相关文献

参考文献11

  • 1[1]R Agrawal,R Srikant.Privacy-preserving data mining.ACM SIGMOD Conf on Management of Data,Dallas,Texas,2000
  • 2[2]L Sweeney.A model for protecting privacy.In:International Journal on Uncertainty,Fuzziness and Knowledge Based Systems,2002,10(5):557-570
  • 3[3]S J Rizvi,J R Haritsa.Maintaining data privacy in association rule mining.The 28th VLDB Conf,Hong Kong,2002
  • 4[4]T Dalenius,S Reiss.Data swapping:A technique for disclosure control.Journal of Statistical Planning and Inference,1982,6:73-85
  • 5[5]A Halevy.Answering queries using views:A survey.VLDB Journal,2001,10(4):270-294
  • 6[6]G Miklau,D Suciu.A formal analysis of information disclosure in data exchange.SIGMOD,Paris,France,2004
  • 7[7]T M Cover,J A Thomas.Elements of Information Theory.New York:John Wiley,1991.75-90
  • 8[8]G Miklau,D Suciu.Controlling access to published data using cryptography.VLDB 2003,Berlin,2003
  • 9[9]G Miklau,D Suciu.Cryptographically enforced conditional access for XML.WebDB,Madison,Wisconsin,2002
  • 10[10]S R Albert,O Mendelzon,S Sudarshan,et al.Extending query rewriting techniques for fine-grained access control.SIGMOD,Paris,France,2004

同被引文献46

  • 1陈子阳,郜时红,刘国华.基于k-匿名的视图发布安全问题的研究[J].计算机研究与发展,2006,43(z2):133-139. 被引量:5
  • 2郜时红,刘国华,聂俊岚,钱颖.基于先验知识的视图发布安全问题的研究[J].计算机研究与发展,2006,43(z3):206-211. 被引量:4
  • 3杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 4LIU Guohua GAO Shihong.A Method of Eliminating Information Disclosure in View Publishing[J].Wuhan University Journal of Natural Sciences,2006,11(6):1753-1756. 被引量:4
  • 5Sweeney L. K-Anonymity, A model for protecting privacy [J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5): 557-570
  • 6Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression [J]. International Journal of Uncertainty, Fuzziness and Knowledge Based Systems, 2002, 10(5): 571-588
  • 7Sweeney L. Guaranteeing anonymity when sharing medical data: The datafly system [J]. Journal of the American Medical Informatics Association. 1997, 4(Suppl): 51-55
  • 8Hundepool A, Willenborg L. μ-and τ-argus: Software for statistical disclosure control [C]//Proc of the 3rd Int Seminar on Statistical Confidentiality. Ljubliana: Eurostat-Statistical Office of the Republic of Slovenia, 1996:208-217
  • 9Meyerson A, Williams R. On the complexity of optimal k- anonymity [C] //Proc of the ACM Syrup on Principles of Database Systems. New York: ACM, 2004:223-228
  • 10Aggarwal G, Feder T, Kenthapadi K, et al. k-anonymity: Algorithms and hardness, 2004-22 [R]. California: Stanford University, 2004

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部