So that providing privacy guarantees to anonymized databases, anonymization models have emerged few decades ago. Among them, you can find k-anonymity, l-diversity, t-proximity or differential confidentiality. In this thesis, we mainly focused on the k-anonymity model through an in-depth analysis of the ways to produce databases that meet these confidentiality criteria while optimizing data utility. From a table, you can consider the set of its k-anonymous versions, which can be of exponential cardinality according to k. In a vacuum, these k-anonymous versions can be scored thanks to the amount of data modification that is correlated to the data utility. Thus, this work proposes a study of how to optimize the data utility during the process ...
Abstract. One of the most well studied models of privacy preservation is k-anonymity. Previous studi...
Driven by mutual benefits, exchange and publication of data among various parties is an inevitable t...
Preserving privacy while publishing data has emerged as key research area in data security and has b...
Pour donner des garanties de protection de la vie privée aux bases de données anonymisées, des modèl...
K-anonymisation, as an approach to protecting data privacy, has received much recent attention from ...
We consider the problem of releasing a table containing personal records, while ensuring individual ...
The concept of k-anonymity has received considerable attention due to the need of several organizati...
The technique of k-anonymization allows the releasing of databases that contain personal information...
Abstract—The concept of k-anonymity has received considerable attention due to the need of several o...
Data de-identification reconciles the demand for release of data for research purposes and the deman...
Abstract. The technique of k-anonymization allows the releasing of databases that contain personal i...
In order to protect individuals’ privacy, the technique of kanonymization has been proposed to de-as...
Most of the recent efforts addressing the issue of privacy have focused on devising algorithms for t...
K-anonymisation is an approach to protecting privacy contained within a data set. A good k-anonymisa...
In this work we present an algorithm for k-anonymization of datasets that are changing over time. It...
Abstract. One of the most well studied models of privacy preservation is k-anonymity. Previous studi...
Driven by mutual benefits, exchange and publication of data among various parties is an inevitable t...
Preserving privacy while publishing data has emerged as key research area in data security and has b...
Pour donner des garanties de protection de la vie privée aux bases de données anonymisées, des modèl...
K-anonymisation, as an approach to protecting data privacy, has received much recent attention from ...
We consider the problem of releasing a table containing personal records, while ensuring individual ...
The concept of k-anonymity has received considerable attention due to the need of several organizati...
The technique of k-anonymization allows the releasing of databases that contain personal information...
Abstract—The concept of k-anonymity has received considerable attention due to the need of several o...
Data de-identification reconciles the demand for release of data for research purposes and the deman...
Abstract. The technique of k-anonymization allows the releasing of databases that contain personal i...
In order to protect individuals’ privacy, the technique of kanonymization has been proposed to de-as...
Most of the recent efforts addressing the issue of privacy have focused on devising algorithms for t...
K-anonymisation is an approach to protecting privacy contained within a data set. A good k-anonymisa...
In this work we present an algorithm for k-anonymization of datasets that are changing over time. It...
Abstract. One of the most well studied models of privacy preservation is k-anonymity. Previous studi...
Driven by mutual benefits, exchange and publication of data among various parties is an inevitable t...
Preserving privacy while publishing data has emerged as key research area in data security and has b...