A Multi-phase k-anonymity Algorithm Based on Clustering Techniques (English)
- New search for: Liu, Fei
- New search for: Jia, Yan
- New search for: Han, Weihong
- New search for: Liu, Fei
- New search for: Jia, Yan
- New search for: Han, Weihong
In:
Trustworthy Computing and Services
;
365-372
;
2013
- Article/Chapter (Book) / Electronic Resource
-
Title:A Multi-phase k-anonymity Algorithm Based on Clustering Techniques
-
Contributors:
-
Published in:Trustworthy Computing and Services ; 365-372Communications in Computer and Information Science ; 320 ; 365-372
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2013-01-01
-
Size:8 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Software Trustworthiness: Past, Present and FutureNami, Mitra / Suryn, Witold et al. | 2013
- 13
-
A New Measurement Method for Software Trustworthiness Based on Rough SetsYuan, Yuyu / Han, Qiang / Qi, Sun et al. | 2013
- 20
-
Service Behavior Trustworthiness ManagementYuan, Yuyu / Zhang, Yangyang / Liu, Jing et al. | 2013
- 26
-
Research on Identifying Method of Covert Channels in Database SystemPang, Yao / Zhang, Xiaoxiao / Sun, Luwei / Ding, Weimin et al. | 2013
- 34
-
Software Testing is Necessary But Not Sufficient for Software TrustworthinessNami, Mitra / Suryn, Witold et al. | 2013
- 45
-
A Measurement Model for Trustworthiness of Information System Based on Third-Party Testing DataZuo, Jiaping / Ren, Pei / Kong, Hao et al. | 2013
- 52
-
Overview of Monitor Selection in Computer NetworksZhu, Nafei / Zuo, Jiaping / Zhou, Yue / Wang, Wei et al. | 2013
- 60
-
Verification of Requirement Analysis Method for System Based on ISO/IEC 9126 Six Quality CharacteristicsEsaki, Kazuhiro et al. | 2013
- 69
-
A Trustworthy Storage Framework on the CloudYao, Xiang / Yao, Wenbin et al. | 2013
- 78
-
Progress in Study of Encrypted Traffic ClassificationCao, Zigang / Cao, Shoufeng / Xiong, Gang / Guo, Li et al. | 2013
- 87
-
Trustworthiness: From a Social Phenomenon to Internet TechnologyBøegh, Jørgen et al. | 2013
- 94
-
Introduction of Quality Requirement and Evaluation Based on ISO/IEC SQuaRE Series of StandardEsaki, Kazuhiro / Azuma, Motoei / Komiyama, Toshihiro et al. | 2013
- 102
-
A Survey on the Security of Multihop Ad Hoc NetworkDe-yu, Yuan / Tong, Liu / Geng-yu, Wei / Zhi-zhao, Wang et al. | 2013
- 109
-
Outsourcing Cloud Data Privacy-Preserving Based on Over-EncryptionRao, Bing / Zhou, Zhigang / Zhang, Hongli / Tang, Shuofei / Yao, Renfu et al. | 2013
- 117
-
The Measurement and Analysis of KAD NetworkWang, Dong / He, Hui / Shi, Jiantao et al. | 2013
- 124
-
Encrypted Traffic Classification Based on an Improved Clustering AlgorithmZhang, Meng / Zhang, Hongli / Zhang, Bo / Lu, Gang et al. | 2013
- 132
-
Real-Time Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior AssociationXiong, Gang / Huang, Wenting / Zhao, Yong / Song, Ming / Li, Zhenzhen / Guo, Li et al. | 2013
- 140
-
Security and Trust Model for Data Disaster-Recovery Service on the CloudChen, Zhao / Yao, Wenbin / Wang, Cong et al. | 2013
- 148
-
Towards Analyzing Traceability of Data Leakage by Malicious InsidersWang, Xiao / Shi, Jinqiao / Guo, Li et al. | 2013
- 156
-
Dynamic Task Scheduling in Cloud Computing Based on Greedy StrategyMa, Liang / Lu, Yueming / Zhang, Fangwei / Sun, Songlin et al. | 2013
- 163
-
