The technique of k-anonymization allows the releasing of databases that contain personal information while ensuring some degree of individual privacy. Given a database D that needs to be released, one produces a so-called k-anonymized version of that database where each record is indistinguishable from at least k − 1 additional records. The anonymization process is usually performed by suppressing or generalizing database entries. We formally study the concept of generalization, and propose two information-theoretic measures for capturing the amount of information that is lost during the anonymization process. We call these two measures, the entropy measure and the non-uniform entropy measure. The proposed measures are more general and more...
Abstract—The concept of k-anonymity has received considerable attention due to the need of several o...
In recent years, a major thread of research on k-anonymity has focused on developing more flexible g...
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymi...
Abstract. The technique of k-anonymization allows the releasing of databases that contain personal i...
We consider the problem of releasing a table containing personal records, while ensuring individual ...
Data de-identification reconciles the demand for release of data for research purposes and the deman...
Abstract. One of the most well studied models of privacy preservation is k-anonymity. Previous studi...
So that providing privacy guarantees to anonymized databases, anonymization models have emerged few ...
In this work we present an algorithm for k-anonymization of datasets that are changing over time. It...
Microdata protection is a hot topic in the field of Statistical Disclosure Control, which has gained...
Often a data holder, such as a hospital or bank, needs to share person-specific records in such a wa...
Among the privacy-preserving approaches that are known in the literature, h-anonymity remains the ba...
Syntactic data anonymization strives to (i) ensure that an adversary cannot identify an individual’s...
The concept of k-anonymity has received considerable attention due to the need of several organizati...
When releasing microdata for research purposes, one needs to preserve the privacy of re-spondents wh...
Abstract—The concept of k-anonymity has received considerable attention due to the need of several o...
In recent years, a major thread of research on k-anonymity has focused on developing more flexible g...
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymi...
Abstract. The technique of k-anonymization allows the releasing of databases that contain personal i...
We consider the problem of releasing a table containing personal records, while ensuring individual ...
Data de-identification reconciles the demand for release of data for research purposes and the deman...
Abstract. One of the most well studied models of privacy preservation is k-anonymity. Previous studi...
So that providing privacy guarantees to anonymized databases, anonymization models have emerged few ...
In this work we present an algorithm for k-anonymization of datasets that are changing over time. It...
Microdata protection is a hot topic in the field of Statistical Disclosure Control, which has gained...
Often a data holder, such as a hospital or bank, needs to share person-specific records in such a wa...
Among the privacy-preserving approaches that are known in the literature, h-anonymity remains the ba...
Syntactic data anonymization strives to (i) ensure that an adversary cannot identify an individual’s...
The concept of k-anonymity has received considerable attention due to the need of several organizati...
When releasing microdata for research purposes, one needs to preserve the privacy of re-spondents wh...
Abstract—The concept of k-anonymity has received considerable attention due to the need of several o...
In recent years, a major thread of research on k-anonymity has focused on developing more flexible g...
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymi...