Utility-based anonymization for privacy preservation with less information loss
- 1 December 2006
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGKDD Explorations Newsletter
- Vol. 8 (2) , 21-30
- https://doi.org/10.1145/1233321.1233324
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- IncognitoPublished by Association for Computing Machinery (ACM) ,2005
- Top-Down Specialization for Information and Privacy PreservationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Data Privacy through Optimal k-AnonymizationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- On the complexity of optimal K-anonymityPublished by Association for Computing Machinery (ACM) ,2004
- Anonymizing TablesPublished by Springer Nature ,2004
- ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSIONInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACYInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- Transforming data to satisfy privacy constraintsPublished by Association for Computing Machinery (ACM) ,2002
- Protecting respondents identities in microdata releaseIEEE Transactions on Knowledge and Data Engineering, 2001
- Multidimensional binary search trees used for associative searchingCommunications of the ACM, 1975