A Multi-modal Clustering Method for Web VideosHuang, Haiqi / Lu, Yueming / Zhang, Fangwei / Sun, Songlin et al. | 2013
- 170
-
Incorporate Spatial Information into pLSA for Scene ClassificationHuang, Fei / Jing, Xiaojun / Sun, Songlin / Lu, Yueming et al. | 2013
- 178
-
A Trust-Based Data Backup Method on the CloudLei, Mingtao / Yao, Wenbin / Wang, Cong et al. | 2013
- 186
-
Active RFID-Based Indoor Localization Algorithm Using Virtual Reference through Bivariate Newton InterpolationShao, Chenggang / Jing, Xiaojun / Sun, Songlin / Lu, Yueming et al. | 2013
- 194
-
An Implementation of Trusted Remote Attestation Oriented the IaaSCloudLi, Chunwen / Wu, Xu / Liu, Chuanyi / Xie, Xiaqing et al. | 2013
- 203
-
C-SURF: Colored Speeded Up Robust FeaturesFu, Jing / Jing, Xiaojun / Sun, Songlin / Lu, Yueming / Wang, Ying et al. | 2013
- 211
-
Mining Explainable User Interests from Scalable User Behavior DataJun, Li / Xin-qiang, Zuo / Meng-qi, Zhou / Gong-yuan, Fan / Lian-cun, Li et al. | 2013
- 219
-
An Improved Design of the Trustworthiness Authentication Mechanism of IaaSWu, Xu / Xie, Xiaqing / Liu, Chuanyi / Li, Chunwen et al. | 2013
- 227
-
Research on Simulation and Real-Time Evaluation Method of IoT-Oriented Complex SystemYang, Jin-Cui / Fang, Bin-Xing / Yuan, Yu-Yu / Zhai, Meng-Xiao et al. | 2013
- 236
-
A New Manipulation Based Mobility Model for Vehicular Delay Tolerant NetworksZhang, Tianle / Yuan, Yuyu / Bøegh, Jørgen / Wu, Xu et al. | 2013
- 242
-
A Pervasive Technology Approach to Social TrustworthinessHongqi, Wang / Luo, Zongwei / Zhang, Tianle / Yuan, Yuyu / Wu, Xu et al. | 2013
- 250
-
Policy-Based De-duplication in Secure Cloud StorageLiu, Chuanyi / Liu, Xiaojian / Wan, Lei et al. | 2013
- 263
-
A New Method Based on Fuzzy C-Means Algorithm for Search Results ClusteringWang, Fei / Lu, Yueming / Zhang, Fangwei / Sun, Songlin et al. | 2013
- 271
-
A Distance Adaptive Embedding Method in Dimension ReductionNiu, Yanting / Lu, Yueming / Zhang, Fangwei / Sun, Songlin et al. | 2013
- 279
-
Joint Cognitive Access and Power Control in Two-Tie Femtocell NetworksZhao, Xiaolong / Lv, Tiejun / Ma, Yanhui / Lu, Yueming et al. | 2013
- 287
-
Based on Support Vector and Word Features New Word Discovery ResearchChengcheng, Li / Yuanfang, Xu et al. | 2013
- 295
-
A Flexible Framework for Representations of Entities in the Internet of ThingsHaining, Yu / Hongli, Zhang / Xingzhan, Yu et al. | 2013
- 303
-
Community Detection Based on Robust Label Propagation AlgorithmXu, Bingying / Liang, Zheng / Jia, Yan / Zhou, Bin et al. | 2013
- 311
-
Clock Synchronization Algorithm for Distributed Video Surveillance Based on PTPXuehai, Liu / Jin, Tang et al. | 2013
- 317
-
A Low-Complexity Vector Perturbation Precoding Approach Based on Reactive Tabu Search for Large Multiuser MIMO SystemsDing, Wei / Lv, Tiejun / Lu, Yueming et al. | 2013
- 325
-
A PSO-Based Hierarchical Resource Scheduling Strategy on Cloud ComputingZhang, Hongli / Li, Panpan / Zhou, Zhigang / Yu, Xiangzhan et al. | 2013
- 333
-
Hiding Signatures in Variable NamesSu, Yinjie / Liu, Jiahui / Li, Dong et al. | 2013
- 341
-
Chinese New Words Detection Using Mutual InformationLiang, Zheng / Xu, Bingying / Zhao, Jie / Jia, Yan / Zhou, Bin et al. | 2013
- 349
-
An Efficient Parallel String Matching Algorithm Based on DFAFan, Yujian / Zhang, Hongli / Liu, Jiahui / Xu, Dongliang et al. | 2013
