A Multi-phase k-anonymity Algorithm Based on Clustering Techniques (English)
- New search for: Liu, F.
- New search for: Jia, Y.
- New search for: Han, W.
- New search for: Liu, F.
- New search for: Jia, Y.
- New search for: Han, W.
- New search for: Yuan, Yuyu
- New search for: Wu, Xu
- New search for: Lu, Yueming
In:
International standard conference on trustworthy computing and services; Trustworthy computing and services: international conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012, revised selected papers /
320
;
365-372
;
2013
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:A Multi-phase k-anonymity Algorithm Based on Clustering Techniques
-
Contributors:
-
Conference:International standard conference on trustworthy computing and services; Trustworthy computing and services: international conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012, revised selected papers / ; 2012 ; Beijing
-
Published in:COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE , 320 ; 365-372
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2013-01-01
-
Size:8 pages
-
Remarks:Based on those presented at the conference. Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Software Trustworthiness: Past, Present and FutureNami, M. / Suryn, W. et al. | 2013
- 13
-
A New Measurement Method for Software Trustworthiness Based on Rough SetsYuan, Y. / Han, Q. / Qi, S. et al. | 2013
- 20
-
Service Behavior Trustworthiness ManagementYuan, Y. / Zhang, Y. / Liu, J. et al. | 2013
- 26
-
Research on Identifying Method of Covert Channels in Database SystemPang, Y. / Zhang, X. / Sun, L. / Ding, W. et al. | 2013
- 34
-
Software Testing is Necessary But Not Sufficient for Software TrustworthinessNami, M. / Suryn, W. et al. | 2013
- 45
-
A Measurement Model for Trustworthiness of Information System Based on Third-Party Testing DataZuo, J. / Ren, P. / Kong, H. et al. | 2013
- 52
-
Overview of Monitor Selection in Computer NetworksZhu, N. / Zuo, J. / Zhou, Y. / Wang, W. et al. | 2013
- 60
-
Verification of Requirement Analysis Method for System Based on ISO/IEC 9126 Six Quality CharacteristicsEsaki, K. et al. | 2013
- 69
-
A Trustworthy Storage Framework on the CloudYao, X. / Yao, W. et al. | 2013
- 78
-
Progress in Study of Encrypted Traffic ClassificationCao, Z. / Cao, S. / Xiong, G. / Guo, L. et al. | 2013
- 87
-
Trustworthiness: From a Social Phenomenon to Internet TechnologyBoegh, J. et al. | 2013
- 94
-
Introduction of Quality Requirement and Evaluation Based on ISO/IEC SQuaRE Series of StandardEsaki, K. / Azuma, M. / Komiyama, T. et al. | 2013
- 102
-
A Survey on the Security of Multihop Ad Hoc NetworkDe-yu, Y. / Tong, L. / Geng-yu, W. / Zhi-zhao, W. et al. | 2013
- 109
-
Outsourcing Cloud Data Privacy-Preserving Based on Over-EncryptionRao, B. / Zhou, Z. / Zhang, H. / Tang, S. / Yao, R. et al. | 2013
- 117
-
The Measurement and Analysis of KAD NetworkWang, D. / He, H. / Shi, J. et al. | 2013
- 124
-
Encrypted Traffic Classification Based on an Improved Clustering AlgorithmZhang, M. / Zhang, H. / Zhang, B. / Lu, G. et al. | 2013
- 132
-
Real-Time Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior AssociationXiong, G. / Huang, W. / Zhao, Y. / Song, M. / Zhenzhen, L. / Guo, L. et al. | 2013
