Sciweavers

7 search results - page 2 / 2
» Re-identification Methods for Masked Microdata
Sort
View
SAC
2010
ACM
13 years 12 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
BNCOD
2008
88views Database» more  BNCOD 2008»
13 years 8 months ago
An Empirical Study of Utility Measures for k-Anonymisation
Abstract. k-Anonymisation is a technique for masking microdata in order to prevent individual identification. Besides preserving privacy, data anonymised by such a method must also...
Grigorios Loukides, Jianhua Shao