[1]Li Guojie,Cheng Xueqi.Big data research:The future of science and technology and economic and social development of major strategic areasbig data research present situation and the scientific thinking [J].Proceedings of the Chinese Academy of Sciences,2012,27 (6):947657.(in Chinese)
[2]Chen M Y,Yang C C,Hwang M S.Privacy protection data access control[J].International Journal of Network Security,2013,15(6):391399.
[3]Liu Yahun,Zhang Tieying,Jin Xiaolong,et al.The era of big data privacy protection [J].Journal of Computer Research and Development,2015,52 (1):229247.(in Chinese)
[4]Li Shuning.User stories sensitive digital information service model[J].The Concept of Library Intelligence,2011 (7):4549.(in Chinese)
[5]Sweeney L.Kanonymity:A model for protecting privacy [J].International Journal on Uncertainty,Fuzziness and Knowledgebased Systems,2002,10(5):557570.
[6]Machanavajjhala A,Kifer D,Gehrkeetc J.Ldiversity:Privacy beyond kanonymity[J].ACM Transactions on Knowledge Discovery from Data (TKDD),2007,1(1):3.
[7]Meyerson A,Williams R.On the complexity of optimal Kanonymity[C]∥Proc of Symposium on Principles of Database Systems (PODS),2004:223228.
[8]Seisungsittisunti B,Natwichai J.An efficient algorithm for incremental privacy breach on (k,e)anonymous model[C]∥Proc of the 16th NBiS International Conference on Networkbased Information Systems,2013:1.
[9]Natwichai J, Li X, Kawtrkul A. Incremental processing and indexing for (k,e)anonymization[J].International Journal of Information & Comput Security, 2013,5(3):15170.
[10]Tong Yunhai,Dong You,Tang Shiwei,et al.Identityreserved anonymity in privacy preserving data publishing[J].Journal of Software,2010,21(4):771781.(in Chinese)
[11]Fung B C,Wang K,Yu P S.Anonymizing classification data for privacy preservation[J].IEEE Transactions on Knowledge and Data Engineering(TKDE),2007,19(5):711725.
[12]Sweeney L.Achieving kanonymity privacy protection using generalization and suppression[J].International Journal of Uncertainty,Fuzziness and Knowledgebased Systems,2002,10(5):571588.
[13]Chen Y A,Tao H.ANGEL:Enhancing the utility of generalization for privacy preserving publication[J].IEEE Transactions on Knowledge and Data Engineering,2009,21(7):10731087.
[14]Xiao X,Tao Y.Anatomy:Simpleand effective privacy preservation[C]∥Proc of VLDB 2006,2006:139150.
[15]Zhang Q, Koudas N, Srivastava D, et al.Aggregate query answering in anonymized tables[C]∥Proc of the 23rd International Conference on Data Engineering(ICDE),2007:116125.
[16]Bowonsak S, Juggapong N. An incremental privacypreservation algorithm for the (k,e)Anonymous model [J].Computers and Electrical Engineering,2015,41:126141.
[17]Yang Jing,Zhao Jiashi,Zhang Jianpei.A privacy preservation method for high dimensional data mining [J].Acta Electronica Sinica,2013,41(11):21872192.(in Chinese)
[18]Bayardo R J, Agrawal R. Data privacy through optimal kanonymization[C]∥Proc of the 21st IEEE International Conference on Data Engineering,2005:217228.
附中文参考文献:
[1]李国杰,程学旗.大数据研究:未来科技及经济社会发展的重大战略领域—大数据的研究现状与科学思考[J].中国科学院院刊,2012,27(6):947657.
[3]刘雅辉,张铁赢,靳小龙,等.大数据时代的个人隐私保护[J].计算机研究与发展,2015,52(1):229247.
[4]李书宁.用户情景敏感数字信息服务的概念模型[J].图书情报工作,2011(7):4549.
[10]童云海,陶有东,唐世渭,等.隐私保护数据发布中身份保护与匿名方法[J].软件学报,2010,21(4):771781.
[17]杨静,赵家石,张健沛.一种面向高维数据挖掘的隐私保护方法[J].电子学报,2013,41(11):21872192.