A logical framework for privacy-preserving social network publication
Tài liệu tham khảo
Baader, 2002, Basic description logics, 47
Backstrom, 2007, Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography, 181
Barrat, 2004, The architecture of complex weighted networks, Proc. Natl. Acad. Sci., 101, 3747, 10.1073/pnas.0400087101
Blackburn, 2001
Borgatti, 1989, The class of all regular equivalences: algebraic structure and computation, Soc. Netw., 11, 65, 10.1016/0378-8733(89)90018-X
Bou, 2011, On the minimum many-valued modal logic over a finite residuated lattice, J. Log. Comput., 21, 739, 10.1093/logcom/exp062
Boyd, 1999, Relations, residuals, regular interiors, and relative regular equivalence, Soc. Netw., 21, 147, 10.1016/S0378-8733(99)00006-4
Breslin, 2009
Caicedo, 2010, Standard gödel modal logics, Stud. Log., 94, 189, 10.1007/s11225-010-9230-1
Cardon, 1982, Partitioning a graph in o(|a|log2|v|), Theor. Comput. Sci., 19, 85, 10.1016/0304-3975(82)90016-0
Chiang, 2002, How much privacy? – A system to safe guard personal privacy while releasing database, vol. 2475, 226
Chiang, 2003, Preserving confidentiality when sharing medical database with the Cellsecu system, Int. J. Med. Inform., 71, 17, 10.1016/S1386-5056(03)00030-3
Ćirić, 2012, Computation of the greatest simulations and bisimulations between fuzzy automata, Fuzzy Sets Syst., 208, 22, 10.1016/j.fss.2012.05.006
de Rijke, 1998, Description logics and modal logics
Denning, 1982
Dubois, 1994, Possibilistic logic, 439
Dwork, 2008, Differential privacy: A survey of results, vol. 4978, 1
Everett, 1994, Regular equivalences: general theory, J. Math. Sociol., 18, 29, 10.1080/0022250X.1994.9990134
Fan, 2013, Rough set analysis of relational structures, Inf. Sci., 221, 230, 10.1016/j.ins.2012.09.043
Fan, 2013, Many-valued modal logic and regular equivalences in weighted social networks, vol. 7958, 194
Fan, 2007, Positional analysis in fuzzy social networks, 423
Fan, 2008, A theoretical investigation of regular equivalences for fuzzy graphs, Int. J. Approx. Reason., 49, 678, 10.1016/j.ijar.2008.07.007
Fung, 2010, Privacy-preserving data publishing: A survey of recent developments, ACM Comput. Surv., 14, 10.1145/1749603.1749605
Gerbrandy, 1997
Gruber, 2008, Collective knowledge systems: Where the social web meets the semantic web, J. Web Semant., 6, 4, 10.1016/j.websem.2007.11.011
Hay, 2007
Hay, 2008, Resisting structural re-identification in anonymized social networks, Proc. VLDB Endow., 1, 10.14778/1453856.1453873
Hay, 2009, Accurate estimation of the degree distribution of private networks, 169
Hay, 2010, Boosting the accuracy of differentially private histograms through consistency, Proc. VLDB Endow., 3, 1021, 10.14778/1920841.1920970
Hsu, 2001, A logical model for privacy protection, vol. 2200, 110
Hsu, 2013, Privacy-preserving social network publication based on positional indiscernibility, vol. 8078, 311
Ignjatović, 2012, Weakly linear systems of fuzzy relation inequalities and their applications: A brief survey, Filomat, 26, 207, 10.2298/FIL1202207I
Ignjatović, 2013, Fuzzy relation equations and subsystems of fuzzy transition systems, Knowl.-Based Syst., 38, 48, 10.1016/j.knosys.2012.02.008
Kamps, 2002, Notions of indistinguishability for semantic web languages, vol. 2342, 30
Kifer, 2011, No free lunch in data privacy, 193
Kumpula, 2007, Emergence of communities in weighted networks, Phys. Rev. Lett., 99, 228701, 10.1103/PhysRevLett.99.228701
Lerner, 2005, Role assignments, vol. 3418, 216
Li, 2007, t-closeness: Privacy beyond k-anonymity and l-diversity, 106
Liau, 2009, Social networks and granular computing, 8333
Liau, 1992, Quantitative modal logic and possibilistic reasoning, 43
Liau, 1996, Possibilistic reasoning – a mini-survey and uniform semantics, Artif. Intell., 88, 163, 10.1016/S0004-3702(96)00013-6
Liu, 2008, Towards identity anonymization on graphs, 93
Lorrain, 1971, Structural equivalence of individuals in social networks, J. Math. Sociol., 1, 49, 10.1080/0022250X.1971.9989788
Machanavajjhala, 2006, l-diversity: Privacy beyond k-anonymity, 24
Machanavajjhala, 2007, l-diversity: Privacy beyond k-anonymity, ACM Trans. Knowl. Discov. Data, 1, 10.1145/1217299.1217302
Machanavajjhala, 2011, Personalized social recommendations: accurate or private, Proc. VLDB Endow., 4, 440, 10.14778/1988776.1988780
Marx, 2003, Regular equivalence and dynamic logic, Soc. Netw., 25, 51, 10.1016/S0378-8733(02)00036-9
Mikroyannidis, 2007, Toward a social semantic web, IEEE Trans. Comput., 40, 113
Narayanan, 2009, De-anonymizing social networks, 173
Nardi, 2002, An introduction to description logics, 5
Paige, 1987, Three partition refinement algorithms, SIAM J. Comput., 16, 973, 10.1137/0216062
Rastogi, 2007, The boundary between privacy and utility in data publishing, 531
Samarati, 2001, Protecting respondents' identities in microdata release, IEEE Trans. Knowl. Data Eng., 13, 1010, 10.1109/69.971193
Schild, 1991, A correspondence theory for terminological logics: Preliminary report, 466
Schmidt-Schauß, 1991, Attributive concept descriptions with complements, Artif. Intell., 48, 1, 10.1016/0004-3702(91)90078-X
Scott, 2000
Straccia, 1998, A fuzzy description logic, 594
Straccia, 2006, A fuzzy description logic for the semantic web, 73
Sweeney, 1997, Datafly: A system for providing anonymity in medical data, 356
Sweeney, 2002, Achieving k-anonymity privacy protection using generalization and suppression, Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10, 571, 10.1142/S021848850200165X
Sweeney, 2002, k-anonymity: a model for protecting privacy, Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10, 557, 10.1142/S0218488502001648
Toivonen, 2007, The role of edge weights in social networks: modelling structure and dynamics, Proc. SPIE, 6601, B1
Wang, 2004, Medical privacy protection based on granular computing, Artif. Intell. Med., 32, 137, 10.1016/j.artmed.2004.03.002
Wang, 2006, Value and damage of information: A data privacy perspective, Int. J. Approx. Reason., 10.1016/j.ijar.2006.04.002
Wang, 2007, An epistemic framework for privacy protection in database linking, Data Knowl. Eng., 61, 176, 10.1016/j.datak.2006.05.004
Wasserman, 1994
White, 1983, Graph and semigroup homomorphisms on networks and relations, Soc. Netw., 5, 143
Zadeh, 1965, Fuzzy sets, Inf. Control, 8, 338, 10.1016/S0019-9958(65)90241-X
Zheleva, 2012
Zhou, 2011, The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks, Knowl. Inf. Syst., 28, 47, 10.1007/s10115-010-0311-2
Zielinski, 2010, On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation, Data Knowl. Eng., 69, 399, 10.1016/j.datak.2009.10.012
