Browse > Article

SNS에서 프라이버시 문제 및 보호방안  

Seong, Min-Gyeong (고려대학교)
Jeong, Yeon-Don (고려대학교)
Publication Information
Keywords
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Gartner, "Predict 2010: Social Software Is an Enterprise Reality", 2009.12.
2 머니투데이, "카드한장 가입했는데.. 개인정보 250곳에 뿌려진다", http://mt.co.kr/view/mtview.php ?type=1&no=20120326609105768384&outlink=1, 2012. 3. 27.
3 한국경제신문, "구글 개인정보 통합관리는 프라이버시침해" http://hankyung.com/news/app/newsview. php?aid=2012032676401, 2012.3.26.
4 B. Zou and J. Pei, "Preserving privacy in social networks against neighborhood attacks", IEEE 24th International Conference on Data Engineering, pp.506-515, 2008.
5 K. Liu and E. Terzi, "Towards identity anonymization on graphs", ACM SIGMOD Conference, pp.93-106, 2008.
6 M. Hay, G. Miklau, D. Jensen, D. Towsley and P. Weis, "Resisting structural re-identification in anonymized social networks", VLDB Endowment, vol.1, no.1, pp.102-144, 2008.   DOI
7 L. Zou, L. Chen and M. T. Ozsu, "k-automorphism: A general framework for privacy preserving network publication", VLDB Endowment, vol.2, no.1, pp.946-957. 2010.
8 M. K. Sung, K. Y. Lee, J. Shin and Y. D. Chung, "A privacy protection method for social network data against content/degrees attacks", IEICE Transactions on Information and Systems, vol. E95-D, no. 1, Jan. 2012.
9 성민경, 정연돈, "소설 네트워크 데이터의 프라이버시 보호배포를 위한 모델," 정보과학회논문지:데이터베이스, 제37권, 제4호, 2010년 8월.
10 L. Sweeney, "k-anonymity: A model for protecting privacy", International Journal on Uncertainty, Fuzziness and Knowledge-based System, vol.10, no.3, pp.557-570, 2002.   DOI
11 A. Machnavajjhala, J. Gehrke, D. Kifer and M. Venkitasubramaniam, "L-diversity: Privacy beyond k-anonymity", International Conference on Data Engineering, pp.24-35, 2006.
12 X. Xiao and Y. Tao, "m-invariance: Towards privacy preserving re-publication of dynamic datasets", ACM SIGMOD, pp.689-700, 2007.
13 B. C. M. Fung, K. Wang, A. W. C. Fu and J. Pei, "Anonymity for continuous data publishing", International conference on Extending database technology, pp.264-275, 2008.
14 X. Xiao and Y. Tao, "Anatomy: Simple and effective privacy preservation" , International conference on Very Large Data Bases, pp.139-150, 2006.
15 J. W. Byun, A. Karma, E. Bertino and N. Li, "Efficient k-anonymization using clustering techniques", International conference on Database and systems for Advanced applications, pp.188-200, 2007.
16 E. Zheleva and L. Getoor, "Preserving the privacy of sensitive relationships in graph data", LNCS, 4890, pp.153-171, Springer, Hidelberg, 2008.
17 A. Campan and T. M. Truta, "Data and structural k-anonymity in social networks" , LNCS, 5456, pp.33-54, Springer, Heidelberg, 2009.
18 Q. Wei and Y. Lu, " Preservation of privacy in publishing social network data" , International Symposium on Electronic Commerce and Security, pp.421-425, 2008.