Injecting utility into anonymized datasets
- 27 June 2006
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 217-228
- https://doi.org/10.1145/1142473.1142499
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- IncognitoPublished by Association for Computing Machinery (ACM) ,2005
- Toward Privacy in Public DatabasesLecture Notes in Computer Science, 2005
- On the complexity of optimal K-anonymityPublished by Association for Computing Machinery (ACM) ,2004
- The Complexity of Three-Way Statistical TablesSIAM Journal on Computing, 2004
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACYInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- Protecting respondents identities in microdata releaseIEEE Transactions on Knowledge and Data Engineering, 2001
- Optimal Junction TreesPublished by Elsevier BV ,1994
- Approximating discrete probability distributions with decomposable modelsIEEE Transactions on Systems, Man, and Cybernetics, 1991
- Security-control methods for statistical databases: a comparative studyACM Computing Surveys, 1989
- Data-swapping: A technique for disclosure controlJournal of Statistical Planning and Inference, 1982