期刊文献+

一个简单的学生成绩发布方法

A Simple Data Publication Method for Student Achievement
下载PDF
导出
摘要 对学生学习成绩的分析,能够为教学模式的改进提供一些有价值的信息。分析学习成绩的同时,学生的个人隐私也需要得到保护,这就需要一个安全有效的学生成绩发布方法。本文在先前工作的基础上,提出了一个简单实用的学生成绩发布方法,并验证了它的安全性。 The analysis of student achievement can provide valuable information for teaching model reform.When analyzing the academic achievement,the private of students should be protected.So a safe and effective data publication method for student achievement is needed.This paper provides a simple practical student achievement publication method based on previous work and verifies its security.
作者 易通 石民勇 YI Tong;SHI Min-yong(School of Computer Science,Communication University of China,Beijing 100024,China)
出处 《中国传媒大学学报(自然科学版)》 2017年第3期19-24,共6页 Journal of Communication University of China:Science and Technology
关键词 学习成绩 隐私 安全 数据发布 student achievement privacy security data publication
  • 相关文献

参考文献5

二级参考文献55

  • 1杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 2Machanavajjhala A,Gehrke J,Kifer D.l-Diversity:Privacy beyond K-anonymity.In:Liu L,Reuter A,Whang KY,Zhang J,eds.Proc.of the 22nd Int'l Conf.on Data Engineering.Atlanta:IEEE Computer Society,2006.24-35.
  • 3Wong RC,Li J,Fu AW,Wang K.(a,k)-Anonymity:An enhanced K-anonymity model for privacy-preserving data publishing.In:Eliassi-Rad T,Ungar LH,Craven M,Gunopulos D,eds.Proc.of the 12th Int'l Conf.on Knowledge Discovery and Data Mining.New York:ACM Press,2006.754-759.
  • 4Li N,Li T,Venkatasubramanian S.t-Closeness:Privacy beyond k-anonymity and l-diversity.In:Dogac A,Ozsu T,Sellis T,eds.Proc.of the 23rd Int'l Conf.on Data Engineering.Istanbul:IEEE Computer Society,2007.106-115.
  • 5Xiao X,Tao Y.Personalized privacy protecting.In:Chaudhuri S,Hristidis V,Polyzotis N,eds.Proc.of the Int'l Conf.on Management of Data.Chicago:ACM Press,2006.229-240.
  • 6Fung BCM,Wang K,Yu PS.Top-Down specialization for information and privacy preservation.In:Aberer K,Franklin M,Nishio S,eds.Proc.of the 21st Int'l Conf.on Data Engineering.Tokyo:IEEE Computer Society,2005.205-216.
  • 7LeFevre K,DeWitt DJ,Ramakrishnan R.Incognito:Efficient full-domain K-anonymity.In:Ozcan F,ed.Proc.Of the Int'l Conf.On Management of Data.Maryland:ACM Press,2005.49-60.
  • 8Aggarwal G,Feder T,Kenthapadi K,Motwani R,Panigrahy R,Thomas D,Zhu A.Anonymizing tables.In:Eiter T,Libkin L,eds.Proc.of the 10th Int'l Conf.on Database Theory.Edinburgh:Springer-Verlag,2005.246-258.
  • 9Wang K,Fung BCM.Anonymizing sequential releases.In:Eliassi-Rad T,Ungar LH,Craven M,Gunopulos D,eds.Proc.of the 12th Int'l Conf.on Knowledge Discovery and Data Mining.Philadelphia:ACM Press,2006.414-423.
  • 10Xiao X,Tao Y.Anatomy:Simple and effective privacy preservation.In:Dayal U,Whang KY,Lomet DB,Alonso G,Lohman GM,Kersten ML,Cha SK,Kim YK,eds.Proc.of the 32nd Int'l Conf.on Very Large Data Bases.Seoul:VLDB Endowment,2006.139-150.

共引文献132

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部