摘要
保护公开的社会网络数据隐私越来越受到关注。本文简单回顾了现有的隐私保护社会网络数据技术,重点讨论社会网络数据的隐私问题。
出处
《网络安全技术与应用》
2009年第7期42-44,共3页
Network Security Technology & Application
二级参考文献27
-
1王越.组织内社会网络的知识传导及成本研究[J].科学管理研究,2004,22(4):74-77. 被引量:36
-
2杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
-
3张秀仪.利用全国博硕士论文资料库自动化建构知识来源映射网.高雄:国立中山大学资讯管理研究所硕士论文,2004:11
-
4www. orgnet. com/sna. html [ 2005 - 9 - 24]
-
5http ://www. kmmagazine. com/xq/asp/sid. 45D056BE - 8625 -11D7- 9D4D - 00508B44AB3A/articleid. F79B4E31 - 7854-4B6A - 9202 - 164FB18672D3/qx/display. htm[ 2005 - 9 - 25 ]
-
6http ://www. cio.com/archive/O61505/km. html [ 2005 - 9 - 25 ]
-
7Aggarwal C.On k-anonymity and the curse of dimensionality[C].Proc of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, 2005 : 901-909.
-
8Du Wenliang,Attalah M J.Secure multi-problem computation problems and their applications:A review and open problems,CERIAS Tech Report 2001-51[R].Center for Education and Research in Information Assurance and Security and Department of Computer Sciences,Purdue University,West Lafayette,IN 47906,2001,
-
9Bettini C,Wang X S,Jajodia S.Protecting privacy against location based personal identification[C].Proc of the Secure Data Management,Trondheim, Norway, 2005 : 185-199.
-
10Domingo-Ferrer J,Mateo-Sanz J M.Practical data-oriented microaggregation for statistical disclosure control[C].IEEE Transactions on Knowledge and Data Engineering, 2002:189-201.
共引文献50
-
1储节旺,储伊力,黄洁钦,吴凯媛,琚琼,张瑶瑶.隐性知识共享转化与科技信息工作[J].情报学进展,2014(1):388-423.
-
2田宏,万果锋.一种新的网络核心挖掘方法在情报分析中的应用[J].情报学报,2011,30(2):212-218. 被引量:3
-
3朱庆华,李亮.社会网络分析法及其在情报学中的应用[J].情报理论与实践,2008,31(2):179-183. 被引量:292
-
4邓中华.社会网络、引文网络和链接网络之比较[J].图书馆杂志,2008,27(9):6-10. 被引量:14
-
5殷之明,马瑞敏.国内图书情报领域应用SNA研究综述[J].图书情报知识,2009,26(6):64-69. 被引量:7
-
6万颖,金福.基于社会网络方法的企业智力资源管理[J].科技创新导报,2009,6(33):157-158.
-
7赵丹枫,高峰,金顺福,刘国华.基于错检期望值的密文索引技术[J].小型微型计算机系统,2010,31(1):113-118. 被引量:5
-
8杨瑞明,叶金福,邹艳.团队社会网络对团队知识共享作用机制的实证研究[J].情报理论与实践,2010,33(2):68-72. 被引量:6
-
9党洪莉.社会网络分析推进知识的共享与创新[J].图书馆学研究,2010(3):43-44. 被引量:9
-
10顾立平.图书馆管理中社会网络关系的问题解决模式——以香港城市大学图书馆次级团体为例[J].图书馆理论与实践,2010(3):13-17. 被引量:3
同被引文献21
-
1杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
-
2Kolbitsch,J.&Maurer,H.The transformation of the Web:How emerging communities shape the information we consume[J].Journal of Universal Computer Science, 2006, 12 (2) : 187 - 213.
-
3Acquit, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the facebook. In privacy- Enhancing Technologies, LNCS vol. 4258, 6th Workshop on Privacy Enhancing Technologies (pp. 36- 58), Berlin/Heidel berg: Springer.
-
4Flinn, S., & Lumsden, J. (2005). User perceptions of privacy and security on the Web [EB]. http://www.lib.unb. ca/Texts/PST/ 2005/pdf/flinn. pdf, retrieved 2008 - 02 - 27.
-
5Acquisti, A., & Grossklags, J. (2004). Privacy attitudes and privacy behaviour. In J. Camp, & R. Lewis (Eds.), Economics of Information Security, 2004, 12 (13): 165-178, New York, NY: Springer.
-
6Felt, A., & Evans, D. (2007). Privacy protection for social netwotking APIs [EB]. http://www.cs.virginia.edu/felt/privacy/,retrieved 2008 - 02 - 27.
-
7Adamic, L.A., & Adar, E.. Friends and Neighbors on the Web, in First Monday, 2003, 8 (6).
-
8Techcrunch (2008). Data is the new links. Tan berners - lee says sites that don't give usera their data back are boring [ EB ]. In: Techcrunch, http://www.techcrunch.com/2008/02/28/data - is - the - new - links - tim - bemers - lee - sayssites- that - dont - give - users - their - data - back - are - boring/,retrieved 2008 - 02 - 28.
-
9Weiss, S. (2007). The need for a paradigm shift in addressing privacy risks in socialnetworking applications.In:Post-Proceedings:The Future of Identity in the Infromati on Society;Third International Summer School organized by IFIP WG 9.2,9.6/11.7, 11.6 in cooperation with FIDIS Network of Excellence (pp. 161- 171), Sweden: Karlstad.
-
10Zhan J. Secure collaborative social networks [ J ]. Systems, Man, and Cybernetics,2010,40 (6) :682 - 689.
二级引证文献5
-
1严慧,刘晶晶.大数据时代隐私保护研究的前沿议题与演进趋势——基于国内外文献比较的可视化分析[J].政府管理评论,2022(1):128-148.
-
2郭春镇,马磊.大数据时代个人信息问题的回应型治理[J].法制与社会发展,2020,26(2):180-196. 被引量:76
-
3张新平.智能视频监控之法律与技术的嵌合治理[J].法制与社会发展,2020,26(5):206-224. 被引量:16
-
4窦悦,易成岐,黄倩倩,莫心瑶,王建冬,于施洋.打造面向全国统一数据要素市场体系的国家数据要素流通共性基础设施平台——构建国家“数联网”根服务体系的技术路径与若干思考[J].数据分析与知识发现,2022,6(1):2-12. 被引量:18
-
5张潇,周辉,何晶晶,姚宏伟,陈甦,张忠涛.数据治理法制化背景下我国临床研究数据收集和应用新考量[J].中华消化外科杂志,2022,21(1):89-92. 被引量:2