Acknowledgement
Grant : ICBMS 플랫폼 간 정보모델 연동 및 서비스 매쉬업을 위한 스마트 중재 기술 개발
Supported by : 정보통신기술진흥센터
References
- Chikwang Hwang, Jongwon Choe, Choong Seon Hong, "A Study on Service-based Secure Anonymization for Data Utility Enhancement," Journal of KIISE, Vol. 42, No. 5, pp. 681-689, May. 2015. (in Korean) https://doi.org/10.5626/JOK.2015.42.5.681
- L. Sweeny, "k-anonymity: a model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, Vol. 10, No. 5, pp. 557-570, 2012. https://doi.org/10.1142/S0218488502001648
- Byun, Ji-Won, et al., "Efficient k-anonymization using clustering techniques," International Conference on Database Systems for Advanced Applications, pp. 188-200, Apr. 2007.
- Lin, Jun-Lin, and Meng-Cheng Wei, "Genetic algorithm- based clustering approach for k-anonymization," Journal of Expert Systems with Applications, Vol. 36, No. 6, pp. 9784-9792, Dec. 2009. https://doi.org/10.1016/j.eswa.2009.02.009
- Li, Tiancheng, and Ninghui Li, "On the tradeoff between privacy and utility in data publishing," ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 517-526, Jun. 2009.
- H. Kim, "Privacy Preserving for Statistical Anonymity," NIA Privacy Issues, No. 2, Jun. 2012. (in Korean)
- Xiaoshuang Xu, Masayuki Numao, "An Efficient Clustering Method for k-Anonymization," International Symposium on Computing and Networking, pp. 499-502, Dec. 2015.
- ARX, [Online], Available: http://arx.deidentifier.org/
- Java-ML, [Online], Available: http://java-ml.sourceforge.net/