- 357
-
A Ciphertext Data Retrieval Method Based on Cloud StorageZheng, Shuo / Wang, Siyang / Wang, Cong et al. | 2013
- 365
-
A Multi-phase k-anonymity Algorithm Based on Clustering TechniquesLiu, Fei / Jia, Yan / Han, Weihong et al. | 2013
- 373
-
A P2P Reputation Model Based on P2P File-Sharing Behavioral CharacteristicsXin, Chao / Han, Hui-jun / Lin, Xiu-qin / Wei, Geng-yu et al. | 2013
- 380
-
Unobservable Rendezvous Negotiation in P2P NetworksXu, Fanwen / Tan, Qingfeng / Shi, Jinqiao / Guo, Li et al. | 2013
- 388
-
A Hierarchical Method for Clustering Binary Text ImagePu, Yiguo / Shi, Jinqiao / Guo, Li et al. | 2013
- 397
-
Search Results Evaluation Based on User BehaviorYu, Jinxiu / Lu, Yueming / Sun, Songlin / Zhang, Fangwei et al. | 2013
- 404
-
Classification Research on SSL Encrypted ApplicationFu, Peipei / Guo, Li / Xiong, Gang / Meng, Jiao et al. | 2013
- 412
-
S-URL Flux: A Novel C&C Protocol for Mobile BotnetsShuai, Wang / Xiang, Cui / Peng, Liao / Dan, Li et al. | 2013
- 420
-
An Efficient Ellipse-Shaped Blobs Detection Algorithm for Breaking Facebook CAPTCHALiu, Peipeng / Shi, Jinqiao / Wang, Lihong / Guo, Li et al. | 2013
- 429
-
Security and Cost Analyses of DNSSEC ProtocolYao, Yao / He, Longtao / Xiong, Gang et al. | 2013
- 436
-
An Automatic Approach to Detect Anti-debugging in Malware AnalysisXie, Peidai / Lu, Xicheng / Wang, Yongjun / Su, Jinshu / Li, Meijian et al. | 2013
- 443
-
OpenVPN Traffic Identification Using Traffic Fingerprints and Statistical CharacteristicsPang, Yi / Jin, Shuyuan / Li, Shicong / Li, Jilei / Ren, Hao et al. | 2013
- 450
-
An Intent-Driven Masquerader Detection Framework Based on Data FusionXiaojun, Chen / Jinqiao, Shi / Yiguo, Pu / Haoliang, Zhang et al. | 2013
- 458
-
An Integration of Several Different Data Flow Analysis TechniquesXing, Yuchen / Wang, Hanfei / Zhao, Jianhua et al. | 2013
- 466
-
Specifying and Detecting Behavioral Changes in Source Code Using Abstract Syntax Tree DifferencingLi, Yuankui / Wang, Linzhang et al. | 2013
- 474
-
Timing Aspects Construction Using UML-MARTE ProfileSun, Qingqing / Huang, Xiaopu / Li, Jiangwei / Zhang, Tian et al. | 2013
- 482
-
An Overtime-Detection Model-Checking Technique for Interrupt Processing SystemsZhou, Xiaoyu / Zhao, Jianhua et al. | 2013
- 490
-
MDE-Based Verification of SysML State Machine Diagram by UPPAALHuang, Xiaopu / Sun, Qingqing / Li, Jiangwei / Zhang, Tian et al. | 2013
- 498
-
CppIns: A Source Query Language for InstrumentationHe, Ying / Tao, Yongjing / Zhang, Tian et al. | 2013
- 506
-
An UML Model Query Method Based on Structure Pattern MatchingZhang, Xuelin / Chen, Huajie / Zhang, Tian et al. | 2013
- 514
-
A Lightweight Type Enforcement Access Control Approach with Role Based AuthorizationDing, Yan / Fu, Hongyi / Wei, Lifeng / He, Lianyue / Daib, Huadong / Wu, Qingbo et al. | 2013
- 522
-
Composition of AADL Components by Transformation to Interface AutomataLi, Jiangwei / Zhao, Jizhou / Sun, Qingqing / Huang, Xiaopu / Zhang, Yan / Zhang, Tian et al. | 2013
- 530
-
Finding δ-Closure Property of BitTorrent System and Applications Based on This PropertyKun, Wang / Ying, Sha / Jian-long, Tan / Li, Guo / yang, Li et al. | 2013
- 539
-
A Tool to Construct One Comprehensive Legal Environment for Behavioral Incompatible ComponentsZhao, Jizhou / Li, Jiangwei / Zhang, Yan / Zhang, Tian et al. | 2013
