Aggarwal, C.C. (ed.): Managing and Mining Sensor Data. Springer (2013)
Google Scholar
Bache, K., Lichman, M.: UCI Machine Learning Repository. University of California, School of Information and Computer Science, Irvine, CA (2013),
http://archive.ics.uci.edu/ml
Google Scholar
Byun, J.-W., Li, T., Bertino, E., Li, N., Sohn, Y.: Privacy-preserving incremental data dissemination. Journal of Computer Security 17(1), 43–68 (2009)
Google Scholar
Cao, J., Carminati, B., Ferrari, E., Tan, K.-L.: CASTLE: Continuously Anonymizing Data Streams. IEEE Transactions on Dependable and Secure Computing 8(3), 337–352 (2011)
CrossRef
Google Scholar
Domingo-Ferrer, J., Torra, V.: Disclosure Control Methods and Information Loss for Microdata. In: Doyle, P., Lane, J.I., Theeuwes, J.J.M., Zayatz, L. (eds.) Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies, pp. 91–110. Elsevier Science (2001)
Google Scholar
Domingo-Ferrer, J., Torra, V.: A quantitative comparison of disclosure control methods for microdata. In: Doyle, P., Lane, J.I., Theeuwes, J.J.M., Zayatz, L. (eds.) Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, pp. 111–134. North-Holland (2001)
Google Scholar
Gaber, M.M., Zaslavsky, A., Krishnaswamy, S.: Mining Data Streams: A Review. SIGMOD Rec. 34(2), 18–26 (2005)
CrossRef
Google Scholar
Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast Data Anonymization with Low Information Loss. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 758–769. VLDB Endowment, Vienna (2007)
Google Scholar
Li, J., Ooi, B.C., Wang, W.: Anonymizing Streaming Data for Privacy Protection. In: IEEE 24th International Conference on Data Engineering, ICDE 2008, pp. 1367–1369 (2008)
Google Scholar
Martinez-Bea, S., Torra, V.: Trajectory anonymization from a time series perspective. In: 2011 IEEE International Conference on Fuzzy Systems (FUZZ), pp. 401–408 (2011)
Google Scholar
Mateo-Sanz, J.M., Sebé, F., Domingo-Ferrer, J.: Outlier Protection in Continuous Microdata Masking. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 201–215. Springer, Heidelberg (2004)
CrossRef
Google Scholar
Moore, R.: Controlled data swapping techniques for masking public use microdata sets, U. S. Bureau of the Census (unpublished manuscript) (1996)
Google Scholar
Navarro-Arribas, G., Torra, V.: Privacy-preserving data-mining through micro-aggregation for web-based e-commerce. Internet Research 20, 366–384 (2010)
CrossRef
Google Scholar
Nin, J., Torra, V.: Towards the evaluation of time series protection methods. Inf. Sci. 179(11), 1663–1677 (2009)
CrossRef
MATH
Google Scholar
ONS, Statistical disclosure control (sdc) methods short-listed for 2011 UK census tabular outputs, SDC UKCDMAC Subgroup Paper 1, Office for National Statistics, UK (2011)
Google Scholar
Pei, J., Xu, J., Wang, Z., Wang, W., Wang, K.: Maintaining K-Anonymity against Incremental Updates. In: 19th International Conference on Scientific and Statistical Database Management (2007)
Google Scholar
Reiss, S.: Practical data-swapping: The first steps. In: IEEE Symposium on Security and Privacy, pp. 38–43 (1980)
Google Scholar
Samarati, P.: Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13, 1010–1027 (2001)
CrossRef
Google Scholar
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10, 557–570 (2002)
MathSciNet
CrossRef
MATH
Google Scholar
Templ, M.: Statistical Disclosure Control for Microdata Using the R-Package sdcMicro. Transactions on Data Privacy 1(2), 67–85 (2008)
MathSciNet
Google Scholar
Torra, V.: Rank Swapping for Partial Orders and Continuous Variables. Presented at the International Conference on Availability, Reliability and Security, ARES 2009, pp. 888–893 (2009)
Google Scholar
Truta, T.M., Campan, A.: K-anonymization incremental maintenance and optimization techniques. In: Proceedings of the 2007 ACM Symposium on Applied Computing, pp. 380–387. ACM Press (2007)
Google Scholar
Wu, X., Zhu, X., Wu, G.-Q., Ding, W.: Data mining with big data. IEEE Transactions on Knowledge and Data Engineering 26(1), 97–107 (2014)
CrossRef
Google Scholar
Xiao, X., Tao, Y.: M-invariance: towards privacy preserving re-publication of dynamic datasets. In: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, SIGMOD 2007, pp. 689–700. ACM (2007)
Google Scholar
Yancey, W.E., Winkler, W.E., Creecy, R.H.: Disclosure Risk Assessment in Perturbative Microdata Protection. In: Domingo-Ferrer, J. (ed.) Inference Control in Statistical Databases. LNCS, vol. 2316, pp. 135–152. Springer, Heidelberg (2002)
CrossRef
Google Scholar
Zakerzadeh, H., Osborn, S.L.: FAANST: Fast Anonymizing Algorithm for Numerical Streaming DaTa. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. LNCS, vol. 6514, pp. 36–50. Springer, Heidelberg (2011)
CrossRef
Google Scholar
Zhou, B., Han, Y., Pei, J., Jiang, B., Tao, Y., Jia, Y.: Continuous privacy preserving publishing of data streams. In: Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, EDBT 2009, pp. 648–659. ACM (2009)
Google Scholar