男学院
发表于 2025-3-25 05:57:48
http://reply.papertrans.cn/87/8633/863278/863278_21.png
Canyon
发表于 2025-3-25 07:45:24
http://reply.papertrans.cn/87/8633/863278/863278_22.png
抵制
发表于 2025-3-25 15:22:48
How Anonymous Is k-Anonymous? Look at Your Quasi-ID shown to be a necessary refinement. The concept of .-anonymity defined in a world without using QI is an interesting artifact itself, but more importantly, it provides a sound framework to gauge the use of QI for .-anonymization.
并置
发表于 2025-3-25 18:25:33
http://reply.papertrans.cn/87/8633/863278/863278_24.png
拖网
发表于 2025-3-25 23:32:09
http://reply.papertrans.cn/87/8633/863278/863278_25.png
共同时代
发表于 2025-3-26 02:39:45
http://reply.papertrans.cn/87/8633/863278/863278_26.png
thrombosis
发表于 2025-3-26 05:06:04
Query Rewriting for Access Control on Semantic Webn the Semantic Web. We propose to specify the security policies for access restrictions on resources as views declared based on ontologies. Illustrated examples are presented in the paper for explaining the underlying concepts. In addition, bucket-based algorithms are proposed for supporting the query rewriting.
epinephrine
发表于 2025-3-26 08:33:17
An Anonymity Model Achievable Via Microaggregationversity and .-closeness. We identify some shortcomings of those models and propose a new model called (.,.,.,.)-anonymity. Also, we propose a computational procedure to achieve this new model that relies on microaggregation.
NAVEN
发表于 2025-3-26 13:32:35
http://reply.papertrans.cn/87/8633/863278/863278_29.png
为现场
发表于 2025-3-26 20:43:41
http://reply.papertrans.cn/87/8633/863278/863278_30.png