[1]
ZHOU Aoying et al. A Survey on the M anagement of Uncertain Data, Chinese journal of Computers. 32(2009) 1-15.
Google Scholar
[2]
Samarati P, Sweeney L, Generalizing data to provide anonymity when disclosing information, Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, PODS, (1998) 188.
DOI: 10.1145/275487.275508
Google Scholar
[3]
Aggarwal Charu. C, On Unifying Privacy and Uncertain Data Models, Proceedings of the 2008 IEEE 24th International Conference on Data Engineering. (2008) 386-395.
DOI: 10.1109/icde.2008.4497447
Google Scholar
[4]
Wu Jia-wei, Liu Guo-hua, Wang Mei, Modeling the Uncertain data in data in the K-anonymity Privacy Protection Mode., CPMPUTER EINGINEERING & SCIENCE. 33(2011) 7-13.
Google Scholar
[5]
L. Sweeney, k-anonymity: a model for protecting privacy, International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (2002) 557-570.
DOI: 10.1142/s0218488502001648
Google Scholar
[6]
L. Sweeney, Achieving k-anonymity privacy protection using generalization and suppression, International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (2002) 571-588.
DOI: 10.1142/s021848850200165x
Google Scholar
[7]
Xiangmin, Ren, et al., Research on CBK(L, K)-anonymity algorithm, International Journal of Advancements in Computing Technology. 3(2011) 165-173.
Google Scholar
[8]
LI Tai-yong, et al., k-Anonymity via Twice Clustering for Privacy Preservation, Journal of Jilin University. 27(2009) 173-178.
Google Scholar
[9]
XiaoXiaokui, TaoYufei, Anatomy: Sample and effective protect preservation, Proceedings of the 32nd International Conference on VeryLarge DataBases. (2006)139-150.
Google Scholar
[10]
Xiaoxun Sun, Hua Wang, Jiuyong Li, David Ross, Achieving p-Sensitive k-Anonymity via Anatomy, Proceedings of the 2009 IEEE International Conference on e-Business Engineering. (2009) 199-205.
DOI: 10.1109/icebe.2009.34
Google Scholar
[11]
Anish Das Sarma, Shubha U. Nabar, Jennifer Widom, Representing Uncertain Data: Uniqueness, Equivalence, Minimization, and Approximation. .Technical Report, Stanford Infolab (2005).
Google Scholar
[12]
Anish Das Sarma, Omar Benjelloun, Alon Halevy, Shubha Nabar, JenniferWidom, Representing Uncertain Data: Models, Properties, and Algorithms. The VLDB Joural. 18(2009) 989-1019.
DOI: 10.1007/s00778-009-0147-0
Google Scholar
[13]
Ren Xiangmin, Yang Jing, Zhang Jianpei, Wang Kechao, Research on CBK(L, K)-Anonymity Algorithm , International Journal of Advancements in Computing Technology. 3(2011) 165 -173.
Google Scholar