References
- Gartner, "Predict 2010: Social Software Is an Enterprise Reality", 2009.12.
- 머니투데이, "카드한장 가입했는데.. 개인정보 250곳에 뿌려진다", http://mt.co.kr/view/mtview.php ?type=1&no=20120326609105768384&outlink=1, 2012. 3. 27.
- 한국경제신문, "구글 개인정보 통합관리는 프라이버시침해" http://hankyung.com/news/app/newsview. php?aid=2012032676401, 2012.3.26.
- B. Zou and J. Pei, "Preserving privacy in social networks against neighborhood attacks", IEEE 24th International Conference on Data Engineering, pp.506-515, 2008.
- K. Liu and E. Terzi, "Towards identity anonymization on graphs", ACM SIGMOD Conference, pp.93-106, 2008.
- M. Hay, G. Miklau, D. Jensen, D. Towsley and P. Weis, "Resisting structural re-identification in anonymized social networks", VLDB Endowment, vol.1, no.1, pp.102-144, 2008. https://doi.org/10.14778/1453856.1453873
- L. Zou, L. Chen and M. T. Ozsu, "k-automorphism: A general framework for privacy preserving network publication", VLDB Endowment, vol.2, no.1, pp.946-957. 2010.
- M. K. Sung, K. Y. Lee, J. Shin and Y. D. Chung, "A privacy protection method for social network data against content/degrees attacks", IEICE Transactions on Information and Systems, vol. E95-D, no. 1, Jan. 2012.
- 성민경, 정연돈, "소설 네트워크 데이터의 프라이버시 보호배포를 위한 모델," 정보과학회논문지:데이터베이스, 제37권, 제4호, 2010년 8월.
- L. Sweeney, "k-anonymity: A model for protecting privacy", International Journal on Uncertainty, Fuzziness and Knowledge-based System, vol.10, no.3, pp.557-570, 2002. https://doi.org/10.1142/S0218488502001648
- A. Machnavajjhala, J. Gehrke, D. Kifer and M. Venkitasubramaniam, "L-diversity: Privacy beyond k-anonymity", International Conference on Data Engineering, pp.24-35, 2006.
- X. Xiao and Y. Tao, "m-invariance: Towards privacy preserving re-publication of dynamic datasets", ACM SIGMOD, pp.689-700, 2007.
- B. C. M. Fung, K. Wang, A. W. C. Fu and J. Pei, "Anonymity for continuous data publishing", International conference on Extending database technology, pp.264-275, 2008.
- X. Xiao and Y. Tao, "Anatomy: Simple and effective privacy preservation" , International conference on Very Large Data Bases, pp.139-150, 2006.
- J. W. Byun, A. Karma, E. Bertino and N. Li, "Efficient k-anonymization using clustering techniques", International conference on Database and systems for Advanced applications, pp.188-200, 2007.
- E. Zheleva and L. Getoor, "Preserving the privacy of sensitive relationships in graph data", LNCS, 4890, pp.153-171, Springer, Hidelberg, 2008.
- A. Campan and T. M. Truta, "Data and structural k-anonymity in social networks" , LNCS, 5456, pp.33-54, Springer, Heidelberg, 2009.
- Q. Wei and Y. Lu, " Preservation of privacy in publishing social network data" , International Symposium on Electronic Commerce and Security, pp.421-425, 2008.