From t-closeness to differential privacy and vice versa in data anonymization
نویسندگان
چکیده
منابع مشابه
From t-closeness to differential privacy and vice versa in data anonymization
k-Anonymity and ε-differential privacy are two mainstream privacy models, the former introduced to anonymize data sets and the latter to limit the knowledge gain that results from the inclusion of one individual in the data set. Whereas basic k-anonymity only protects against identity disclosure, t-closeness was presented as an extension of k-anonymity that also protects against attribute discl...
متن کاملFrom numbers to Numerals and Vice Versa
Universally used decimal representations, such as 5; 200; 856763; 189200000 are rendered (written, pronounced) differently in different languages. The number 5 is tllus five in English, fern in Swedish, cinq in French, ketsmala in Koyukon, biyar in Hausa and nga: in Burmese. Numbers can furthermore be written differently in different mathematical systems. The number 5 is written V in the Roman ...
متن کاملSurgery from experimental research to clinical application and vice-versa.
Producing knowledge is of fundamental importance and disseminating knowledge is a moral and ethical task that must not be neglected, especially by those who belong to a university institution strongly committed to teaching, research and patient care. The words science, technology and research denote three highly complex concepts of human activity. In medicine, and in surgery in particular, this...
متن کاملFrom Shock Response Spectrum to Temporal Moments and Vice-versa
Temporal moments have been used in engineering mechanics to condense the information contained in the shock response spectrum into a few scalar quantities. This paper presents an application of temporal moments to the propagation of an explosivedriven shock wave through an assembly of metallic parts. For this particular application, it is shown that temporal moments characterize the response of...
متن کاملOn the Complexity of t-Closeness Anonymization and Related Problems
An important issue in releasing individual data is to protect the sensitive information from being leaked and maliciously utilized. Famous privacy preserving principles that aim to ensure both data privacy and data integrity, such as k-anonymity and l-diversity, have been extensively studied both theoretically and empirically. Nonetheless, these widely-adopted principles are still insufficient ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Knowledge-Based Systems
سال: 2015
ISSN: 0950-7051
DOI: 10.1016/j.knosys.2014.11.011