
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley, "kAnonymization in the Presence of Publisher Preferences," IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 11, pp. 16781690, November, 2011.  
BibTex  x  
@article{ 10.1109/TKDE.2011.106, author = {Rinku Dewri and Indrajit Ray and Indrakshi Ray and Darrell Whitley}, title = {kAnonymization in the Presence of Publisher Preferences}, journal ={IEEE Transactions on Knowledge and Data Engineering}, volume = {23}, number = {11}, issn = {10414347}, year = {2011}, pages = {16781690}, doi = {http://doi.ieeecomputersociety.org/10.1109/TKDE.2011.106}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Knowledge and Data Engineering TI  kAnonymization in the Presence of Publisher Preferences IS  11 SN  10414347 SP1678 EP1690 EPD  16781690 A1  Rinku Dewri, A1  Indrajit Ray, A1  Indrakshi Ray, A1  Darrell Whitley, PY  2011 KW  Kanonymity KW  reference point optimization. VL  23 JA  IEEE Transactions on Knowledge and Data Engineering ER   
[1] P. Golle , "Revisiting the Uniqueness of Simple Demographics in the US Population," Proc. Fifth ACM Workshop Privacy in Electronic Soc., pp. 7780, 2006.
[2] P. Samarati and L. Sweeney , "Generalizing Data to Provide Anonymity when Disclosing Information," Proc. 17th ACM Symp. Principles of Database Systems, p. 188, 1998.
[3] L. Sweeney , "Achieving kAnonymity Privacy Protection Using Generalization and Suppression," Int'l J. Uncertainity, Fuzziness and KnowledgeBased Systems, vol. 10, no. 5, pp. 571588, 2002.
[4] R.J. Bayardo and R. Agrawal , "Data Privacy through Optimal kAnonymization," Proc. 21st Int'l Conf. Data Eng., pp. 217228, 2005.
[5] B.C.M. Fung , K. Wang , and P.S. Yu , "TopDown Specialization for Information and Privacy Preservation," Proc. 21st Int'l Conf. Data Eng., pp. 205216, 2005.
[6] A. Hundepool and L. Willenborg , "Mu and Tau Argus: Software for Statistical Disclosure Control," Proc. Third Int'l Seminar on Statistical Confidentiality, 1996.
[7] V.S. Iyengar , "Transforming Data to Satisfy Privacy Constraints," Proc. Eighth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 279288, 2002.
[8] K. LeFevre , D.J. DeWitt , and R. Ramakrishnan , "Incognito: Efficient FullDomain kAnonymity," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 4960, 2005.
[9] K. LeFevre , D.J. DeWitt , and R. Ramakrishnan , "Mondrian Multidimensional KAnonymity," Proc. 22nd Int'l Conf. Data Eng., p. 25, 2006.
[10] G. Loukides and J. Shao , "Capturing Data Usefulness and Privacy Protection in kAnonymisation," Proc. ACM Symp. Applied Computing, pp. 370374, 2007.
[11] P. Samarati , "Protecting Respondents' Identities in Microdata Release," IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp. 10101027, Nov./Dec. 2001.
[12] K. Wang , P. Yu , and S. Chakraborty , "BottomUp Generalization: A Data Mining Solution to Privacy Protection," Proc. Fourth IEEE Int'l Conf. Data Mining, pp. 249256, 2004.
[13] R. Dewri , I. Ray , I. Ray , and D. Whitley , "On the Comparison of Microdata Disclosure Control Algorithms," Proc. 12th Int'l Conf. Extending Database Technology, pp. 240251, 2009.
[14] A. Meyerson and R. Williams , "On the Complexity of Optimal kAnonymity," Proc. 23rd ACM Symp. Principles of Database Systems, pp. 223228, 2004.
[15] A. Machanavajjhala , J. Gehrke , D. Kifer , and M. Venkitasubramaniam , " $\ell$ Diversity: Privacy Beyond $k$ Anonymity," Proc. 22nd Int'l Conf. Data Eng., p. 24, 2006.
[16] N. Li , T. Li , and S. Venkatasubramanian , " $t$ Closeness: Privacy Beyond $k$ Anonymity and $\ell$ Diversity," Proc. 23rd Int'l Conf. Data Eng., pp. 106115, 2007.
[17] X. Xiao and Y. Tao , "Personalized Privacy Preservation," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 229240, 2006.
[18] J. Li , R.C. Wong , A.W. Fu , and J. Pei , "Achieving kAnonymity by Clustering in Attribute Hierarchical Structures," Proc. Proceesing of Eighth Int'l Conf. Data Warehousing and Knowledge Discovery, pp. 405416, 2006.
