[1]
L. Wang et al., Scientific Cloud Computing: Early Definition and Experience, Proc. 10th International Conference of High-Performance Computing and Communications (HPCC 08), 2008, pp.825-830.
Google Scholar
[2]
N. Santos, K. P. Gummadi, and R. Rodrigues, Towards trusted cloud computing, In USENIX HotCloud, (2009).
Google Scholar
[3]
K. D. Bowers, A. Juels, and A. Oprea, HAIL: A High-Availability and Integrity Layer for Cloud Storage, Cryptology ePrint Archive, Report, (2008).
DOI: 10.1145/1653662.1653686
Google Scholar
[4]
L. Sweeney, k-anonymity: a model for protecting privacy, International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002, pp.557-570.
DOI: 10.1142/s0218488502001648
Google Scholar
[5]
R. Bayardo and R. Agrawal, Data privacy through optimal k-anonymization, In ICDE, 2005, pp.217-228.
DOI: 10.1109/icde.2005.42
Google Scholar
[6]
R. Agrawal, A. Evfimievski, and R. Srikant. Information sharing across private databases. In Proceedings of the 2003 ACM SIGMOD Int'l Conf. on Management of Data, San Diego, CA, (2003).
DOI: 10.1145/872757.872771
Google Scholar
[7]
Mohamed Shehab, Anna Cinzia Squicciarini and Gail-Joon Ahn, Beyond User-to-User Access Control for Online Social Networks, ICICS 2008: 10th International Conference on Information and Communications Security, October, 2008, Birmingham, UK.
DOI: 10.1007/978-3-540-88625-9_12
Google Scholar
[8]
Gabriel Ghinita, Panagiotis Karras, Panos Kalnis, and Nikos Mamoulis, Fast data anonymization with low information loss, In Proc. of Very Large Data Bases (VLDB), 2007, pp.758-769.
Google Scholar
[9]
C. C. Aggarwal, On k-anonymity and the curse of dimensionality, In VLDB, 2005, pp.901-909.
Google Scholar
[10]
WONG R C, LI J, FU A W, et a1, (α, k)-Anonymity: an enhaned k-anonymity model for privacy-preserving data publishing, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM Press, New York, 2006, pp.754-759.
DOI: 10.1145/1150402.1150499
Google Scholar
[11]
A. Machanavajjhala, J. Gehrke, and D. Kifer, l-diversity: Privacy beyond k-anonymity, In Proc. of ICDE, Apr. (2006).
DOI: 10.1109/icde.2006.1
Google Scholar
[12]
N. Li, T. Li, and S. Venkatasubramanian, t-Closeness: Privacy Beyond k-anonymity and l-Diversity, In Proc. of ICDE, 2007, pp.106-115.
Google Scholar