[1]Samarati P, Sweeney L. Protecting Privacy When Disclosing Information: Kanonymity and Its Enforcement Through Generalization and Suppression[R]. Technical Report SRLCSL9804, SRI Computer Science Laboratory, 1998.
[2]Sweeney L. Kanonymity: A Model for Protecting Privacy[J]. International Journal of Uncertainty, Fuzziness and KnowledgeBased Systems, 2002,10(5):557570.
[3]Sweeney L. Achieving Kanonymity Privacy Protection Using Generalization and Suppression[J]. International Journal of Uncertainty, Fuzziness and KnowledgeBased Systems, 2002,10(5):571588.
[4]Sun Xiaoxun, Sun Lili, Wang Hua. Extended Kanonymity Models Against Sensitive Attribute Disclosure[J]. Computer Communications, 2011,34(4):526535.
[5]Sarma A D, Nabar S U, Widom J. Representing Uncertain Data: Uniqueness, Equivalence Minimization, and Approximation[R]. Technical Report,Stanford Infolab,2005.
[6]Imielinski T, Lipski W. Incomplete Information in Relational Databases[J]. Journal of the Association for Computing Machinery, 1984,31(4):761791.
[7]Sarma A D, Benjelloun O, Halevy A, et al. Representing Uncertain Data: Models, Properties, and Algorithms[J]. The VLDB Journal, 2009,18(5):9891019.
[8]Grahne G. Dependency Satisfaction in Databases with Incomplete Information[C]∥Proc of VLDB’84, 1984:3745.
[9]Fuhr N,R¨olleke T. A Probabilistic NF2 Relational Algebra for Imprecision in Databases[R]. Techhical Report,University of Dortmund,1996.
[10]Abiteboul S, Kanellakis P, Grahne G. On the Representation and Querying of Sets of Possible Worlds[J]. Theoretical Computer Science, 1991,78(1):158187.
[11]Lakshmanan L V S, Leone N, Ross R, et al. ProbView: AFlexible Probabilistic Database System[J]. ACM Trans on Database Systems, 1997,22(3):419469.
[12]Widom J. Trio: A System for Integrated Management of Data, Accuracy, and Lineage[C]∥Proc of CIDR’05,2005:262276.
[13]Sarma A D, Benjelloun O, Halevy A, et al. Working Models for Uncertain Data[C]∥Proc of ICDE’06, 2006:7.
[14]Benjelloun O, Sarma A D, Halevy A, et al. ULDBs: Databases with Uncertainty and Lineage[C]∥Proc of VLDB’06,2006:953964.
[15]Chen Ruiwen, Mao Yongyi, Iluju. GRN Model of Probabilistic Databases: Construction, Transition and Querying[C]∥Proc of SIGMOD’10, 2010:15611564.
[16]Cormode G, Srivastava D. Anonymized Data: Generation, Models, Usage[C]∥Proc of SIGMOD’09, 2009:10151018.
[17]Inan A, Kantarcioglu M, Bertino E. Using Anonymized Data for Classification[C]∥Proc of ICDE’09,2009:429440.
[18]Burdick D,Deshpande P M, Jayram T S, et al. OLAP over Uncertain and Imprecise Data[J]. VLDB, 2007,16(1):123144.
[19]Buckles B P, Petry F E. A Fuzzy Model for Relational Databases[J]. International Journal of Fuzzy Sets and Systems, 1982,7.
[20]Antova L, Koch C, Olteanu D. MayBMS: Managing Incomplete Information with Probabilistic WorldSet Decompositions[C]∥Proc of ICDE’07, 2007.
[21]Jampani R, Perez L, Wu M, et al. Mcdb: A Monte Carlo Approach to Managing Uncertain Data[C]∥Proc of ACM SIGMOD’08, 2008:687700.
[22]Cormode G, Srivastava D. Anonymized Data: Generation, Models, Usage[C]∥Proc of SIGMOD’09,2009:10151018.
[23]宋金玲,刘国华,黄立明,等. k匿名方法中相关视图集和准标识符的求解[J]. 计算机研究与发展, 2009, 46(1):7788. |