Sciweavers

1128 search results - page 1 / 226
» Structuring anonymity metrics
Sort
View
AICT
2006
IEEE
13 years 12 months ago
Recipient Anonymity in a Structured Overlay
An open problem in structured overlay networks is related to the anonymity to be provided to recipients, namely, those nodes who respond to request messages. Such a feature is of ...
Giuseppe Ciaccio
DIM
2006
ACM
13 years 11 months ago
Structuring anonymity metrics
Sebastian Clauß, Stefan Schiffner
DAWAK
2006
Springer
13 years 9 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
13 years 3 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...
ICDE
2010
IEEE
184views Database» more  ICDE 2010»
13 years 10 months ago
On optimal anonymization for l+-diversity
-- Publishing person specific data while protecting privacy is an important problem. Existing algorithms that enforce the privacy principle called l-diversity are heuristic based d...
Junqiang Liu, Ke Wang