skip to main content
Visitante
Meu Espaço
Minha Conta
Sair
Identificação
This feature requires javascript
Tags
Revistas Eletrônicas (eJournals)
Livros Eletrônicos (eBooks)
Bases de Dados
Bibliotecas USP
Ajuda
Ajuda
Idioma:
Inglês
Espanhol
Português
This feature required javascript
This feature requires javascript
Primo Search
Busca Geral
Busca Geral
Acervo Físico
Acervo Físico
Produção Intelectual da USP
Produção USP
Search For:
Clear Search Box
Search in:
Busca Geral
Or select another collection:
Search in:
Busca Geral
Busca Avançada
Busca por Índices
This feature requires javascript
Tipo de recurso
criteria input
qualquer lugar do registro
no título
como autor
no assunto
Data de publicação
lsr01
lsr02
lsr03
lsr04
Orientador
Show Results with:
no título
Show Results with:
qualquer lugar do registro
no título
como autor
no assunto
Data de publicação
lsr01
lsr02
lsr03
lsr04
Orientador
Mostra resultados com:
criteria input
que contêm minhas palavras de busca
com a frase exata
começa com
Mostra resultados com:
Índice
criteria input
E
OU
NÃO
This feature requires javascript
Toward inference attacks for k-anonymity
Sun, Yan ; Yin, Lihua ; Liu, Licai ; Xin, Shuang
Personal and ubiquitous computing, 2014-12, Vol.18 (8), p.1871-1880
[Periódico revisado por pares]
London: Springer London
Texto completo disponível
Citações
Citado por
Exibir Online
Detalhes
Resenhas & Tags
Mais Opções
Nº de Citações
This feature requires javascript
Enviar para
Adicionar ao Meu Espaço
Remover do Meu Espaço
E-mail (máximo 30 registros por vez)
Imprimir
Link permanente
Referência
EasyBib
EndNote
RefWorks
del.icio.us
Exportar RIS
Exportar BibTeX
This feature requires javascript
Título:
Toward inference attacks for k-anonymity
Autor:
Sun, Yan
;
Yin, Lihua
;
Liu, Licai
;
Xin, Shuang
Assuntos:
Algorithmics. Computability. Computer arithmetics
;
Algorithms
;
Anonymity
;
Applied sciences
;
Approximation
;
Combinatorics
;
Combinatorics. Ordered structures
;
Computer privacy
;
Computer Science
;
Computer science
;
control theory
;
systems
;
Exact sciences and technology
;
Graph theory
;
Graphs
;
Inference
;
Information retrieval. Graph
;
Mathematics
;
Memory and file management (including protection and security)
;
Memory organisation. Data processing
;
Mobile Computing
;
Optimization
;
Original Article
;
Personal Computing
;
Privacy
;
Sciences and techniques of general use
;
Software
;
Strategy
;
Theoretical computing
;
User Interfaces and Human Computer Interaction
É parte de:
Personal and ubiquitous computing, 2014-12, Vol.18 (8), p.1871-1880
Notas:
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
Descrição:
Current research still cannot effectively prevent an inference attacker from inferring privacy information for k -anonymous data sets. To solve the issue, we must first study all kinds of aggressive reasoning behaviors and process for the attacker thoroughly. Our work focuses on describing comprehensively the inference attack and analyzing their privacy disclosures for k -anonymous data sets. In this paper, we build up a privacy inference graph based on attack graph theory, which is an extension of attack graph. The privacy inference graph describes comprehensively the inference attack in k -anonymous databases by considering attacker background knowledge and external factors. In the privacy inference graph, we introduce a concept of valid inference path to analyze the privacy disclosures in face of inference attack. According to both above, we design an algorithm to compute the n -valid inference paths. These paths can deduce some privacy information resulting in privacy disclosure. Moreover, we study the optimal privacy strategies to resist inference attack by key attribute sets and valid inference paths in the attack graph. An approximate algorithm is designed to obtain the approximate optimal privacy strategy set. At last, we prove the correctness in theory and analyze the performance of the approximate algorithm and their time complexity.
Editor:
London: Springer London
Idioma:
Inglês
Links
View record in Pascal Francis
This feature requires javascript
This feature requires javascript
Voltar para lista de resultados
Anterior
Resultado
6
Avançar
This feature requires javascript
This feature requires javascript
Buscando em bases de dados remotas. Favor aguardar.
Buscando por
em
scope:(USP_PRODUCAO),scope:(USP_EBOOKS),scope:("PRIMO"),scope:(USP),scope:(USP_EREVISTAS),scope:(USP_FISICO),primo_central_multiple_fe
Mostrar o que foi encontrado até o momento
This feature requires javascript
This feature requires javascript