Results 231 to 240 of about 47,575 (276)
Some of the next articles are maybe not open access.
Checking Anonymity Levels for Anonymized Data
2011Privacy Preserving Publication has become one of the most prominent research topics in the recent years. Several techniques like kanonymity, l-diversity and (α, k) anonymity were proposed to preserve privacy. Most of the published work focuses on anonymizing the microdata for preserving privacy and now the focus towards the verification of the ...
V. Valli Kumari +4 more
openaire +1 more source
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, 2009
Sharing healthcare data has become a vital requirement in healthcare system management; however, inappropriate sharing and usage of healthcare data could threaten patients' privacy. In this paper, we study the privacy concerns of the blood transfusion information-sharing system between the Hong Kong Red Cross Blood Transfusion Service (BTS) and public ...
Noman Mohammed +3 more
openaire +1 more source
Sharing healthcare data has become a vital requirement in healthcare system management; however, inappropriate sharing and usage of healthcare data could threaten patients' privacy. In this paper, we study the privacy concerns of the blood transfusion information-sharing system between the Hong Kong Red Cross Blood Transfusion Service (BTS) and public ...
Noman Mohammed +3 more
openaire +1 more source
Data anonymization: k-anonymity and de-anonymization attacks
2017Η ανάγκη για πρόσβαση σε δεδομένα που αφορούν πολίτες ολοένα αυξάνεται τα τελευταία χρόνια. Αυτά τα δεδομένα μπορεί να έχουν συλλεχθεί από κυβερνήσεις ή επιχειρήσεις για διάφορους σκοπούς και λόγους. Παρόλα αυτά η δημοσίευση των δεδομένων μπορεί να προκαλέσει διάφορα θέματα εάν δεν ληφθούν κατάλληλα μέτρα.
openaire +1 more source
Big data anonymization with spark
2017 International Conference on Computer Science and Engineering (UBMK), 2017Privacy is an important issue for big data including sensitive attributes. In the case of directly sharing or publishing these data, privacy breach occurs. In order to overcome this problem, previous studies were focused on developing big data anonymization techniques on Hadoop environment.
SAĞIROĞLU, ŞEREF, Canbay, Yavuz
openaire +2 more sources
Movement data anonymity through generalization
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009In recent years, spatio-temporal and moving objects databases have gained considerable interest, due to the diusion of mobile devices (e.g., mobile phones, RFID devices and GPS devices) and of new applications, where the discovery of consumable, concise, and applicable knowledge is the key step. Clearly, in these applications privacy is a concern,since
Gennady Andrienko +4 more
openaire +2 more sources
2006
Nowadays, more and more applications use sensitive and personal information, and preserving citizens' privacy is becoming extremely important. Addressing this issue, this paper suggests a rigorous approach to define data anonymization requirements, as well as how to characterize, select and build anonymizing solutions.
Abou El Kalam, Anas, Deswarte, Yves
openaire +1 more source
Nowadays, more and more applications use sensitive and personal information, and preserving citizens' privacy is becoming extremely important. Addressing this issue, this paper suggests a rigorous approach to define data anonymization requirements, as well as how to characterize, select and build anonymizing solutions.
Abou El Kalam, Anas, Deswarte, Yves
openaire +1 more source
Data anonymization evaluation for big data and IoT environment
Information Sciences, 2022Shancang Li
exaly
Improved l-diversity: Scalable anonymization approach for Privacy Preserving Big Data Publishing
Journal of King Saud University - Computer and Information Sciences, 2022Brijesh B Mehta, Udai Pratap Rao, Smieee
exaly

