K-anonymization is an important technique for the de-identification of sensitive datasets. In this paper, we briefly describe an implementation framework which has been carefully engineered to meet the needs of an important class of k-anonymity algorithms. We have implemented and evaluated two major well-known algorithms within this framework and show that it allows for highly efficient implementations. Regarding their runtime behaviour, we were able to closely reproduce the results from previous publications but also found some algorithmic limitations. Furthermore, we propose a new algorithm that achieves very good performance by implementing a novel strategy and exploiting different aspects of our implementation framework. In contrast to ...
Abstract. One of the most well studied models of privacy preservation is k-anonymity. Previous studi...
Micro-data protection is a hot topic in the eld of Statis-tical Disclosure Control (SDC), that has g...
K-anonymisation is an approach to protecting privacy contained within a data set. A good k-anonymisa...
Data de-identification reconciles the demand for release of data for research purposes and the deman...
K-anonymization is a wide-spread technique for the de-identification of biomedical datasets. To not ...
K-Anonymity is a property for the measurement, management, and governance of the data anonymization....
We suggest a user-oriented approach to combinatorial data anonymization. A data matrix is called k-a...
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymi...
We consider the problem of releasing a table containing personal records, while ensuring individual ...
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymi...
The vast amount of data being collected about individuals has brought new challenges in protecting t...
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymi...
K-anonymisation is an approach to protecting private information contained within a dataset. Many k-...
Recent research studied the problem of publishing microdata without revealing sensitive information,...
Abstract. The technique of k-anonymization allows the releasing of databases that contain personal i...
Abstract. One of the most well studied models of privacy preservation is k-anonymity. Previous studi...
Micro-data protection is a hot topic in the eld of Statis-tical Disclosure Control (SDC), that has g...
K-anonymisation is an approach to protecting privacy contained within a data set. A good k-anonymisa...
Data de-identification reconciles the demand for release of data for research purposes and the deman...
K-anonymization is a wide-spread technique for the de-identification of biomedical datasets. To not ...
K-Anonymity is a property for the measurement, management, and governance of the data anonymization....
We suggest a user-oriented approach to combinatorial data anonymization. A data matrix is called k-a...
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymi...
We consider the problem of releasing a table containing personal records, while ensuring individual ...
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymi...
The vast amount of data being collected about individuals has brought new challenges in protecting t...
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymi...
K-anonymisation is an approach to protecting private information contained within a dataset. Many k-...
Recent research studied the problem of publishing microdata without revealing sensitive information,...
Abstract. The technique of k-anonymization allows the releasing of databases that contain personal i...
Abstract. One of the most well studied models of privacy preservation is k-anonymity. Previous studi...
Micro-data protection is a hot topic in the eld of Statis-tical Disclosure Control (SDC), that has g...
K-anonymisation is an approach to protecting privacy contained within a data set. A good k-anonymisa...