Artificial Intelligence
Combination of compatible belief functions and relation of specificity
Advances in the Dempster-Shafer theory of evidence
Fuzzy sets and fuzzy logic: theory and applications
Fuzzy sets and fuzzy logic: theory and applications
Distances between fuzzy sets representing grey level images
Fuzzy Sets and Systems
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Incognito: efficient full-domain K-anonymity
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation
Data Mining and Knowledge Discovery
Mondrian Multidimensional K-Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
A measure of variance for hierarchical nominal attributes
Information Sciences: an International Journal
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Privacy preserving release of blogosphere data in the presence of search engines
Information Processing and Management: an International Journal
Hi-index | 0.00 |
We provide a formal framework for re-identification in general. We define n-confusion as a concept for modelling the anonymity of a database table and we prove that n-confusion is a generalization of k-anonymity. Finally we present an example to illustrate how this result can be used to augment local variance in k-anonymous protected data.