k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
A survey on tree edit distance and related problems
Theoretical Computer Science
Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation
Data Mining and Knowledge Discovery
On anonymizing query logs via token-based hashing
Proceedings of the 16th international conference on World Wide Web
A Normalized Levenshtein Distance Metric
IEEE Transactions on Pattern Analysis and Machine Intelligence
A survey of query log privacy-enhancing techniques from a policy perspective
ACM Transactions on the Web (TWEB)
Constrained Microaggregation: Adding Constraints for Data Editing
Transactions on Data Privacy
Website privacy preservation for query log publishing
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Semantic microaggregation for the anonymization of query logs
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
Towards knowledge intensive data privacy
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
User k-anonymity for privacy preserving data mining of query logs
Information Processing and Management: an International Journal
Hi-index | 0.00 |
When considering the publishing of web search query logs, there is an important trade-off between the privacy and the usefulness of the data. This paper introduces a novel approach to anonymize search query logs by means of microaggregation. It guaranties k-anonymity on the data without having to completely eliminate any record.