- 547
-
Research of Security Relationship Based on Social NetworksYang, Li / Xiaoyan, Wang / Ying, Sha / Jian-long, Tan et al. | 2013
- 555
-
Vulnerability Evaluating Based on Attack GraphWang, Chunlu / Bao, Yu / Liang, Xuesen / Zhang, Tianle et al. | 2013
- 564
-
A Dynamic Strategy to Cache Out-of-Sequence Packet in DPI SystemLiu, Qingyun / Feng, Wenzhong / Dai, Qiong et al. | 2013
- 572
-
Speeding Up Double-Array Trie Construction for String MatchingShuai, Niu / Yanbing, Liu / Xinbo, Song et al. | 2013
- 580
-
Modeling of Hierarchical Index System for Network Operation SecurityZhang, Yongzheng / Yun, Xiaochun et al. | 2013
- 591
-
An Evaluation Framework of Coverage-Based Fault Localization for Object-Oriented ProgramsXu, Qing / Pei, Yu / Wang, Linzhang et al. | 2013
- 598
-
Research of New Words Identification in Social Network for Monitoring Public OpinionXiaoyan, Wang / kai, Xu / Ying, Sha / Jian-long, Tan / Li, Guo et al. | 2013
- 604
-
A Novel Dynamic Self-adaptive Framework for Network Security EvaluationJinyu, Wu / Lihua, Yin / Binxing, Fang et al. | 2013
- 613
-
Wireless Sensor Network MAC Protocol Used in the City FireCui, Xiaoyan / Chen, Xiaoshuang / Zhang, Haitao / Zheng, Shizhuo et al. | 2013
- 621
-
The Application of Robot Localization and Navigation Based on WSN in the Disaster ReliefCui, Xiaoyan / Chen, Xiaoshuang / Shi, Wei / Zhang, Yi et al. | 2013
- 629
-
Comparison and Performance Analysis of Join Approach in MapReduceWu, Fuhui / Wu, Qingbo / Tan, Yusong et al. | 2013
- 637
-
Analysis of Public Sentiment Based on SMS ContentWang, Zhilei / Zhai, Lidong / Ma, Yongqiang / Li, Yue et al. | 2013
- 644
-
Control Method of Twitter- and SMS-Based Mobile BotnetLi, Yue / Zhai, Lidong / Wang, Zhilei / Ren, Yunlong et al. | 2013
- 651
-
A Cache Management Strategy for Transparent Computing Storage SystemGao, Yuan / Zhang, Yaoxue / Zhou, Yuezhi et al. | 2013
- 659
-
Network Security Situation Prediction Based on BP and RBF Neural NetworkZhang, Yaxing / Jin, Shuyuan / Cui, Xiang / Yin, Xi / Pang, Yi et al. | 2013
- 666
-
Research on Redundant Channel Model Based on Spatial Correlation in IOTZhang, Fangjiao / Guo, Wei / Yang, Jincui / Yuan, Fangfang / Zhai, Lidong et al. | 2013
- 673
-
Design of a Trusted File System Based on HadoopJin, Songchang / Yang, Shuqiang / Zhu, Xiang / Yin, Hong et al. | 2013
- 681
-
Architecting Dependable Many-Core Processors Using Core-Level Dynamic RedundancyJia, Wentao / Zhang, Chunyuan / Fu, Jian / Li, Rui et al. | 2013
- 689
-
Study on Transformed Keywords Identification in Spam FilteringXiong, Dapeng / Yan, Zhang / Li, Aiping et al. | 2013
- 698
-
Preliminary Study of Enhanced Collaborative Information Extracting and Sharing SystemWu, Mingfei / Han, Yi / Zhou, Bin / Li, Aiping et al. | 2013
- 706
-
A Compatible and Graphical Modeling Approach for Earth System ModelGuo, Taiping / Luan, Zhongzhi et al. | 2013
- 714
-
Who Can Haul the ANDON-CORD in the Software Development ProcessYinglian, Liu / Bøegh, Jørgen / Qi, Sun et al. | 2013
- 721
-
Research and Implement of Security Situation Awareness System YH-SSASHan, Weihong / Wang, Qingguang / Jia, Yan et al. | 2013
- 730
-
A Reliable Query Scheme for Outsourced Data in CloudWu, Junchao / Li, Panpan / Zhang, Hongli / Chu, Binsheng et al. | 2013