Constrained obfuscation of relational databases
From MaRDI portal
Publication:508612
DOI10.1016/J.INS.2014.07.009zbMATH Open1355.68075OpenAlexW2088007701MaRDI QIDQ508612FDOQ508612
Authors: Erez Shmueli, Tomer Zrihen, Ran Yahalom, Tamir Tassa
Publication date: 7 February 2017
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.07.009
Recommendations
- Resolving the Complexity of Some Data Privacy Problems
- \(K\)-anonymization approaches for supporting multiple constraints
- Privacy-preserving data publishing: a constraint-based clustering approach
- A sound and complete model-generation procedure for consistent and confidentiality-preserving databases
- Database Theory - ICDT 2005
Cryptography (94A60) Database theory (68P15) Authentication, digital signatures and secret sharing (94A62)
Cites Work
Cited In (2)
Uses Software
This page was built for publication: Constrained obfuscation of relational databases
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q508612)