Privacy-enhancing k -anonymization of customer data
- 13 June 2005
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 139-147
- https://doi.org/10.1145/1065167.1065185
Abstract
No abstract availableThis publication has 23 references indexed in Scilit:
- On the complexity of optimal K-anonymityPublished by Association for Computing Machinery (ACM) ,2004
- A Condensation Approach to Privacy Preserving Data MiningLecture Notes in Computer Science, 2004
- ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSIONInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACYInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- Protecting respondents identities in microdata releaseIEEE Transactions on Knowledge and Data Engineering, 2001
- Security-control methods for statistical databases: a comparative studyACM Computing Surveys, 1989
- The statistical security of a statistical databaseACM Transactions on Database Systems, 1984
- Practical data-swapping: the first stepsACM Transactions on Database Systems, 1984
- A security machanism for statistical databaseACM Transactions on Database Systems, 1980
- How to share a secretCommunications of the ACM, 1979