Results 271 to 280 of about 12,445,360 (313)
Some of the next articles are maybe not open access.

K-Anonymity for Crowdsourcing Database

IEEE Transactions on Knowledge and Data Engineering, 2014
In crowdsourcing database, human operators are embedded into the database engine and collaborate with other conventional database operators to process the queries. Each human operator publishes small HITs (Human Intelligent Task) to the crowdsourcing platform, which consist of a set of database records and corresponding questions for human workers. The
null Sai Wu   +4 more
openaire   +1 more source

Approximate algorithms for K-anonymity

Proceedings of the 2007 ACM SIGMOD international conference on Management of data, 2007
When a table containing individual data is published, disclosure of sensitive information should be prohibitive. A naive approach for the problem is to remove identifiers such as name and social security number. However, linking attacks which joins the published table with other tables on some attributes, called quasi-identifier, may reveal the ...
Hyoungmin Park, Kyuseok Shim
openaire   +1 more source

Multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions

Expert systems with applications, 2023
Jin Qian   +4 more
semanticscholar   +1 more source

κ-Anonymity

2007
To protect respondents’ identity when releasing microdata, data holders often remove or encrypt explicit identifiers, such as names and social security numbers. De-identifying data, however, provide no guarantee of anonymity. Released information often contains other data, such as race, birth date, sex, and ZIP code, that can be linked to publicly ...
V. Ciriani   +3 more
openaire   +2 more sources

Nibble: An effective k-anonymization

2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC), 2011
K-Anonymity technique is a useful way to protect privacy in information sharing. This paper presents a practical framework for implementing one type of k-anonymization, based on which a greedy algorithm named Nibble for producing approximately minimal generalizations is introduced.
Lei He, Songnian Yu
openaire   +1 more source

Towards Flexible K-Anonymity

2016
Data published online nowadays needs a high level of privacy to gain confidentiality as well as to maintain the privacy laws. The focus on k-anonymity enhancements along the last decade, allows this method to be elected as the starting point of any research.
Rima Kilany   +3 more
openaire   +1 more source

k-Anonymous Data Mining: A Survey

2008
Data mining technology has attracted significant interest as a means of identifying patterns and trends from large collections of data. It is however evident that the collection and analysis of data that include personal information may violate the privacy of the individuals to whom information refers. Privacy protection in data mining is then becoming
V. Ciriani   +3 more
openaire   +2 more sources

k-Anonymity

2021
Sabrina De Capitani di Vimercati   +1 more
openaire   +1 more source

Achieving k-Anonymity Privacy Protection Using Generalization and Suppression

Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2002
L. Sweeney
semanticscholar   +1 more source

From K-anonymity to Differential Privacy back to K -anonymity!

2013
The research community has left no stone unturned in devising strategies for both syntactic and semantic privacy definitions. The literature on privacy protection reveals that no privacy model is capable of incorporating growing demands of data publication (e.g., the adversarial background, needs of data publisher, constraints on underlying dataset etc.
Anjum, Adeel   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy