Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 2
Page No. 347 - 358

Boyce-Codd Normal Form (BCNF) Based Privacy-Preserving Publishing Multiple Subtables with Conditional Functional Dependencies

Authors : S. Balamurugan and P. Visalakshi

References

Ali, H., A. Fatlawi, A. Basheer, A. Assadi and M.H. Jabardi, 2015. Dynamic database schema for hospital management system. Asian J. Inf. Technol., 14: 122-128.

Bayardo, R.J. and R. Agrawal, 2005. Data privacy through optimal k-anonymization. Proceedings of the 21st International Conference on Data Engineering ICDE 2005, April 5-8, 2005, IEEE, London, USA., pp: 217-228.

Cong, G., W. Fan, F. Geerts, X. Jia and S. Ma, 2007. Improving data quality: Consistency and accuracy. Proceedings of the 33rd International Conference on Very Large Data Bases, September 23-28, 2007, VLDB Endowment, Austria, ISBN: 978-1-59593-649-3, pp: 315-326.

Fan, W., F. Geerts, X. Jia and A. Kementsietsidis, 2008. Conditional functional dependencies for capturing data inconsistencies. ACM Trans. Database Syst., Vol. 33, No. 2. 10.1145/1366102.1366103

Jin, X., N. Zhang and G. Das, 2010. Algorithm-safe privacy-preserving data publishing. Proceedings of the 13th International Conference on Extending Database Technology, March 22-26, 2010, ACM, New York, USA., ISBN: 978-1-60558-945-9, pp: 633-644.

Kifer, D., 2009. Attacks on privacy and deFinetti's theorem. Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, June 29-July 02, 2009, ACM, New York, USA., ISBN: 978-1-60558-551-2, pp: 127-138.

Li, J., G. Liu and L. Wong, 2007. Mining statistically important equivalence classes and delta-discriminative emerging patterns. Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 12-15, 2007, ACM, New York, USA., ISBN: 978-1-59593-609-7, pp: 430-439.

Li, N., T. Li and S. Venkatasubramanian, 2007. T-closeness: Privacy beyond k-anonymity and l-diversity. Proceedings of the IEEE 23rd International Conference on Data Engineering ICDE 2007, April 15-20, 2007, IEEE, Istanbul, Turkey, ISBN: 1-4244-0802-4, pp: 106-115.

Machanavajjhala, A. and J. Gehrke, 2006. On the efficiency of checking perfect privacy. Proceedings of the Twenty-Fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of Database Systems, June 27-29, 2006, ACM, New York, USA., ISBN:1-59593-318-2, pp: 163-172.

Machanavajjhala, A., D. Kifer, J. Gehrke and M. Venkitasubramaniam, 2007. l-diversity: Privacy beyond k-anonymity. ACM. Trans. Knowl. Discovery Data, Vol. 1 10.1145/1217299.1217302

Martin, D.J., D. Kifer, A. Machanavajjhala, J. Gehrke and J.Y. Halpern, 2007. Worst-case background knowledge for privacy-preserving data publishing. Proceedings of the IEEE 23rd International Conference on Data Engineering ICDE 2007, April 15-20, 2007, IEEE, Istanbul, Turkey, ISBN: 1-4244-0802-4, pp: 126-135.

Miklau, G. and D. Suciu, 2004. A formal analysis of information disclosure in data exchange. Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, June 13-18, 2004, ACM, New York, USA., pp: 575-586.

Rastogi, V., D. Suciu and S. Hong, 2007. The boundary between privacy and utility in data publishing. Proceedings of the 33rd International Conference on Very Large Data Bases, September 23-28, 2007, VLDB Endowment, Austria, ISBN: 978-1-59593-649-3, pp: 531-542.

Sweeney, L., 2002. k-Anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst., 10: 557-570.
CrossRef  |  

Tao, Y., J. Pei, J. Li, X. Xiao and K. Yi et al., 2010. Correlation hiding by independence masking. Proceedings of the 2010 IEEE 26th International Conference on Data Engineering (ICDE), March 1-6, 2010, IEEE, Long Beach, CA., ISBN: 978-1-4244-5445-7, pp: 964-967.

Wang, H. and R. Liu, 2011. Privacy-preserving publishing microdata with full functional dependencies. Data Knowl. Eng., 70: 249-268.
CrossRef  |  Direct Link  |  

Wang, K., B. Fung and P.S. Yu, 2005. Template-based privacy preservation in classification problems. Proceedings of the 5th IEEE International Conference on Data Mining, November 27-30, 2005, IEEE Computer Society, Washington, DC., USA., pp: 466-473.

Wang, K., P.S. Yu and S. Chakraborty, 2004. Bottom-up generalization: A data mining solution to privacy protection. Proceedings of the 4th IEEE International Conference on Data Mining, November 1-4, 2004, IEEE Computer Society, Brighton, UK., pp: 249-256.

Xiao, X. and Y. Tao, 2006. Anatomy: Simple and effective privacy preservation. Proceedings of the 32nd VLDB International Conference on Very Large Data Bases, September 12-15, 2006, Seoul, Korea, pp: 139-150.

Yao, C., X.S. Wang and S. Jajodia, 2005. Checking for k-anonymity violation by views. Proceedings of the 31st International Conference on Very Large Data Bases, October 4-6, 2005, VLDB Endowment, Trento, Italy, ISBN:1-59593-154-6, pp: 910-921.

Zhang, L., S. Jajodia and A. Brodsky, 2007. Information disclosure under realistic assumptions: Privacy versus optimality. Proceedings of the 14th ACM Conference on Computer and Communications Security, October 29-November 02, 2007, ACM, New York, USA., ISBN: 978-1-59593-703-2, pp: 573-583.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved