The NP-completeness column: An ongoing guide
Journal of Algorithms
A faster strongly polynomial minimum cost flow algorithm
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Communications of the ACM
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Parameterized Complexity Theory (Texts in Theoretical Computer Science. An EATCS Series)
Parameterized Complexity Theory (Texts in Theoretical Computer Science. An EATCS Series)
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Achieving anonymity via clustering
ACM Transactions on Algorithms (TALG)
A firm foundation for private data analysis
Communications of the ACM
Resolving the complexity of some data privacy problems
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II
Deconstructing intractability-A multivariate complexity analysis of interval constrained coloring
Journal of Discrete Algorithms
Parameterized complexity of k-anonymity: hardness and tractability
IWOCA'10 Proceedings of the 21st international conference on Combinatorial algorithms
Anonymizing binary and small tables is hard to approximate
Journal of Combinatorial Optimization
Pattern-guided data anonymization and clustering
MFCS'11 Proceedings of the 36th international conference on Mathematical foundations of computer science
ICDT'05 Proceedings of the 10th international conference on Database Theory
Parameterized Complexity
Pattern-guided data anonymization and clustering
MFCS'11 Proceedings of the 36th international conference on Mathematical foundations of computer science
The l-Diversity problem: Tractability and approximability
Theoretical Computer Science
Hi-index | 0.00 |
The NP-hard k-Anonymity problem asks, given an n×mmatrix M over a fixed alphabet and an integer s 0, whether M can be made k-anonymous by suppressing (blanking out) at most s entries. A matrix M is said to be k-anonymous if for each row r in M there are at least k - 1 other rows in M which are identical to r. Complementing previous work, we introduce two new "data-driven" parameterizations for k-Anonymity--the number tin of different input rows and the number tout of different output rows--both modeling aspects of data homogeneity. We show that k-Anonymity is fixed-parameter tractable for the parameter tin, and it is NP-hard even for tout = 2 and alphabet size four. Notably, our fixed-parameter tractability result implies that k-Anonymity can be solved in linear time when tin is a constant. Our results also extend to some interesting generalizations of k-Anonymity.