• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wu Zhenqiang, Ma Jianfeng. A Joint-Entropy-Based Anonymity Metrics Model with Multi-Property[J]. Journal of Computer Research and Development, 2006, 43(7): 1240-1245.
Citation: Wu Zhenqiang, Ma Jianfeng. A Joint-Entropy-Based Anonymity Metrics Model with Multi-Property[J]. Journal of Computer Research and Development, 2006, 43(7): 1240-1245.

A Joint-Entropy-Based Anonymity Metrics Model with Multi-Property

More Information
  • Published Date: July 14, 2006
  • An anonymity metrics model with three properties based on joint entropy is given in this paper. The three properties are identifiable, linkable and traceable respectively. According to randomness and fuzziness of anonymity, a fuzzy pattern recognition model is presented based on entropy and least generalized weighted distance, which makes the membership vector of anonymity grades have a desirable dispersive property. A method is proposed for computing the balance parameter between entropy and the generalized weighted distance. It is illustrated that the presented method has advantages over Shannon entropy like models in performance. The method can determine uniquely the balance parameter defined in this paper. Therefore, joint entropy is applied to evaluate the anonymity grades.
  • Related Articles

    [1]Zhang Heng, Zhang Libo, WuYanjun. Large-Scale Graph Processing on Multi-GPU Platforms[J]. Journal of Computer Research and Development, 2018, 55(2): 273-288. DOI: 10.7544/issn1000-1239.2018.20170697
    [2]Liu Linlan, Zhang Jiang, Shu Jian, Guo Kai, Meng Lingchong. Multiple Attribute Decision Making-Based Prediction Approach of Critical Node for Opportunistic Sensor Networks[J]. Journal of Computer Research and Development, 2017, 54(9): 2021-2031. DOI: 10.7544/issn1000-1239.2017.20160645
    [3]Liu Yi, Lei Cheng, Zhang Hongqi, Yang Yingjie. MapReduce-Based Network Property Verification Technique for OpenFlow Network[J]. Journal of Computer Research and Development, 2016, 53(11): 2500-2511. DOI: 10.7544/issn1000-1239.2016.20150521
    [4]Li Zhen, Tian Junfeng, and Yang Xiaohui. Dynamic Trustworthiness Evaluation Model of Software Based on Checkpoint's Classification Attributes[J]. Journal of Computer Research and Development, 2013, 50(11): 2397-2405.
    [5]Ye Jun, Tan Qingping, Li Tun. The Property Inference of Aspect-Oriented Program[J]. Journal of Computer Research and Development, 2013, 50(2): 344-351.
    [6]Li Chao, Yin Lihua, Guo Yunchuan. Analysis for Probabilistic and Timed Information Flow Security Properties via ptSPA[J]. Journal of Computer Research and Development, 2011, 48(8): 1370-1380.
    [7]Lu Han, Cao Cungen, Wang Shi. Implementation of a Meta-Property Based Quantity Attribute-Value Extraction System[J]. Journal of Computer Research and Development, 2010, 47(10): 1741-1748.
    [8]Zhang Pengcheng, Zhou Yu, Li Bixin, and Xu Baowen. Property Sequence Chart: Formal Syntax and Semantic[J]. Journal of Computer Research and Development, 2008, 45(2): 318-328.
    [9]Chen Xiang, Hu Shanli, Shi Manyin. A Secure Multi-Attribute Auction Model[J]. Journal of Computer Research and Development, 2007, 44(4): 680-685.
    [10]Jin Xing, Shi Chunyi. An Ascending Bid Multi-Attribute Auction Method[J]. Journal of Computer Research and Development, 2006, 43(7): 1135-1141.

Catalog

    Article views (764) PDF downloads (640) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return