Sciweavers

901 search results - page 27 / 181
» On Anonymization of String Data
Sort
View
MASS
2010
181views Communications» more  MASS 2010»
14 years 7 months ago
Perfectly anonymous data aggregation in wireless sensor networks
Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some securi...
Levente Buttyán, Tamás Holczer
JAMIA
2011
140views more  JAMIA 2011»
14 years 12 days ago
Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule
Objective Healthcare organizations must de-identify patient records before sharing data. Many organizations rely on the Safe Harbor Standard of the HIPAAPrivacy Rule, which enumer...
Bradley Malin, Kathleen Benitez, Daniel R. Masys
59
Voted
COCOA
2008
Springer
14 years 11 months ago
Fixed-Parameter Tractability of Anonymizing Data by Suppressing Entries
A popular model for protecting privacy when person-specific data is released is k-anonymity. A dataset is k-anonymous if each record is identical to at least (k - 1) other records ...
Rhonda Chaytor, Patricia A. Evans, Todd Wareham
ICDE
2007
IEEE
103views Database» more  ICDE 2007»
15 years 3 months ago
A k-Anonymity Model for Spatio-Temporal Data
Polixeni Zacharouli, Aris Gkoulalas-Divanis, Vassi...