Thoughts on k-anonymization
- 31 December 2007
- journal article
- Published by Elsevier in Data & Knowledge Engineering
- Vol. 63 (3) , 622-645
- https://doi.org/10.1016/j.datak.2007.03.009
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- t-Closeness: Privacy Beyond k-Anonymity and l-DiversityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- MultiRelational k-AnonymityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- A secure distributed framework for achieving k-anonymityThe VLDB Journal, 2006
- Achieving anonymity via clusteringPublished by Association for Computing Machinery (ACM) ,2006
- L-diversity: privacy beyond k-anonymityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Weak k-Anonymity: A Low-Distortion Model for Protecting PrivacyPublished by Springer Nature ,2006
- Ordinal, Continuous and Heterogeneous k-Anonymity Through MicroaggregationData Mining and Knowledge Discovery, 2005
- IncognitoPublished by Association for Computing Machinery (ACM) ,2005
- Transforming data to satisfy privacy constraintsPublished by Association for Computing Machinery (ACM) ,2002
- Using Boolean reasoning to anonymize databasesArtificial Intelligence in Medicine, 1999