Results 11 to 20 of about 51,151 (259)
Implementasi Algoritma Mondrian Multidimensional K-Anonymity pada Biodata Calon Legislatif
Uni Eropa menerbitkan sebuah peraturan yang bernama General Data Protection Regulation (GDPR) untuk menjaga privasi warga. Peraturan ini meregulasi penyebaran data-data pribadi seperti nama, nomor telepon atau alamat yang mungkin akan digunakan untuk ...
Adam Akbar +2 more
doaj +1 more source
MultiRelational k-Anonymity [PDF]
k-anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous dataset, any identifying information occurs in at least k tuples. Much research has been done to modify a single table dataset to satisfy anonymity constraints.
Nergiz, M.E., Clifton, C., Nergiz, A.E.
openaire +4 more sources
Privacy-preserving data compression scheme for k-anonymity model based on Huffman coding
The k-anonymity model is widely used as a data anonymization technique for privacy protection during the data release phase.However, with the advent of the big data era, the generation of vast amounts of data poses challenges to data storage.However, it ...
Yue YU, Xianzheng LIN, Weihai LI, Nenghai YU
doaj +3 more sources
Privacy Protection Method for k Degree Anonymity Based on Node Classification [PDF]
Existing k degree anonymous privacy protection methods usually damage the graph structure significantly and cannot resist structural background knowledge attacks.To address the problem,this paper proposes an improved k degree anonymous privacy protection
JIN Ye, DING Xiaobo, GONG Guoqiang, Lü Ke
doaj +1 more source
Privacy Protection Method in Continuous Publishing of Graph Data [PDF]
With the development of Internet technology and popularity of intelligent terminals, a large amount of user privacy data have been generated in social networks.The public release of social network data increases the risk of user privacy disclosure ...
ZHU Liming, DING Xiaobo, GONG Guoqiang
doaj +1 more source
It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in order to ensure a required statistical significance, represent a large number of individuals and thus conceal individual identities: this is the case of the minimum support ...
ATZORI, MAURIZIO +3 more
openaire +7 more sources
On the $$(k,\ell )$$ ( k , ℓ ) -anonymity of networks via their k-metric antidimension
This work focuses on the $$(k,\ell )$$ ( k , ℓ ) -anonymity of some networks as a measure of their privacy against active attacks. Two different types of networks are considered.
Elena Fernández +3 more
doaj +1 more source
top-k Path Greedy Generalization Algorithm of Anonymity Shortest Path [PDF]
With the development of social networks,the issues of privacy preservation arouse extensive attention.It can cause privacy disclosure of the shortest path if weighted social network data are protected before its publication.In order to solve this issue ...
CHEN Weihe,DING Leilei
doaj +1 more source
Abstract Anonymization-based privacy protection ensures that published data cannot be linked back to an individual. The most common approach in this domain is to apply generalizations on the private data in order to maintain a privacy standard such as k -anonymity.
Nergiz, Mehmet Ercan +1 more
openaire +2 more sources
Spatiotemporal Mobility Based Trajectory Privacy-Preserving Algorithm in Location-Based Services
Recent years have seen the wide application of Location-Based Services (LBSs) in our daily life. Although users can enjoy many conveniences from the LBSs, they may lose their trajectory privacy when their location data are collected.
Zhiping Xu +4 more
doaj +1 more source

