Pages that link to "Item:Q4824635"
From MaRDI portal
The following pages link to ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION (Q4824635):
Displaying 35 items.
- Attribute association based privacy preservation for multi trust level environment (Q301772) (← links)
- A relational perspective of attribute reduction in rough set-based data analysis (Q421602) (← links)
- Dominance-based fuzzy rough set analysis of uncertain and possibilistic data tables (Q433508) (← links)
- \(k\)-anonymous data collection (Q730905) (← links)
- Efficient systematic clustering method for \(k\)-anonymization (Q766161) (← links)
- Towards the evaluation of time series protection methods (Q833741) (← links)
- Fixed-parameter tractability of anonymizing data by suppressing entries (Q849143) (← links)
- Value versus damage of information release: a data privacy perspective (Q855820) (← links)
- \(\varepsilon\)-inclusion: privacy preserving re-publication of dynamic datasets (Q946662) (← links)
- Distributed anonymous data perturbation method for privacy-preserving data mining (Q1045647) (← links)
- Pattern-guided \(k\)-anonymity (Q1736590) (← links)
- An efficient method for privacy preserving location queries (Q1762205) (← links)
- On the connections between statistical disclosure control for microdata and some artificial intelligence tools (Q1810469) (← links)
- Data confidentiality: a review of methods for statistical disclosure limitation and methods for assessing privacy (Q1950328) (← links)
- Logical characterizations of regular equivalence in weighted social networks (Q2014930) (← links)
- D2D big data privacy-preserving framework based on \((a, k)\)-anonymity model (Q2298159) (← links)
- Reidentification and \(k\)-anonymity: a model for disclosure risk in graphs (Q2392556) (← links)
- A polynomial-time approximation to optimal multivariate microaggregation (Q2426893) (← links)
- The effect of homogeneity on the computational complexity of combinatorial data anonymization (Q2435706) (← links)
- A logical framework for privacy-preserving social network publication (Q2447175) (← links)
- Anonymity protocols as noisy channels (Q2482451) (← links)
- Building access control policy model for privacy preserving and testing policy conflicting problems (Q2509591) (← links)
- ON THE USE OF HAAR WAVELET TRANSFORM AND SCALING DATA PERTURBATION FOR PRIVACY PRESERVING CLUSTERING OF LARGE DATASETS (Q2891162) (← links)
- Active Linking Attacks (Q2946424) (← links)
- Anonymous Data Collection System with Mediators (Q2947112) (← links)
- A FORMALIZATION OF RECORD LINKAGE AND ITS APPLICATION TO DATA PROTECTION (Q2948290) (← links)
- The Effect of Homogeneity on the Complexity of k-Anonymity (Q3088269) (← links)
- A method of eliminating information disclosure in view publishing (Q3443290) (← links)
- Protecting data: a fuzzy approach (Q3451411) (← links)
- Improving Microaggregation for Complex Record Anonymization (Q3540958) (← links)
- <i>T</i>-Closeness Slicing: A New Privacy-Preserving Approach for Transactional Data Publishing (Q5136073) (← links)
- Fixed-Parameter Tractability of Anonymizing Data by Suppressing Entries (Q5505640) (← links)
- Quantification of integrity (Q5740622) (← links)
- Covariance's loss is privacy's gain: computationally efficient, private and accurate synthetic data (Q6118081) (← links)
- Algorithms for efficiently computing structural anonymity in complex networks (Q6579773) (← links)