Sciweavers

68 search results - page 1 / 14
» Data utility and privacy protection trade-off in k-anonymisa...
Sort
View
DASFAA
2009
IEEE
129views Database» more  DASFAA 2009»
13 years 11 months ago
Towards Preference-Constrained k-Anonymisation
Abstract. In this paper, we propose a novel preference-constrained approach to k-anonymisation. In contrast to the existing works on kanonymisation which attempt to satisfy a minim...
Grigorios Loukides, Achilles Tziatzios, Jianhua Sh...
BNCOD
2008
88views Database» more  BNCOD 2008»
13 years 6 months ago
An Empirical Study of Utility Measures for k-Anonymisation
Abstract. k-Anonymisation is a technique for masking microdata in order to prevent individual identification. Besides preserving privacy, data anonymised by such a method must also...
Grigorios Loukides, Jianhua Shao
COMSNETS
2012
183views more  COMSNETS 2012»
12 years 19 days ago
Effects of network trace sampling methods on privacy and utility metrics
—Researchers choosing to share wireless-network traces with colleagues must first anonymize sensitive information, trading off the removal of information in the interest of iden...
Phil Fazio, Keren Tan, David Kotz
EDBT
2008
ACM
154views Database» more  EDBT 2008»
14 years 5 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
PVLDB
2010
95views more  PVLDB 2010»
13 years 3 months ago
Small Domain Randomization: Same Privacy, More Utility
Random perturbation is a promising technique for privacy preserving data mining. It retains an original sensitive value with a certain probability and replaces it with a random va...
Rhonda Chaytor, Ke Wang