期刊文献+

技术赋能下电子档案数据脱敏应用研究 被引量:3

Research on the Application of Data Desensitization in Electronic Archives under the Empowerment of Technology
下载PDF
导出
摘要 本文对数据脱敏技术及数据脱敏模型进行了介绍与分析,针对电子档案的敏感数据特征,将K-匿名和L-多样性模型应用到电子档案敏感数据保护中,旨在提高对电子档案的敏感数据的保护能力。 In this paper, the data masking technology and data masking model are introduced and analyzed, and the K-anonymity and L-diversity models are applied to the sensitive data protection of electronic archives to enhance the protection ability of sensitive data of electronic archives.
作者 陈勇 姚燕珠 Chen Yong;Yao Yanzhu
出处 《档案管理》 北大核心 2022年第6期42-44,共3页 Archives Management
基金 国家社会科学基金项目“信息网络技术驱动档案移动服务创新路径研究”(项目批准号20BTQ103)阶段性研究成果。
关键词 电子档案 数据安全 数据脱敏 数据脱敏技术 Electronic archives Data security Data masking Data masking technology
  • 相关文献

参考文献13

二级参考文献83

  • 1杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 2Machanavajjhala A,Gehrke J,Kifer D.l-Diversity:Privacy beyond K-anonymity.In:Liu L,Reuter A,Whang KY,Zhang J,eds.Proc.of the 22nd Int'l Conf.on Data Engineering.Atlanta:IEEE Computer Society,2006.24-35.
  • 3Wong RC,Li J,Fu AW,Wang K.(a,k)-Anonymity:An enhanced K-anonymity model for privacy-preserving data publishing.In:Eliassi-Rad T,Ungar LH,Craven M,Gunopulos D,eds.Proc.of the 12th Int'l Conf.on Knowledge Discovery and Data Mining.New York:ACM Press,2006.754-759.
  • 4Li N,Li T,Venkatasubramanian S.t-Closeness:Privacy beyond k-anonymity and l-diversity.In:Dogac A,Ozsu T,Sellis T,eds.Proc.of the 23rd Int'l Conf.on Data Engineering.Istanbul:IEEE Computer Society,2007.106-115.
  • 5Xiao X,Tao Y.Personalized privacy protecting.In:Chaudhuri S,Hristidis V,Polyzotis N,eds.Proc.of the Int'l Conf.on Management of Data.Chicago:ACM Press,2006.229-240.
  • 6Fung BCM,Wang K,Yu PS.Top-Down specialization for information and privacy preservation.In:Aberer K,Franklin M,Nishio S,eds.Proc.of the 21st Int'l Conf.on Data Engineering.Tokyo:IEEE Computer Society,2005.205-216.
  • 7LeFevre K,DeWitt DJ,Ramakrishnan R.Incognito:Efficient full-domain K-anonymity.In:Ozcan F,ed.Proc.Of the Int'l Conf.On Management of Data.Maryland:ACM Press,2005.49-60.
  • 8Aggarwal G,Feder T,Kenthapadi K,Motwani R,Panigrahy R,Thomas D,Zhu A.Anonymizing tables.In:Eiter T,Libkin L,eds.Proc.of the 10th Int'l Conf.on Database Theory.Edinburgh:Springer-Verlag,2005.246-258.
  • 9Wang K,Fung BCM.Anonymizing sequential releases.In:Eliassi-Rad T,Ungar LH,Craven M,Gunopulos D,eds.Proc.of the 12th Int'l Conf.on Knowledge Discovery and Data Mining.Philadelphia:ACM Press,2006.414-423.
  • 10Xiao X,Tao Y.Anatomy:Simple and effective privacy preservation.In:Dayal U,Whang KY,Lomet DB,Alonso G,Lohman GM,Kersten ML,Cha SK,Kim YK,eds.Proc.of the 32nd Int'l Conf.on Very Large Data Bases.Seoul:VLDB Endowment,2006.139-150.

共引文献191

同被引文献29

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部