[19] Q. Zhang , N. Koudas , D. Srivastava , and T. Yu , "Aggregate Query Answering on Anonymized Tables," Proc. 23rd Int'l Conf. Data Eng., pp. 116125, 2007.
[20] R. Dewri , I. Ray , I. Ray , and D. Whitley , "On the Optimal Selection of k in the kAnonymity Problem," Proc. 24th Int'l Conf. Data Eng., pp. 13641366, 2008.
[21] Z. Huang and W. Du , "OptRR: Optimizing Randomized Response Schemes for PrivacyPreserving Data Mining," Proc. 24th Int'l Conf. Data Eng., pp. 705714, 2008.
[22] T. Li and N. Li , "On the Tradeoff between Privacy and Utility in Data Publishing," Proc. 15th ACM SIGKDD Conf. Knowledge Discovery and Data Mining, pp. 517526, 2009.
[23] S. Vassilvitskii and M. Yannakakis , "Efficiently Computing Succinct TradeOff Curves," Theoretical Computer Science, vol. 348, no. 2, pp. 334356, 2005.
[24] I. Diakonikolas and M. Yannakakis , "Small Approximate Pareto Sets for BiObjective Shortest Paths and Other Problems," Proc. Int'l Workshop Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, pp. 7488, 2007.
[25] H. Ackermann , A. Newman , H. Röglin , and B. Vöcking , "DecisionMaking Based on Approximate and Smoothed Pareto Curve," Theoretical Computer Science, vol. 378, no. 3, pp. 253270, 2007.
[26] A.P. Wierzbicki , "The Use of Reference Objectives in Multiobjective Optimization," Proc. Multiple Criteria Decision Making Theory and Applications, pp. 468486, 1980.
[27] Y. Yun , H. Nakayama , and M. Yoon , "Sequential Approximation Method in MultiObjective Optimization Using Aspiration Level Approach," Evolutionary MultiCriterion Optimization, vol. 4403, pp. 317329, 2007.
[28] M. Luque , K. Miettinen , P. Eskelinen , and F. Ruiz , "Incorporating Preference Information in Interactive Reference Point Methods for Multiobjective Optimization," Omega, vol. 37, no. 2, pp. 450462, 2009.
[29] K. Miettinen and M.M. Mäkelä , "On Scalarizing Functions in Multiobjective Optimization," OR Spectrum, vol. 24, no. 2, pp. 193213, 2002.
[30] E. Miglierina and E. Molho , "Scalarization and Stability in Vector Optimization," J. Optimization Theory and Applications, vol. 114, no. 3, pp. 657670, 2002.
[31] S. Börzsönyi , D. Kossmann , and K. Stocker , "The Skyline Operator," Proc. 17th Int'l Conf. Data Eng., pp. 421430, 2001.
[32] R.C. Wong , A.W. Fu , K. Wang , and J. Pei , "Minimality Attack in Privacy Preserving Data Publishing," Proc. 33rd Int'l Conf. Very Large Data Bases, pp. 543554, 2007.
[33] K. Miettinen and L. Kirilov , "Interactive Reference Direction Approach Using Implicit Parametrization for Nonlinear Multiobjective Optimization," J. MultiCriteria Decision Analysis, vol. 13, nos. 2/3, pp. 115123, 2005.
[34] K. Deb and A. Kumar , "Interactive Evolutionary MultiObjective Optimization and DecisionMaking Using Reference Direction Method," Proc. Genetic and Evolutionary Computation Conf., pp. 781788, 2007.
[35] C.A.C. Coello , "An Updated Survey of GABased Multiobjective Optimization Techniques," ACM Computing Surveys, vol. 32, no. 2, pp. 109143, 2000.
[36] K. Deb , A. Pratap , S. Agarwal , and T. Meyarivan , "A Fast and Elitist Multiobjective Genetic Algorithm: NSGAII," IEEE Trans. Evolutionary Computation, vol. 6, no. 2, pp. 182197, Apr. 2002.
[37] R. Dewri , I. Ray , I. Ray , and D. Whitley , "A MultiObjective Approach to Data Sharing with Privacy Constraints and Preference Based Objectives," Proc. 11th Ann. Conf. Genetic and Evolutionary Computation, pp. 14991506, 2009.
[38] E. Alba and M. Tomassini , "Parallelism and Evolutionary Algorithms," IEEE Trans. Evolutionary Computation, vol. 6, no. 5, pp. 443462, Oct. 2002.
[39] N. Melab , S. Cahon , and E.G. Talbi , "Grid Computing for Parallel Bioinspired Algorithms," J. Parallel and Distributed Computing, vol. 66, no. 8, pp. 10521061, 2006.