Data Privacy through Optimal k-Anonymization
Top Cited Papers
- 19 April 2005
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 9 references indexed in Scilit:
- On the complexity of optimal K-anonymityPublished by Association for Computing Machinery (ACM) ,2004
- ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSIONInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACYInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- Transforming data to satisfy privacy constraintsPublished by Association for Computing Machinery (ACM) ,2002
- Protecting respondents identities in microdata releaseIEEE Transactions on Knowledge and Data Engineering, 2001
- Privacy-preserving data miningPublished by Association for Computing Machinery (ACM) ,2000
- Constraint-based rule mining in large, dense databasesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1999
- Generalizing data to provide anonymity when disclosing information (abstract)Published by Association for Computing Machinery (ACM) ,1998
- OPUS: An Efficient Admissible Algorithm for Unordered SearchJournal of Artificial Intelligence Research, 1995