Minimizing minimality and maximizing utility
- 1 September 2010
- journal article
- Published by Association for Computing Machinery (ACM) in Proceedings of the VLDB Endowment
- Vol. 3 (1-2), 1045-1056
- https://doi.org/10.14778/1920841.1920972
Abstract
No abstract availableThis publication has 15 references indexed in Scilit:
- Transparent anonymizationACM Transactions on Database Systems, 2010
- Anonymization-based attacks in privacy-preserving data publishingACM Transactions on Database Systems, 2009
- Injector: Mining Background Knowledge for Data AnonymizationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Information disclosure under realistic assumptionsPublished by Association for Computing Machinery (ACM) ,2007
- Utility-based anonymization using local recodingPublished by Association for Computing Machinery (ACM) ,2006
- (α, k)-anonymityPublished by Association for Computing Machinery (ACM) ,2006
- L-diversity: privacy beyond k-anonymityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- IncognitoPublished by Association for Computing Machinery (ACM) ,2005
- Anonymizing TablesLecture Notes in Computer Science, 2004
- Protecting respondents identities in microdata releaseIEEE Transactions on Knowledge and Data Engineering, 2001