- 140
-
Security and Trust Model for Data Disaster-Recovery Service on the CloudChen, Z. / Yao, W. / Wang, C. et al. | 2013
- 148
-
Towards Analyzing Traceability of Data Leakage by Malicious InsidersWang, X. / Shi, J. / Guo, L. et al. | 2013
- 156
-
Dynamic Task Scheduling in Cloud Computing Based on Greedy StrategyMa, L. / Lu, Y. / Zhang, F. / Sun, S. et al. | 2013
- 163
-
A Multi-modal Clustering Method for Web VideosHuang, H. / Lu, Y. / Zhang, F. / Sun, S. et al. | 2013
- 170
-
Incorporate Spatial Information into pLSA for Scene ClassificationHuang, F. / Jing, X. / Sun, S. / Lu, Y. et al. | 2013
- 178
-
A Trust-Based Data Backup Method on the CloudLei, M. / Yao, W. / Wang, C. et al. | 2013
- 186
-
Active RFID-Based Indoor Localization Algorithm Using Virtual Reference through Bivariate Newton InterpolationShao, C. / Jing, X. / Sun, S. / Lu, Y. et al. | 2013
- 194
-
An Implementation of Trusted Remote Attestation Oriented the IaaSCloudLi, C. / Wu, X. / Liu, C. / Xie, X. et al. | 2013
- 203
-
C-SURF: Colored Speeded Up Robust FeaturesFu, J. / Jing, X. / Sun, S. / Lu, Y. / Wang, Y. et al. | 2013
- 211
-
Mining Explainable User Interests from Scalable User Behavior DataJun, L. / Xin-qiang, Z. / Meng-qi, Z. / Gong-yuan, F. / Lian-cun, L. et al. | 2013
- 219
-
An Improved Design of the Trustworthiness Authentication Mechanism of IaaSWu, X. / Xie, X. / Liu, C. / Li, C. et al. | 2013
- 227
-
Research on Simulation and Real-Time Evaluation Method of IoT-Oriented Complex SystemYang, J.-C. / Fang, B.-X. / Yuan, Y.-Y. / Zhai, M.-X. et al. | 2013
- 236
-
A New Manipulation Based Mobility Model for Vehicular Delay Tolerant NetworksZhang, T. / Yuan, Y. / Boegh, J. / Wu, X. et al. | 2013
- 242
-
A Pervasive Technology Approach to Social TrustworthinessHongqi, W. / Luo, Z. / Zhang, T. / Yuan, Y. / Wu, X. et al. | 2013
- 250
-
Policy-Based De-duplication in Secure Cloud StorageLiu, C. / Liu, X. / Wan, L. et al. | 2013
- 263
-
A New Method Based on Fuzzy C-Means Algorithm for Search Results ClusteringWang, F. / Lu, Y. / Zhang, F. / Sun, S. et al. | 2013
- 271
-
A Distance Adaptive Embedding Method in Dimension ReductionNiu, Y. / Lu, Y. / Zhang, F. / Sun, S. et al. | 2013
- 279
-
Joint Cognitive Access and Power Control in Two-Tie Femtocell NetworksZhao, X. / Lv, T. / Ma, Y. / Lu, Y. et al. | 2013
- 287
-
Based on Support Vector and Word Features New Word Discovery ResearchChengcheng, L. / Yuanfang, X. et al. | 2013
- 295
-
A Flexible Framework for Representations of Entities in the Internet of ThingsHaining, Y. / Hongli, Z. / Xingzhan, Y. et al. | 2013
- 303
-
Community Detection Based on Robust Label Propagation AlgorithmXu, B. / Liang, Z. / Jia, Y. / Zhou, B. et al. | 2013
- 311
-
Clock Synchronization Algorithm for Distributed Video Surveillance Based on PTPXuehai, L. / Jin, T. et al. | 2013
- 317
-
A Low-Complexity Vector Perturbation Precoding Approach Based on Reactive Tabu Search for Large Multiuser MIMO SystemsDing, W. / Lv, T. / Lu, Y. et al. | 2013
- 325
-
A PSO-Based Hierarchical Resource Scheduling Strategy on Cloud ComputingZhang, H. / Li, P. / Zhou, Z. / Yu, X. et al. | 2013
- 333
-
