男学院 发表于 2025-3-25 05:57:48

http://reply.papertrans.cn/87/8633/863278/863278_21.png

Canyon 发表于 2025-3-25 07:45:24

http://reply.papertrans.cn/87/8633/863278/863278_22.png

抵制 发表于 2025-3-25 15:22:48

How Anonymous Is k-Anonymous? Look at Your Quasi-ID shown to be a necessary refinement. The concept of .-anonymity defined in a world without using QI is an interesting artifact itself, but more importantly, it provides a sound framework to gauge the use of QI for .-anonymization.

并置 发表于 2025-3-25 18:25:33

http://reply.papertrans.cn/87/8633/863278/863278_24.png

拖网 发表于 2025-3-25 23:32:09

http://reply.papertrans.cn/87/8633/863278/863278_25.png

共同时代 发表于 2025-3-26 02:39:45

http://reply.papertrans.cn/87/8633/863278/863278_26.png

thrombosis 发表于 2025-3-26 05:06:04

Query Rewriting for Access Control on Semantic Webn the Semantic Web. We propose to specify the security policies for access restrictions on resources as views declared based on ontologies. Illustrated examples are presented in the paper for explaining the underlying concepts. In addition, bucket-based algorithms are proposed for supporting the query rewriting.

epinephrine 发表于 2025-3-26 08:33:17

An Anonymity Model Achievable Via Microaggregationversity and .-closeness. We identify some shortcomings of those models and propose a new model called (.,.,.,.)-anonymity. Also, we propose a computational procedure to achieve this new model that relies on microaggregation.

NAVEN 发表于 2025-3-26 13:32:35

http://reply.papertrans.cn/87/8633/863278/863278_29.png

为现场 发表于 2025-3-26 20:43:41

http://reply.papertrans.cn/87/8633/863278/863278_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Secure Data Management; 5th VLDB Workshop, S Willem Jonker,Milan Petković Conference proceedings 2008 Springer-Verlag Berlin Heidelberg 200