Sciweavers

1128 search results - page 1 / 226
» Structuring anonymity metrics
Sort
View
AICT
2006
IEEE
14 years 5 months ago
Recipient Anonymity in a Structured Overlay
An open problem in structured overlay networks is related to the anonymity to be provided to recipients, namely, those nodes who respond to request messages. Such a feature is of ...
Giuseppe Ciaccio
DIM
2006
ACM
14 years 5 months ago
Structuring anonymity metrics
Sebastian Clauß, Stefan Schiffner
DAWAK
2006
Springer
14 years 2 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
13 years 8 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...
ICDE
2010
IEEE
184views Database» more  ICDE 2010»
14 years 3 months ago
On optimal anonymization for l+-diversity
-- Publishing person specific data while protecting privacy is an important problem. Existing algorithms that enforce the privacy principle called l-diversity are heuristic based d...
Junqiang Liu, Ke Wang