ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION
From MaRDI portal
Publication:4824635
DOI10.1142/S021848850200165XzbMATH Open1084.68537OpenAlexW2119047901MaRDI QIDQ4824635FDOQ4824635
Authors: Latanya Sweeney
Publication date: 1 November 2004
Published in: International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1142/s021848850200165x
Recommendations
Cited In (41)
- A method of eliminating information disclosure in view publishing
- The effect of homogeneity on the computational complexity of combinatorial data anonymization
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY
- A polynomial-time approximation to optimal multivariate microaggregation
- Fixed-Parameter Tractability of Anonymizing Data by Suppressing Entries
- Active linking attacks
- Pattern-guided \(k\)-anonymity
- A practical approximation algorithm for optimal \(k\)-anonymity
- A relational perspective of attribute reduction in rough set-based data analysis
- Algorithms for efficiently computing structural anonymity in complex networks
- An efficient method for privacy preserving location queries
- Data confidentiality: a review of methods for statistical disclosure limitation and methods for assessing privacy
- Dominance-based fuzzy rough set analysis of uncertain and possibilistic data tables
- A comparison between local and global recoding algorithms for achieving microdata \(p\)-sensitive \(k\)-anonymity
- Protecting data: a fuzzy approach
- Value versus damage of information release: a data privacy perspective
- The effect of homogeneity on the complexity of \(k\)-anonymity
- Quantification of integrity
- A dynamic anonymization privacy-preserving model based on hierarchical sequential three-way decisions
- Attribute association based privacy preservation for multi trust level environment
- Anonymous Data Collection System with Mediators
- A logical framework for privacy-preserving social network publication
- \(T\)-closeness slicing: a new privacy-preserving approach for transactional data publishing
- Anonymity protocols as noisy channels
- Improving Microaggregation for Complex Record Anonymization
- Towards the evaluation of time series protection methods
- Efficient systematic clustering method for \(k\)-anonymization
- Reidentification and \(k\)-anonymity: a model for disclosure risk in graphs
- Building access control policy model for privacy preserving and testing policy conflicting problems
- Distributed anonymous data perturbation method for privacy-preserving data mining
- On the connections between statistical disclosure control for microdata and some artificial intelligence tools
- k-Anonymization with Minimal Loss of Information
- D2D big data privacy-preserving framework based on \((a, k)\)-anonymity model
- \(k\)-anonymous data collection
- Data and Applications Security XIX
- On the use of Haar wavelet transform and scaling data perturbation for privacy preserving clustering of large datasets
- Fixed-parameter tractability of anonymizing data by suppressing entries
- Logical characterizations of regular equivalence in weighted social networks
- Covariance's loss is privacy's gain: computationally efficient, private and accurate synthetic data
- \(\varepsilon\)-inclusion: privacy preserving re-publication of dynamic datasets
- A formalization of record linkage and its application to data protection
This page was built for publication: ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4824635)