-
1
-
-
0003483188
-
Protecting Privacy when Disclosing Information: K-anonymity and its Enforcement through Generalization and Suppression
-
P. Samarati, L. Sweeney, Protecting Privacy when Disclosing Information: k-anonymity and its Enforcement through Generalization and Suppression, Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory, 1998.
-
(1998)
Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory
-
-
Samarati, P.1
Sweeney, L.2
-
2
-
-
52649110568
-
Never walk alone: Uncertainty for anonymity in moving objects databases
-
ICDE 2008, Cancun, Mexico, 7-12 April 2008, IEEE
-
O. Abul, F. Bonchi, M. Nanni, Never walk alone: uncertainty for anonymity in moving objects databases, in: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, Cancun, Mexico, 7-12 April 2008, IEEE, 2008, pp. 376-385.
-
(2008)
Proceedings of the 24th International Conference on Data Engineering
, pp. 376-385
-
-
Abul, O.1
Bonchi, F.2
Nanni, M.3
-
3
-
-
77955557409
-
Anonymization of moving objects databases by clustering and perturbation
-
O. Abul, F. Bonchi, and M. Nanni Anonymization of moving objects databases by clustering and perturbation Information Systems 35 8 2010 884 910
-
(2010)
Information Systems
, vol.35
, Issue.8
, pp. 884-910
-
-
Abul, O.1
Bonchi, F.2
Nanni, M.3
-
4
-
-
7544226852
-
Managing uncertainty in moving objects databases
-
doi:http://doi.acm./10.1145/1016028.1016030. URL 〈 〉
-
G. Trajcevski, O. Wolfson, K. Hinrichs, and S. Chamberlain Managing uncertainty in moving objects databases ACM Transactions on Database Systems 29 2004 463 507 doi:http://doi.acm./10.1145/1016028.1016030. URL 〈 http://doi.acm.org/10. 1145/1016028.1016030 〉
-
(2004)
ACM Transactions on Database Systems
, vol.29
, pp. 463-507
-
-
Trajcevski, G.1
Wolfson, O.2
Hinrichs, K.3
Chamberlain, S.4
-
5
-
-
33646153058
-
Protecting privacy against location-based personal identification
-
LNCS 3674, Springer
-
C. Bettini, X.S. Wang, S. Jajodia, Protecting privacy against location-based personal identification, in: Secure Data Management, LNCS 3674, Springer, 2005, pp. 185-199.
-
(2005)
Secure Data Management
, pp. 185-199
-
-
Bettini, C.1
Wang, X.S.2
Jajodia, S.3
-
6
-
-
84861810751
-
Microaggregation- and permutation-based anonymization of movement data
-
J. Domingo-Ferrer, and R. Trujillo-Rasua Microaggregation- and permutation-based anonymization of movement data Information Sciences 208 2012 55 80
-
(2012)
Information Sciences
, vol.208
, pp. 55-80
-
-
Domingo-Ferrer, J.1
Trujillo-Rasua, R.2
-
7
-
-
78650868674
-
Movement data anonymity through generalization
-
A. Monreale, G. Andrienko, N. Andrienko, F. Giannotti, D. Pedreschi, S. Rinzivillo, and S. Wrobel Movement data anonymity through generalization Transactions on Data Privacy 3 2 2010 91 121
-
(2010)
Transactions on Data Privacy
, vol.3
, Issue.2
, pp. 91-121
-
-
Monreale, A.1
Andrienko, G.2
Andrienko, N.3
Giannotti, F.4
Pedreschi, D.5
Rinzivillo, S.6
Wrobel, S.7
-
8
-
-
73949100139
-
Towards trajectory anonymization a generalization-based approach
-
M.E. Nergiz, M. Atzori, Y. Saygin, and B. Guc Towards trajectory anonymization a generalization-based approach Transactions on Data Privacy 2 1 2009 47 75
-
(2009)
Transactions on Data Privacy
, vol.2
, Issue.1
, pp. 47-75
-
-
Nergiz, M.E.1
Atzori, M.2
Saygin, Y.3
Guc, B.4
|