Sciweavers

186 search results - page 38 / 38
» Managing privacy preferences for federated identity manageme...
Sort
View
CIKM
2009
Springer
14 years 10 days ago
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...