Hiding Signatures in Variable NamesSu, Y. / Liu, J. / Li, D. et al. | 2013
- 341
-
Chinese New Words Detection Using Mutual InformationLiang, Z. / Xu, B. / Zhao, J. / Jia, Y. / Zhou, B. et al. | 2013
- 349
-
An Efficient Parallel String Matching Algorithm Based on DFAFan, Y. / Zhang, H. / Liu, J. / Xu, D. et al. | 2013
- 357
-
A Ciphertext Data Retrieval Method Based on Cloud StorageZheng, S. / Wang, S. / Wang, C. et al. | 2013
- 365
-
A Multi-phase k-anonymity Algorithm Based on Clustering TechniquesLiu, F. / Jia, Y. / Han, W. et al. | 2013
- 373
-
A P2P Reputation Model Based on P2P File-Sharing Behavioral CharacteristicsXin, C. / Han, H.-j. / Lin, X.-q. / Wei, G.-y. et al. | 2013
- 380
-
Unobservable Rendezvous Negotiation in P2P NetworksXu, F. / Tan, Q. / Shi, J. / Guo, L. et al. | 2013
- 388
-
A Hierarchical Method for Clustering Binary Text ImagePu, Y. / Shi, J. / Guo, L. et al. | 2013
- 397
-
Search Results Evaluation Based on User BehaviorYu, J. / Lu, Y. / Sun, S. / Zhang, F. et al. | 2013
- 404
-
Classification Research on SSL Encrypted ApplicationFu, P. / Guo, L. / Xiong, G. / Meng, J. et al. | 2013
- 412
-
S-URL Flux: A Novel C&C Protocol for Mobile BotnetsShuai, W. / Xiang, C. / Peng, L. / Dan, L. et al. | 2013
- 420
-
An Efficient Ellipse-Shaped Blobs Detection Algorithm for Breaking Facebook CAPTCHALiu, P. / Shi, J. / Wang, L. / Guo, L. et al. | 2013
- 429
-
Security and Cost Analyses of DNSSEC ProtocolYao, Y. / He, L. / Xiong, G. et al. | 2013
- 436
-
An Automatic Approach to Detect Anti-debugging in Malware AnalysisXie, P. / Lu, X. / Wang, Y. / Su, J. / Li, M. et al. | 2013
- 443
-
Open VPN Traffic Identification Using Traffic Fingerprints and Statistical CharacteristicsPang, Y. / Jin, S. / Li, S. / Li, J. / Ren, H. et al. | 2013
- 450
-
An Intent-Driven Masquerader Detection Framework Based on Data FusionXiaojun, C. / Jinqiao, S. / Yiguo, P. / Haoliang, Z. et al. | 2013
- 458
-
An Integration of Several Different Data Flow Analysis TechniquesXing, Y. / Wang, H. / Zhao, J. et al. | 2013
- 466
-
Specifying and Detecting Behavioral Changes in Source Code Using Abstract Syntax Tree DifferencingLi, Y. / Wang, L. et al. | 2013
- 474
-
Timing Aspects Construction Using UML-MARTE ProfileSun, Q. / Huang, X. / Li, J. / Zhang, T. et al. | 2013
- 482
-
An Overtime-Detection Model-Checking Technique for Interrupt Processing SystemsZhou, X. / Zhao, J. et al. | 2013
- 490
-
MDE-Based Verification of SysML State Machine Diagram by UPPAALHuang, X. / Sun, Q. / Li, J. / Zhang, T. et al. | 2013
- 498
-
CppIns: A Source Query Language for InstrumentationHe, Y. / Tao, Y. / Zhang, T. et al. | 2013
- 506
-
An UML Model Query Method Based on Structure Pattern MatchingZhang, X. / Chen, H. / Zhang, T. et al. | 2013
- 514
-
A Lightweight Type Enforcement Access Control Approach with Role Based AuthorizationDing, Y. / Fu, H. / Wei, L. / He, L. / Daib, H. / Wu, Q. et al. | 2013
- 522
-
Composition of AADL Components by Transformation to Interface AutomataLi, J. / Zhao, J. / Sun, Q. / Huang, X. / Zhang, Y. / Zhang, T. et al. | 2013
- 530
-
Finding delta -Closure Property of BitTorrent System and Applications Based on This PropertyKun, W. / Ying, S. / Jian-long, T. / Li, G. / yang, L. et al. | 2013
