期刊文献+

数字图书馆用户身份匿名化研究 被引量:1

Research on Anonymization of User Identity in Digital Library
下载PDF
导出
摘要 在数字图书馆信息发布中用户身份信息是进行数据分析的重要依据。建立一种保留用户身份的匿名数据发布模型,对用户属性进行合理化选择,采用匿名方式划分用户身份得到用户类,通过用户类与借阅信息的链接得到用户身份与借阅信息的映射关系,从而发布包含用户身份的匿名数据。实验结果表明,保留用户身份的匿名发布能在保障用户安全的前提下,较好地实现数字图书馆数据的可利用性,整体提高数字图书馆的服务质量。 In the information publishing of digital library, user identity information is the important basis for data analysis. This paper builds an anonymous data publishing, makes reasonable selection for user attributes, and partitions the user identity to get the user class by anonymous way. Through connection of user classes and borrowing information, the mapping relationship between user identity and borrowing information is obtained, thus releasing the anonymous data which retains user identity. Experimental results show that under the premise of user security, the anonymity publishing which retains user identity can better realize usefulness of digital library data, and improve the quality of service of digital library as a whole.
作者 贾俊杰 陈菲
出处 《计算机工程》 CAS CSCD 北大核心 2016年第12期290-294,301,共6页 Computer Engineering
基金 兰州市科技计划项目"数字图书馆信息服务平台的匿名发布技术研究"(20141256)
关键词 数字图书馆 数据发布 隐私保护 K-匿名 微聚集 digital library data publishing privacy protection k-anonymity micro-aggregation
  • 相关文献

参考文献7

二级参考文献255

  • 1宋丽哲,牛振东,宋瀚涛,余正涛,师雪霖.数字图书馆个性化服务用户模型研究[J].北京理工大学学报,2005,25(1):58-62. 被引量:45
  • 2李洁,高新波,焦李成.基于特征加权的模糊聚类新算法[J].电子学报,2006,34(1):89-92. 被引量:113
  • 3杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 4杨润,杨赟,孟旭东.下一代网络环境中上下文感知应用提供框架[J].桂林电子工业学院学报,2006,26(4):246-250. 被引量:1
  • 5彭京,唐常杰,程温泉,石葆梅,乔少杰.一种基于层次距离计算的聚类算法[J].计算机学报,2007,30(5):786-795. 被引量:11
  • 6Samarati P, Sweeney L. Generalizing data to provide anonymity when disclosing information (abstract) [A ]. Proc of the 17th ACM-SIGMOD-SIGACT-SIGART Symposium on the Principles of Database Systems[C]. Seattle, WA, USA: IEEE press, 1998.188.
  • 7Samarafi P. Protecting respondents' identities in microdata release[J]. IEEE Transactions on Knowledge and Data Engineering,2001,13(6) : 1010 - 1027.
  • 8Sweeney L. K-anonymity: a model for protecting privacy[J]. International Journal on Uncertainty, Fuzziness and Knowledge- Based Systems,2002,10(5) :557 - 570.
  • 9Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression[ J]. International Jounlal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002, 10 (5) :571 - 588.
  • 10Iyengar V. Transforming data to satisfy privacy constraints[A]. Proc of the 12th ACM SIGKDD Conference [C]. Edmonton, Alberta, Canada: ACM Press, 2002.279 - 288.

共引文献2485

同被引文献34

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部