Incognito
Top Cited Papers
- 14 June 2005
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableThis publication has 11 references indexed in Scilit:
- Top-Down Specialization for Information and Privacy PreservationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Data Privacy through Optimal k-AnonymizationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- On the complexity of optimal K-anonymityPublished by Association for Computing Machinery (ACM) ,2004
- Anonymizing TablesLecture Notes in Computer Science, 2004
- ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSIONInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACYInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- Transforming data to satisfy privacy constraintsPublished by Association for Computing Machinery (ACM) ,2002
- Protecting respondents identities in microdata releaseIEEE Transactions on Knowledge and Data Engineering, 2001
- An overview of data warehousing and OLAP technologyACM SIGMOD Record, 1997
- Implementing data cubes efficientlyPublished by Association for Computing Machinery (ACM) ,1996