- 539
-
A Tool to Construct One Comprehensive Legal Environment for Behavioral Incompatible ComponentsZhao, J. / Li, J. / Zhang, Y. / Zhang, T. et al. | 2013
- 547
-
Research of Security Relationship Based on Social NetworksYang, L. / Xiaoyan, W. / Ying, S. / Jian-long, T. et al. | 2013
- 555
-
Vulnerability Evaluating Based on Attack GraphWang, C. / Bao, Y. / Liang, X. / Zhang, T. et al. | 2013
- 564
-
A Dynamic Strategy to Cache Out-of-Sequence Packet in DPI SystemLiu, Q. / Feng, W. / Dai, Q. et al. | 2013
- 572
-
Speeding Up Double-Array Trie Construction for String MatchingShuai, N. / Yanbing, L. / Xinbo, S. et al. | 2013
- 580
-
Modeling of Hierarchical Index System for Network Operation SecurityZhang, Y. / Yun, X. et al. | 2013
- 591
-
An Evaluation Framework of Coverage-Based Fault Localization for Object-Oriented ProgramsXu, Q. / Pei, Y. / Wang, L. et al. | 2013
- 598
-
Research of New Words Identification in Social Network for Monitoring Public OpinionXiaoyan, W. / Kai, X. / Ying, S. / Jian-long, T. / Li, G. et al. | 2013
- 604
-
A Novel Dynamic Self-adaptive Framework for Network Security EvaluationJinyu, W. / Lihua, Y. / Binxing, F. et al. | 2013
- 613
-
Wireless Sensor Network MAC Protocol Used in the City FireCui, X. / Chen, X. / Zhang, H. / Zheng, S. et al. | 2013
- 621
-
The Application of Robot Localization and Navigation Based on WSN in the Disaster ReliefCui, X. / Chen, X. / Shi, W. / Zhang, Y. et al. | 2013
- 629
-
Comparison and Performance Analysis of Join Approach in MapReduceWu, F. / Wu, Q. / Tan, Y. et al. | 2013
- 637
-
Analysis of Public Sentiment Based on SMS ContentWang, Z. / Zhai, L. / Ma, Y. / Li, Y. et al. | 2013
- 644
-
Control Method of Twitter- and SMS-Based Mobile BotnetLi, Y. / Zhai, L. / Wang, Z. / Ren, Y. et al. | 2013
- 651
-
A Cache Management Strategy for Transparent Computing Storage SystemGao, Y. / Zhang, Y. / Zhou, Y. et al. | 2013
- 659
-
Network Security Situation Prediction Based on BP and RBF Neural NetworkZhang, Y. / Jin, S. / Cui, X. / Yin, X. / Pang, Y. et al. | 2013
- 666
-
Research on Redundant Channel Model Based on Spatial Correlation in IOTZhang, F. / Guo, W. / Yang, J. / Yuan, F. / Zhai, L. et al. | 2013
- 673
-
Design of a Trusted File System Based on HadoopJin, S. / Yang, S. / Zhu, X. / Yin, H. et al. | 2013
- 681
-
Architecting Dependable Many-Core Processors Using Core-Level Dynamic RedundancyJia, W. / Zhang, C. / Fu, J. / Li, R. et al. | 2013
- 689
-
Study on Transformed Keywords Identification in Spam FilteringXiong, D. / Yan, Z. / Li, A. et al. | 2013
- 698
-
Preliminary Study of Enhanced Collaborative Information Extracting and Sharing SystemWu, M. / Han, Y. / Zhou, B. / Li, A. et al. | 2013
- 706
-
A Compatible and Graphical Modeling Approach for Earth System ModelGuo, T. / Luan, Z. et al. | 2013
- 714
-
Who Can Haul the ANDON-CORD in the Software Development ProcessYinglian, L. / Boegh, J. / Qi, S. et al. | 2013
- 721
-
Research and Implement of Security Situation Awareness System YH-SSASHan, W. / Wang, Q. / Jia, Y. et al. | 2013
- 730
-
A Reliable Query Scheme for Outsourced Data in CloudWu, J. / Li, P. / Zhang, H. / Chu, B. et al. | 2013