ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION

From MaRDI portal
Publication:4824635

DOI10.1142/S021848850200165XzbMath1084.68537OpenAlexW2119047901MaRDI QIDQ4824635

Latanya Sweeney

Publication date: 1 November 2004

Published in: International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1142/s021848850200165x



Related Items

ON THE USE OF HAAR WAVELET TRANSFORM AND SCALING DATA PERTURBATION FOR PRIVACY PRESERVING CLUSTERING OF LARGE DATASETS, A method of eliminating information disclosure in view publishing, Towards the evaluation of time series protection methods, Attribute association based privacy preservation for multi trust level environment, Protecting data: a fuzzy approach, Fixed-parameter tractability of anonymizing data by suppressing entries, Value versus damage of information release: a data privacy perspective, Reidentification and \(k\)-anonymity: a model for disclosure risk in graphs, Active Linking Attacks, Anonymous Data Collection System with Mediators, A FORMALIZATION OF RECORD LINKAGE AND ITS APPLICATION TO DATA PROTECTION, Covariance's loss is privacy's gain: computationally efficient, private and accurate synthetic data, A polynomial-time approximation to optimal multivariate microaggregation, A relational perspective of attribute reduction in rough set-based data analysis, Dominance-based fuzzy rough set analysis of uncertain and possibilistic data tables, Data confidentiality: a review of methods for statistical disclosure limitation and methods for assessing privacy, The effect of homogeneity on the computational complexity of combinatorial data anonymization, A logical framework for privacy-preserving social network publication, T-Closeness Slicing: A New Privacy-Preserving Approach for Transactional Data Publishing, Improving Microaggregation for Complex Record Anonymization, Pattern-guided \(k\)-anonymity, \(\varepsilon\)-inclusion: privacy preserving re-publication of dynamic datasets, Anonymity protocols as noisy channels, An efficient method for privacy preserving location queries, Quantification of integrity, Logical characterizations of regular equivalence in weighted social networks, Building access control policy model for privacy preserving and testing policy conflicting problems, \(k\)-anonymous data collection, D2D big data privacy-preserving framework based on \((a, k)\)-anonymity model, On the connections between statistical disclosure control for microdata and some artificial intelligence tools, The Effect of Homogeneity on the Complexity of k-Anonymity, Efficient systematic clustering method for \(k\)-anonymization, Distributed anonymous data perturbation method for privacy-preserving data mining, Fixed-Parameter Tractability of Anonymizing Data by Suppressing Entries