k-Anonymity in the Presence of External Databases
نویسندگان
چکیده
منابع مشابه
On Guaranteeing k-Anonymity in Location Databases
The development of location-based services and mobile devices has lead to an increase in the location data. Through the data mining process, some valuable information can be discovered from location data. However, the attackers may also extract some private (sensitive) information of the user and this can make threats against the user location privacy. Therefore, location privacy protection bec...
متن کاملk-Anonymity
To protect respondents’ identity when releasing microdata, data holders often remove or encrypt explicit identifiers, such as names and social security numbers. De-identifying data, however, provide no guarantee of anonymity. Released information often contains other data, such as race, birth date, sex, and ZIP code, that can be linked to publicly available information to re-identify respondent...
متن کاملAnonymity: Formalisation of Privacy – k-anonymity
Microdata is the basis of statistical studies. If microdata is released, it can leak sensitive information about the participants, even if identifiers like name or social security number are removed. A proper anonymization for statistical microdata is essential. K-anonymity has been intensively discussed as a measure for anonymity in statistical data. Quasi identifiers are attributes that might...
متن کاملthe effect of the record infancy in crimilly acts of guilties (in karaj city)
چکیده یکی از مهمترین دغدغه های بزرگ جوامع بشری، از دیر باز تا کنون که ذهن پژوهشگران و متخصصان بهداشت روانی و اجتماعی و دولتها رابه خود مشغول داشته، مسأله ی بزهکاری می باشد. شناخت کامل پدیده ی بزهکاری و بزهکار، علل وعوامل سقوط یک انسان، چگونگی درمان وی و درنهایت پیشگیری ازبزهکاری ودریک کلام سالم سازی یک جامعه، رسالت عظیم، انسانی ومقدسی می باشد که با بررسی شخصیت مجرم یعنی[ انسانی که تحت شرای...
15 صفحه اول($k$,$\epsilon$)-Anonymity: $k$-Anonymity with $\epsilon$-Differential Privacy
The explosion in volume and variety of data offers enormous potential for research and commercial use. Increased availability of personal data is of particular interest in enabling highly customised services tuned to individual needs. Preserving the privacy of individuals against reidentification attacks in this fast-moving ecosystem poses significant challenges for a one-size fits all approach...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Knowledge and Data Engineering
سال: 2010
ISSN: 1041-4347
DOI: 10.1109/tkde.2009.120