References
- L. Sweeney, "Uniqueness of Simple Demographics in the U.S. Population," Carnegie Mellon University, Laboratory for International Data Privacy, 2000.
- L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-based System, vol.10, no.3, pp.557-570, 2002.
- A. Machanavajjhala, J.Gehrke, D. Kifer, and M. Venkitasubramaniam, "L-diversity: Privacy beyond k-anonymity," In Proceedings of International Conference on Data Engineering, p.24, 2006.
- E. Zheleva, and L. Getoor, "Preserving the privacy of sensitive relationships in graph data," In Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD, pp.153-171, 2007.
- A. Campan, and T.M. Truta, "A clustering approach for data and structural anonymity in social networks," In Proceedings of the 2nd ACM SIGKDD international conference on Privacy, security, and trust in KDD, pp.33-54, 2008.
- Q. Wei, and Y. Lu, "Preservation of Privacy in Publishing Social Network Data," In Proceedings of the 2008 International Symposium on Electronic Commerce and Security, pp.421-425, 2008.
- X. Xiao, and Y. Tao, "m-invariance: Towards privacy preserving re-publication of dynamic datasets," In Proceedings of the ACM SIGMOD, pp.689-700, 2007.
- J.W. Byun, Y. Sohn, E. Bertino, and N. Li, "Secure anonymization for incremental datasets," In Proceedings of the VLDB Workshop on Secure Data Management, pp.48-63, 2006.
- B.C.M. Fung, K. Wang, A.W.C. Fu, and J. Pei, "Anonymity for continuous data publishing," In Proceedings of the 11th international conference on Extending database technology, pp.264-275, 2008.
- L. Backstrom, C. Dwork, and J. Kleinberg, "Wherefore art thou R3579X? anonymized social networks, hidden patterns, and structural steganography," In Proceedings of the international conference on World Wide Web, pp.181-190, 2007.
- B. Zou, and J. Pei, "Preserving privacy in social networks against neighbourhood attacks," In Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, pp.506-515, 2008.
- K. Liu, and E. Terzi, "Towards identity anonymization on graphs," In Proceedings of the ACM SIGMOD, pp.93-106, 2008.
- M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis, "Resisting structural re-identification in anonymized social networks," In Proceedings of the VLDB Endowment, vol.1, no.1, pp.102-114, 2008.
- L. Zou, L. Chen, and M.T. Ozsu, "k-automorphism: A general framework for privacy preserving network publication," In Proceedings of the VLDB Endowment, vol.2, no.1, pp.946-957, 2009.
- X. Xiao, and Y. Tao, "Anatomy : Simple and Effective Privacy Preservation," In Proceedings of International Conference on Very Large Data Bases, pp.139-150, 2006.
- Y. Ye, Q. Deng, C. Wang, D. Lv, Y. Liu and J. Feng, "BSGI : An effective algorithm towards stronger l-diversity," In Proceedings of the 19th International conference on Database and Expert Systems Applications, pp.19-32, 2008.
- J.W. Byun, A. Kamra, E. Bertino, and N.Li, "Efficient k-anonymization using clustering techniques," In Proceedings of the 12th international conference on Database and systems for Advanced applications, pp.188-200, 2007.
- P. Erdos, and T. Gallai, "Graphs with prescribed degrees of vertices," Mat.Lapok, 1960.
- D.J. Newman, S.Hettich, C.L. Blake, and C.J. Merz. "UCI Repository of Machine Learning Databases," http://archive.ics.uci.edu/ml/
- A.L. Barabasi, "Linked: The new science of networks," Basic Book, 2002.
- D.A. Bader and K. Madduri, "GTGraph: A synthetic graph generator suite," http://sdm.lbl.gov/~kamesh/software/GTgraph/