k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY

From MaRDI portal
Publication:4824634

DOI10.1142/S0218488502001648zbMath1085.68589WikidataQ64039008 ScholiaQ64039008MaRDI QIDQ4824634

Latanya Sweeney

Publication date: 1 November 2004

Published in: International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (Search for Journal in Brave)




Related Items (only showing first 100 items - show all)

Some basics on privacy techniques, anonymization and their big data challengesDifferentially private data publishing for arbitrarily partitioned dataImproving the characterization of P-stability for applications in network privacyApproximating degree sequences with regular graphic sequences (extended abstract)ON THE USE OF HAAR WAVELET TRANSFORM AND SCALING DATA PERTURBATION FOR PRIVACY PRESERVING CLUSTERING OF LARGE DATASETSA firm foundation for statistical disclosure controlTowards the evaluation of time series protection methodsCryptographic Technology for Benefiting from Big DataThe complex shape of anonymity in cryptocurrencies: case studies from a systematic approachTHE ANALYSIS OF SINGLETONS IN GENERALIZED BIRTHDAY PROBLEMSSurvey of information securityValue versus damage of information release: a data privacy perspectiveDifferentially private response mechanisms on categorical dataReidentification and \(k\)-anonymity: a model for disclosure risk in graphsOn the Complexity of the Minimum Independent Set Partition ProblemProphet: a context-aware location privacy-preserving scheme in location sharing serviceParameterized complexity of \(k\)-anonymity: hardness and tractabilityInference-proof updating of a weakened view under the modification of input parametersCDPS: a cryptographic data publishing systemOn the properties that characterize privacyEffective privacy preserving data publishing by vectorizationA formal analysis of information disclosure in data exchangeComputing Covariance and Correlation in Optimally Privacy-Protected Statistical Databases: Feasible AlgorithmsFuzzy microaggregation for the transparency principleAnonymous Data Collection System with MediatorsThe \(l\)-diversity problem: tractability and approximabilityPrivacy in Elections: k-Anonymizing Preference OrdersA FORMALIZATION OF RECORD LINKAGE AND ITS APPLICATION TO DATA PROTECTIONVine copula statistical disclosure control for mixed-type dataAn algebraic theory for data linkageExtended results on privacy against coalitions of users in user-private information retrieval protocolsPublishing anonymous survey rating dataEnhancing social network privacy with accumulated non-zero prior knowledgeA polynomial-time approximation to optimal multivariate microaggregationA relational perspective of attribute reduction in rough set-based data analysisA practical approximation algorithm for optimal \(k\)-anonymityKDVEM: a \(k\)-degree anonymity with vertex and edge modification algorithmData confidentiality: a review of methods for statistical disclosure limitation and methods for assessing privacyThe effect of homogeneity on the computational complexity of combinatorial data anonymizationPrivacy preserving and fast decision for novelty detection using support vector data descriptionTight FPT approximation for constrained \(k\)-center and \(k\)-supplierLogical foundations of information disclosure in ontology-based data integrationA hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloudMining probabilistic automata: a statistical view of sequential pattern miningDiscrimination- and privacy-aware patternsA logical framework for privacy-preserving social network publicationLinear spaces and transversal designs: \(k\)-anonymous combinatorial configurations for anonymous database search notesDNA-inspired information concealing: a surveyImproving Microaggregation for Complex Record AnonymizationPrivacy preserving OLAP over distributed XML data: A theoretically-sound secure-multiparty-computation approach\(k\)-attribute-anonymity is hard even for \(k=2\)Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion in Social NetworksStatically Defend Network Consumption Against Acker Failure Vulnerability in StormColumn generation bounds for numerical microaggregationParameterized Complexity of k-Anonymity: Hardness and Tractability\(r\)-gathering problems on spiders: hardness, FPT algorithms, and PTASesPattern-guided \(k\)-anonymityA differentiated anonymity algorithm for social network privacy preservationAn Active Global Attack Model for Sensor Source Location Privacy: Analysis and CountermeasuresDifferential privacy of hierarchical Census data: an optimization approach\(\varepsilon\)-inclusion: privacy preserving re-publication of dynamic datasetsOn compositional reasoning about anonymity and privacy in epistemic logicConstrained obfuscation of relational databasesEfficient privacy-preserving protocol for \(k\)-NN search over encrypted data in location-based serviceA weighted K-member clustering algorithm for K-anonymizationConditional anonymity with non-probabilistic adversaryGeneralized bucketization scheme for flexible privacy settingsOn environment-driven software model for internetwarePrivacy by diversity in sequential releases of databasesImportance partitioning in micro-aggregationAnonymity protocols as noisy channelsAnonymizing binary and small tables is hard to approximateEfficient secure data publishing algorithms for supporting information sharingLogical characterizations of regular equivalence in weighted social networksLimiting disclosure of sensitive data in sequential releases of databasesProcessing text for privacy: an information flow perspectiveChecking inference-proofness of attribute-disjoint and duplicate-preserving fragmentationsA general approach for optimizing dynamic sensor activation for discrete event systemsA derivative-free algorithm for refining numerical microaggregation solutions\(k\)-anonymous data collectionGeneralization-based privacy preservation and discrimination prevention in data publishing and miningPreserving worker privacy in crowdsourcingAchieving differential privacy of trajectory data publishing in participatory sensingStrongly universally consistent nonparametric regression and classification with privatised dataCommunity structure-based trilateral Stackelberg game model for privacy protectionA unified framework for clustering constrained data without locality propertyTowards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential PrivacyThe Effect of Homogeneity on the Complexity of k-AnonymityLPPRS: new location privacy preserving schemes based on ring signature over mobile social networksAnalysis of the univariate microaggregation disclosure riskEfficient systematic clustering method for \(k\)-anonymizationIntegrating domain and constraint privacy reasoning in the distributed stochastic algorithm with breakoutsPRIVACY RISK ASSESSMENT WITH BOUNDS DEDUCED FROM BOUNDSA balm: defend the clique-based attack from a fundamental aspectA novel vertical fragmentation method for privacy protection based on entropy minimization in a relational databaseSharing privacy protected and statistically sound clinical research data using outsourced data storageLossy kernelization of same-size clusteringGraphic sequences, distances and \(k\)-degree anonymityUsing patterns to form homogeneous teamsA refined complexity analysis of degree anonymization in graphs




This page was built for publication: k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY