Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymity model has been introduced for protecting individual identification. Recent studies show that a more sophisticated model is necessary to protect the association of individuals to sensitive information. In this paper, we propose an (α, k)-anonymity model to protect both identifications and rela-tionships to sensitive information in data. We discuss the proper-ties of (α, k)-anonymity model. We prove that the optimal (α, k)-anonymity problem is NP-hard. We first present an optimal global-recoding method for the (α, k)-anonymity problem. Next we pro-pose a local-recoding algorithm which is more scalable and result in less data distortion. The ...
Consider a data holder, such as a hospital or a bank, that has a privately held collection of person...
Abstract. One of the emerging concepts in microdata protection is k-anonymity, introduced by Samarat...
Abstract. One of the most well studied models of privacy preservation is k-anonymity. Previous studi...
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymi...
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymi...
Data de-identification reconciles the demand for release of data for research purposes and the deman...
K-Anonymity has been proposed as a mechanism for privacy protection in microdata publishing, and num...
Datasets containing private and sensitive information are useful for data analytics. Data owners cau...
The prevalent conditions in data sharing and mining have necessitated the release and ...
We consider the problem of releasing a table containing personal records, while ensuring individual ...
Often a data holder, such as a hospital or bank, needs to share person-specific records in such a wa...
Abstract. The technique of k-anonymization allows the releasing of databases that contain personal i...
Abstract — Classification is a fundamental problem in data analysis. Training a classifier requires ...
Data privacy has been an important area of research in recent years. Dataset often consists of sensi...
Abstract. Privacy-preserving data publication for data mining is to protect sensitive information of...
Consider a data holder, such as a hospital or a bank, that has a privately held collection of person...
Abstract. One of the emerging concepts in microdata protection is k-anonymity, introduced by Samarat...
Abstract. One of the most well studied models of privacy preservation is k-anonymity. Previous studi...
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymi...
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymi...
Data de-identification reconciles the demand for release of data for research purposes and the deman...
K-Anonymity has been proposed as a mechanism for privacy protection in microdata publishing, and num...
Datasets containing private and sensitive information are useful for data analytics. Data owners cau...
The prevalent conditions in data sharing and mining have necessitated the release and ...
We consider the problem of releasing a table containing personal records, while ensuring individual ...
Often a data holder, such as a hospital or bank, needs to share person-specific records in such a wa...
Abstract. The technique of k-anonymization allows the releasing of databases that contain personal i...
Abstract — Classification is a fundamental problem in data analysis. Training a classifier requires ...
Data privacy has been an important area of research in recent years. Dataset often consists of sensi...
Abstract. Privacy-preserving data publication for data mining is to protect sensitive information of...
Consider a data holder, such as a hospital or a bank, that has a privately held collection of person...
Abstract. One of the emerging concepts in microdata protection is k-anonymity, introduced by Samarat...
Abstract. One of the most well studied models of privacy preservation is k-anonymity. Previous studi...