A logical framework for privacy-preserving social network publication

Journal of Applied Logic - Tập 12 - Trang 151-174 - 2014
Tsan-sheng Hsu1, Churn-Jung Liau1, Da-Wei Wang1
1Institute of Information Science, Academia Sinica, Taipei, 115, Taiwan

Tài liệu tham khảo

Baader, 2002, Basic description logics, 47 Backstrom, 2007, Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography, 181 Barrat, 2004, The architecture of complex weighted networks, Proc. Natl. Acad. Sci., 101, 3747, 10.1073/pnas.0400087101 Blackburn, 2001 Borgatti, 1989, The class of all regular equivalences: algebraic structure and computation, Soc. Netw., 11, 65, 10.1016/0378-8733(89)90018-X Bou, 2011, On the minimum many-valued modal logic over a finite residuated lattice, J. Log. Comput., 21, 739, 10.1093/logcom/exp062 Boyd, 1999, Relations, residuals, regular interiors, and relative regular equivalence, Soc. Netw., 21, 147, 10.1016/S0378-8733(99)00006-4 Breslin, 2009 Caicedo, 2010, Standard gödel modal logics, Stud. Log., 94, 189, 10.1007/s11225-010-9230-1 Cardon, 1982, Partitioning a graph in o(|a|log2|v|), Theor. Comput. Sci., 19, 85, 10.1016/0304-3975(82)90016-0 Chiang, 2002, How much privacy? – A system to safe guard personal privacy while releasing database, vol. 2475, 226 Chiang, 2003, Preserving confidentiality when sharing medical database with the Cellsecu system, Int. J. Med. Inform., 71, 17, 10.1016/S1386-5056(03)00030-3 Ćirić, 2012, Computation of the greatest simulations and bisimulations between fuzzy automata, Fuzzy Sets Syst., 208, 22, 10.1016/j.fss.2012.05.006 de Rijke, 1998, Description logics and modal logics Denning, 1982 Dubois, 1994, Possibilistic logic, 439 Dwork, 2008, Differential privacy: A survey of results, vol. 4978, 1 Everett, 1994, Regular equivalences: general theory, J. Math. Sociol., 18, 29, 10.1080/0022250X.1994.9990134 Fan, 2013, Rough set analysis of relational structures, Inf. Sci., 221, 230, 10.1016/j.ins.2012.09.043 Fan, 2013, Many-valued modal logic and regular equivalences in weighted social networks, vol. 7958, 194 Fan, 2007, Positional analysis in fuzzy social networks, 423 Fan, 2008, A theoretical investigation of regular equivalences for fuzzy graphs, Int. J. Approx. Reason., 49, 678, 10.1016/j.ijar.2008.07.007 Fung, 2010, Privacy-preserving data publishing: A survey of recent developments, ACM Comput. Surv., 14, 10.1145/1749603.1749605 Gerbrandy, 1997 Gruber, 2008, Collective knowledge systems: Where the social web meets the semantic web, J. Web Semant., 6, 4, 10.1016/j.websem.2007.11.011 Hay, 2007 Hay, 2008, Resisting structural re-identification in anonymized social networks, Proc. VLDB Endow., 1, 10.14778/1453856.1453873 Hay, 2009, Accurate estimation of the degree distribution of private networks, 169 Hay, 2010, Boosting the accuracy of differentially private histograms through consistency, Proc. VLDB Endow., 3, 1021, 10.14778/1920841.1920970 Hsu, 2001, A logical model for privacy protection, vol. 2200, 110 Hsu, 2013, Privacy-preserving social network publication based on positional indiscernibility, vol. 8078, 311 Ignjatović, 2012, Weakly linear systems of fuzzy relation inequalities and their applications: A brief survey, Filomat, 26, 207, 10.2298/FIL1202207I Ignjatović, 2013, Fuzzy relation equations and subsystems of fuzzy transition systems, Knowl.