Sciweavers

17 search results - page 1 / 4
» Data Privacy through Optimal k-Anonymization
Sort
View
ICDE
2005
IEEE
170views Database» more  ICDE 2005»
15 years 6 days ago
Data Privacy through Optimal k-Anonymization
Roberto J. Bayardo Jr., Rakesh Agrawal
ICDE
2008
IEEE
178views Database» more  ICDE 2008»
15 years 6 days ago
On the Optimal Selection of k in the k-Anonymity Problem
When disseminating data involving human subjects, researchers have to weigh in the requirements of privacy of the individuals involved in the data. A model widely used for enhancin...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
ICDM
2006
IEEE
127views Data Mining» more  ICDM 2006»
14 years 4 months ago
Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching
In recent years, a major thread of research on kanonymity has focused on developing more flexible generalization schemes that produce higher-quality datasets. In this paper we in...
Tiancheng Li, Ninghui Li
ICDE
2007
IEEE
1577views Database» more  ICDE 2007»
15 years 10 months ago
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
Ninghui Li, Tiancheng Li, Suresh Venkatasubramania...
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
15 years 6 days ago
k-Anonymization Revisited
In this paper we introduce new notions of k-type anonymizations. Those notions achieve similar privacy goals as those aimed by Sweenie and Samarati when proposing the concept of k-...
Aristides Gionis, Arnon Mazza, Tamir Tassa