男学院 发表于 2025-3-25 05:57:48
http://reply.papertrans.cn/87/8633/863278/863278_21.pngCanyon 发表于 2025-3-25 07:45:24
http://reply.papertrans.cn/87/8633/863278/863278_22.png抵制 发表于 2025-3-25 15:22:48
How Anonymous Is k-Anonymous? Look at Your Quasi-ID shown to be a necessary refinement. The concept of .-anonymity defined in a world without using QI is an interesting artifact itself, but more importantly, it provides a sound framework to gauge the use of QI for .-anonymization.并置 发表于 2025-3-25 18:25:33
http://reply.papertrans.cn/87/8633/863278/863278_24.png拖网 发表于 2025-3-25 23:32:09
http://reply.papertrans.cn/87/8633/863278/863278_25.png共同时代 发表于 2025-3-26 02:39:45
http://reply.papertrans.cn/87/8633/863278/863278_26.pngthrombosis 发表于 2025-3-26 05:06:04
Query Rewriting for Access Control on Semantic Webn the Semantic Web. We propose to specify the security policies for access restrictions on resources as views declared based on ontologies. Illustrated examples are presented in the paper for explaining the underlying concepts. In addition, bucket-based algorithms are proposed for supporting the query rewriting.epinephrine 发表于 2025-3-26 08:33:17
An Anonymity Model Achievable Via Microaggregationversity and .-closeness. We identify some shortcomings of those models and propose a new model called (.,.,.,.)-anonymity. Also, we propose a computational procedure to achieve this new model that relies on microaggregation.NAVEN 发表于 2025-3-26 13:32:35
http://reply.papertrans.cn/87/8633/863278/863278_29.png为现场 发表于 2025-3-26 20:43:41
http://reply.papertrans.cn/87/8633/863278/863278_30.png