-Based Syst., 38, 48, 10.1016/j.knosys.2012.02.008 Kamps, 2002, Notions of indistinguishability for semantic web languages, vol. 2342, 30 Kifer, 2011, No free lunch in data privacy, 193 Kumpula, 2007, Emergence of communities in weighted networks, Phys. Rev. Lett., 99, 228701, 10.1103/PhysRevLett.99.228701 Lerner, 2005, Role assignments, vol. 3418, 216 Li, 2007, t-closeness: Privacy beyond k-anonymity and l-diversity, 106 Liau, 2009, Social networks and granular computing, 8333 Liau, 1992, Quantitative modal logic and possibilistic reasoning, 43 Liau, 1996, Possibilistic reasoning – a mini-survey and uniform semantics, Artif. Intell., 88, 163, 10.1016/S0004-3702(96)00013-6 Liu, 2008, Towards identity anonymization on graphs, 93 Lorrain, 1971, Structural equivalence of individuals in social networks, J. Math. Sociol., 1, 49, 10.1080/0022250X.1971.9989788 Machanavajjhala, 2006, l-diversity: Privacy beyond k-anonymity, 24 Machanavajjhala, 2007, l-diversity: Privacy beyond k-anonymity, ACM Trans. Knowl. Discov. Data, 1, 10.1145/1217299.1217302 Machanavajjhala, 2011, Personalized social recommendations: accurate or private, Proc. VLDB Endow., 4, 440, 10.14778/1988776.1988780 Marx, 2003, Regular equivalence and dynamic logic, Soc. Netw., 25, 51, 10.1016/S0378-8733(02)00036-9 Mikroyannidis, 2007, Toward a social semantic web, IEEE Trans. Comput., 40, 113 Narayanan, 2009, De-anonymizing social networks, 173 Nardi, 2002, An introduction to description logics, 5 Paige, 1987, Three partition refinement algorithms, SIAM J. Comput., 16, 973, 10.1137/0216062 Rastogi, 2007, The boundary between privacy and utility in data publishing, 531 Samarati, 2001, Protecting respondents' identities in microdata release, IEEE Trans. Knowl. Data Eng., 13, 1010, 10.1109/69.971193 Schild, 1991, A correspondence theory for terminological logics: Preliminary report, 466 Schmidt-Schauß, 1991, Attributive concept descriptions with complements, Artif. Intell., 48, 1, 10.1016/0004-3702(91)90078-X Scott, 2000 Straccia, 1998, A fuzzy description logic, 594 Straccia, 2006, A fuzzy description logic for the semantic web, 73 Sweeney, 1997, Datafly: A system for providing anonymity in medical data, 356 Sweeney, 2002, Achieving k-anonymity privacy protection using generalization and suppression, Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10, 571, 10.1142/S021848850200165X Sweeney, 2002, k-anonymity: a model for protecting privacy, Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10, 557, 10.1142/S0218488502001648 Toivonen, 2007, The role of edge weights in social networks: modelling structure and dynamics, Proc. SPIE, 6601, B1 Wang, 2004, Medical privacy protection based on granular computing, Artif. Intell. Med., 32, 137, 10.1016/j.artmed.2004.03.002 Wang, 2006, Value and damage of information: A data privacy perspective, Int. J. Approx. Reason., 10.1016/j.ijar.2006.04.002 Wang, 2007, An epistemic framework for privacy protection in database linking, Data Knowl. Eng., 61, 176, 10.1016/j.datak.2006.05.004 Wasserman, 1994 White, 1983, Graph and semigroup homomorphisms on networks and relations, Soc. Netw., 5, 143 Zadeh, 1965, Fuzzy sets, Inf. Control, 8, 338, 10.1016/S0019-9958(65)90241-X Zheleva, 2012 Zhou, 2011, The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks, Knowl. Inf. Syst., 28, 47, 10.1007/s10115-010-0311-2 Zielinski, 2010, On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation, Data Knowl. Eng., 69, 399, 10.1016/j.datak.2009.10.012