-
2
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney. K-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems, 10(5):571C588, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems
, vol.10
, Issue.5 C588
, pp. 571
-
-
Sweeney, L.1
-
3
-
-
3142691086
-
On the complexity of optimal k-anonymity
-
New York, NY, USA, ACM Press
-
A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In Proceedings of the twenty-third ACMSIGMOD-SIGACT-SIGART symposium on Principles of database systems (PODS04), pages 223C228, New York, NY, USA, 2004. ACM Press.
-
(2004)
Proceedings of the twenty-third ACMSIGMOD-SIGACT-SIGART symposium on Principles of database systems (PODS04)
, Issue.C228
, pp. 223
-
-
Meyerson, A.1
Williams, R.2
-
4
-
-
0344024833
-
Guaranteeing anonymity when sharing medical data, the Datafly system
-
Washington, DC: Hanley and Belfus, Inc
-
L. Sweeney. Guaranteeing anonymity when sharing medical data, the Datafly system. Proceedings, Journal of the American Medical Informatics Association. Washington, DC: Hanley and Belfus, Inc., 1997. 6
-
(1997)
Proceedings, Journal of the American Medical Informatics Association
, pp. 6
-
-
Sweeney, L.1
-
6
-
-
28444449426
-
Data Privacy through Optimal k-Anonymization
-
R. J. Bayardo and R. Agrawal. Data Privacy through Optimal k-Anonymization. In Proc. of ICDE, pp 217C228, 2005.
-
(2005)
Proc. of ICDE
, Issue.C228
, pp. 217
-
-
Bayardo, R.J.1
Agrawal, R.2
-
7
-
-
0242625276
-
Transforming Data to Satisfy Privacy Constraints
-
V. S. Iyengar. Transforming Data to Satisfy Privacy Constraints. In Proc. of SIGKDD, pp 279C288, 2002.
-
(2002)
Proc. of SIGKDD
, Issue.C288
, pp. 279
-
-
Iyengar, V.S.1
-
8
-
-
33749582207
-
Utility-Based Anonymization Using Local Recoding
-
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. Fu. Utility-Based Anonymization Using Local Recoding. In Proc. of SIGKDD, pp 785C790, 2006.
-
(2006)
Proc. of SIGKDD
, Issue.C790
, pp. 785
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.6
-
9
-
-
29844444250
-
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Incognito: Efficient fulldomain k-anonymity. In SIGMOD, 2005.
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Incognito: Efficient fulldomain k-anonymity. In SIGMOD, 2005.
-
-
-
-
10
-
-
51049120125
-
-
J. W. Byun, A. Kamra, E Bertino, N. Li(2006), k-Anonymity using Clustering Technique, CERIAS Tech Report 2006-10.
-
J. W. Byun, A. Kamra, E Bertino, N. Li(2006), "k-Anonymity using Clustering Technique", CERIAS Tech Report 2006-10.
-
-
-
-
11
-
-
51049097086
-
De-identification Guidelines for personal Health information
-
Ottawa
-
EI Emam K, Jonker E, Sams S, Neri E, Neisa A, Gao T, Chowdhury S. De-identification Guidelines for personal Health information. Report produced for the Office of the Privacy Commissioner of Canada, Ottawa 2007.
-
(2007)
Report produced for the Office of the Privacy Commissioner of Canada
-
-
EI Emam, K.1
Jonker, E.2
Sams, S.3
Neri, E.4
Neisa, A.5
Gao, T.6
Chowdhury, S.7
-
12
-
-
51049102632
-
-
EI Emam K, Neisa A, Zakrzewski D, Gao T. Reidentification risk assessment for the k-anonymity privacy model, BMC Medical informatics and Decision Making, 2007.
-
(2007)
Reidentification risk assessment for the k-anonymity privacy model, BMC Medical informatics and Decision Making
-
-
EI Emam, K.1
Neisa, A.2
Zakrzewski, D.3
Gao, T.4
|