Sciweavers

4908 search results - page 1 / 982
» On the Complexity of Optimal K-Anonymity
Sort
View
ICDE
2008
IEEE
178views Database» more  ICDE 2008»
14 years 6 months ago
On the Optimal Selection of k in the k-Anonymity Problem
When disseminating data involving human subjects, researchers have to weigh in the requirements of privacy of the individuals involved in the data. A model widely used for enhancin...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
ICDM
2006
IEEE
127views Data Mining» more  ICDM 2006»
13 years 11 months ago
Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching
In recent years, a major thread of research on kanonymity has focused on developing more flexible generalization schemes that produce higher-quality datasets. In this paper we in...
Tiancheng Li, Ninghui Li
ICDE
2005
IEEE
170views Database» more  ICDE 2005»
14 years 6 months ago
Data Privacy through Optimal k-Anonymization
Roberto J. Bayardo Jr., Rakesh Agrawal
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 6 months ago
On Multidimensional k-Anonymity with Local Recoding Generalization
This paper presents the first theoretical study, on using local-recoding generalization (LRG) to compute a kanonymous table with quality guarantee. First, we prove that it is NP-h...
Yang Du, Tian Xia, Yufei Tao, Donghui Zhang, Feng ...
VLDB
2005
ACM
114views Database» more  VLDB 2005»
13 years 10 months ago
Checking for k-Anonymity Violation by Views
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia