1 |
Gartner, "Predict 2010: Social Software Is an Enterprise Reality", 2009.12.
|
2 |
머니투데이, "카드한장 가입했는데.. 개인정보 250곳에 뿌려진다", http://mt.co.kr/view/mtview.php ?type=1&no=20120326609105768384&outlink=1, 2012. 3. 27.
|
3 |
한국경제신문, "구글 개인정보 통합관리는 프라이버시침해" http://hankyung.com/news/app/newsview. php?aid=2012032676401, 2012.3.26.
|
4 |
B. Zou and J. Pei, "Preserving privacy in social networks against neighborhood attacks", IEEE 24th International Conference on Data Engineering, pp.506-515, 2008.
|
5 |
K. Liu and E. Terzi, "Towards identity anonymization on graphs", ACM SIGMOD Conference, pp.93-106, 2008.
|
6 |
M. Hay, G. Miklau, D. Jensen, D. Towsley and P. Weis, "Resisting structural re-identification in anonymized social networks", VLDB Endowment, vol.1, no.1, pp.102-144, 2008.
DOI
|
7 |
L. Zou, L. Chen and M. T. Ozsu, "k-automorphism: A general framework for privacy preserving network publication", VLDB Endowment, vol.2, no.1, pp.946-957. 2010.
|
8 |
M. K. Sung, K. Y. Lee, J. Shin and Y. D. Chung, "A privacy protection method for social network data against content/degrees attacks", IEICE Transactions on Information and Systems, vol. E95-D, no. 1, Jan. 2012.
|
9 |
성민경, 정연돈, "소설 네트워크 데이터의 프라이버시 보호배포를 위한 모델," 정보과학회논문지:데이터베이스, 제37권, 제4호, 2010년 8월.
|
10 |
L. Sweeney, "k-anonymity: A model for protecting privacy", International Journal on Uncertainty, Fuzziness and Knowledge-based System, vol.10, no.3, pp.557-570, 2002.
DOI
|
11 |
A. Machnavajjhala, J. Gehrke, D. Kifer and M. Venkitasubramaniam, "L-diversity: Privacy beyond k-anonymity", International Conference on Data Engineering, pp.24-35, 2006.
|
12 |
X. Xiao and Y. Tao, "m-invariance: Towards privacy preserving re-publication of dynamic datasets", ACM SIGMOD, pp.689-700, 2007.
|
13 |
B. C. M. Fung, K. Wang, A. W. C. Fu and J. Pei, "Anonymity for continuous data publishing", International conference on Extending database technology, pp.264-275, 2008.
|
14 |
X. Xiao and Y. Tao, "Anatomy: Simple and effective privacy preservation" , International conference on Very Large Data Bases, pp.139-150, 2006.
|
15 |
J. W. Byun, A. Karma, E. Bertino and N. Li, "Efficient k-anonymization using clustering techniques", International conference on Database and systems for Advanced applications, pp.188-200, 2007.
|
16 |
E. Zheleva and L. Getoor, "Preserving the privacy of sensitive relationships in graph data", LNCS, 4890, pp.153-171, Springer, Hidelberg, 2008.
|
17 |
A. Campan and T. M. Truta, "Data and structural k-anonymity in social networks" , LNCS, 5456, pp.33-54, Springer, Heidelberg, 2009.
|
18 |
Q. Wei and Y. Lu, " Preservation of privacy in publishing social network data" , International Symposium on Electronic Commerce and Security, pp.421-425, 2008.
|