Results 21 to 30 of about 48,693 (258)
Going Beyond Obscurity: Organizational Approaches to Data Anonymization [PDF]
Anonymization is viewed as a solution to over-exposure of personal information in a data-driven society. Yet how organizations apply anonymization techniques to data for regulatory, ethical or commercial reasons remains underexplored.
Hargitai, Viktor +2 more
core +1 more source
Privacy Preservation by Disassociation [PDF]
In this work, we focus on protection against identity disclosure in the publication of sparse multidimensional data. Existing multidimensional anonymization techniquesa) protect the privacy of users either by altering the set of quasi-identifiers of the ...
Liagouris, John +3 more
core +2 more sources
De-anonymiation method for networks based on DeepLink
Existing de-anonymization technologies are mainly based on the network structure. To learn and express network structure is the key step of de-anonymization.
WANG Pei, JIA Yan, LI Aiping, JIANG Qianyue
doaj +1 more source
An Automated Social Graph De-anonymization Technique [PDF]
We present a generic and automated approach to re-identifying nodes in anonymized social networks which enables novel anonymization techniques to be quickly evaluated.
Criminisi A. +3 more
core +1 more source
Understanding structure-based social network de-anonymization techniques via empirical analysis
The rapid development of wellness smart devices and apps, such as Fitbit Coach and FitnessGenes, has triggered a wave of interaction on social networks. People communicate with and follow each other based on their wellness activities.
Jian Mao +5 more
doaj +1 more source
Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge [PDF]
This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.com. The goal of the contest was to promote research on real-world link prediction, and the dataset was a graph obtained by crawling the popular Flickr social
Narayanan, Arvind +2 more
core +1 more source
Algorithms to anonymize structured medical and healthcare data: A systematic review
Introduction: With many anonymization algorithms developed for structured medical health data (SMHD) in the last decade, our systematic review provides a comprehensive bird’s eye view of algorithms for SMHD anonymization.Methods: This systematic review ...
Ali Sepas +6 more
doaj +1 more source
We introduce the notion of parameterised anonymity, to formalize the anonymity property of protocols with an arbitrary number of participants. This definition is an extension of the well known CSP anonymity formalization of Schneider and Sidiropoulos [18]. Using recently developed invariant techniques for solving parameterised boolean equation systems,
Groote, Jan Friso, Orzan, Simona
openaire +3 more sources
Quantification of De-anonymization Risks in Social Networks
The risks of publishing privacy-sensitive data have received considerable attention recently. Several de-anonymization attacks have been proposed to re-identify individuals even if data anonymization techniques were applied.
Ji, Shouling +4 more
core +1 more source
Personal data have been increasingly used in data-driven applications to improve quality of life. However, privacy preservation of personal data while sharing it with analysts/ researchers has become an essential requirement to be met by data owners ...
Abdul Majeed, Seong Oun Hwang
doaj +1 more source

