Efficient multivariate data-oriented microaggregation
The VLDB Journal — The International Journal on Very Large Data Bases
An epistemic framework for privacy protection in database linking
Data & Knowledge Engineering
Capturing data usefulness and privacy protection in K-anonymisation
Proceedings of the 2007 ACM symposium on Applied computing
TFRP: An efficient microaggregation algorithm for statistical disclosure control
Journal of Systems and Software
k-Unlinkability: A privacy protection model for distributed data
Data & Knowledge Engineering
A polynomial-time approximation to optimal multivariate microaggregation
Computers & Mathematics with Applications
Towards optimal k-anonymization
Data & Knowledge Engineering
Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
A k-Anonymity Clustering Method for Effective Data Privacy Preservation
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
An Anonymity Model Achievable Via Microaggregation
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets
MDAI '08 Sabadell Proceedings of the 5th International Conference on Modeling Decisions for Artificial Intelligence
Towards trajectory anonymization: a generalization-based approach
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Importance partitioning in micro-aggregation
Computational Statistics & Data Analysis
Towards the evaluation of time series protection methods
Information Sciences: an International Journal
Towards Trajectory Anonymization: a Generalization-Based Approach
Transactions on Data Privacy
Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing
Transactions on Data Privacy
Constrained Microaggregation: Adding Constraints for Data Editing
Transactions on Data Privacy
Tree-Based Microaggregation for the Anonymization of Search Logs
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
A new framework to automate constrained microaggregation
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Density-based microaggregation for statistical disclosure control
Expert Systems with Applications: An International Journal
Micro-SOM: A Linear-Time Multivariate Microaggregation Algorithm Based on Self-Organizing Maps
ICANN '09 Proceedings of the 19th International Conference on Artificial Neural Networks: Part I
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Granulation as a privacy protection mechanism
Transactions on rough sets VII
A three-dimensional conceptual framework for database privacy
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Preserving privacy in participatory sensing systems
Computer Communications
Hybrid microdata using microaggregation
Information Sciences: an International Journal
Movement Data Anonymity through Generalization
Transactions on Data Privacy
Suppressing microdata to prevent classification based inference
The VLDB Journal — The International Journal on Very Large Data Bases
Comparison of microaggregation approaches on anonymized data quality
Expert Systems with Applications: An International Journal
Anonymization of moving objects databases by clustering and perturbation
Information Systems
Microdata protection through approximate microaggregation
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
Privacy-preserving publication of trajectories using microaggregation
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Semantic microaggregation for the anonymization of query logs
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
A family of enhanced (L,α)-diversity models for privacy preserving data publishing
Future Generation Computer Systems
Software—Practice & Experience - Focus on Selected PhD Literature Reviews in the Practical Aspects of Software Technology
Preventing range disclosure in k-anonymised data
Expert Systems with Applications: An International Journal
Towards semantic microaggregation of categorical data for confidential documents
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
ACM Transactions on Database Systems (TODS)
PCTA: privacy-constrained clustering-based transaction data anonymization
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
Edit constraints on microaggregation and additive noise
PSDML'10 Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning
On the declassification of confidential documents
MDAI'11 Proceedings of the 8th international conference on Modeling decisions for artificial intelligence
Privacy beyond single sensitive attribute
DEXA'11 Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I
Challenges in secure sensor-cloud computing
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
An approximate microaggregation approach for microdata protection
Expert Systems with Applications: An International Journal
Achieving k-anonymity by clustering in attribute hierarchical structures
DaWaK'06 Proceedings of the 8th international conference on Data Warehousing and Knowledge Discovery
Extending microaggregation procedures for time series protection
RSCTC'06 Proceedings of the 5th international conference on Rough Sets and Current Trends in Computing
Microaggregation for database and location privacy
NGITS'06 Proceedings of the 6th international conference on Next Generation Information Technologies and Systems
A fixed structure learning automaton micro-aggregation technique for secure statistical databases
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Optimal multivariate 2-microaggregation for microdata protection: a 2-approximation
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Using mahalanobis distance-based record linkage for disclosure risk assessment
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
User k-anonymity for privacy preserving data mining of query logs
Information Processing and Management: an International Journal
Utility-guided Clustering-based Transaction Data Anonymization
Transactions on Data Privacy
Information fusion in data privacy: A survey
Information Fusion
Microaggregation- and permutation-based anonymization of movement data
Information Sciences: an International Journal
n-confusion: a generalization of k-anonymity
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Semantically-grounded construction of centroids for datasets with textual attributes
Knowledge-Based Systems
Clustering-based k-anonymisation algorithms
DEXA'07 Proceedings of the 18th international conference on Database and Expert Systems Applications
A modification of the Lloyd algorithm for k-anonymous quantization
Information Sciences: an International Journal
A modification of the k-means method for quasi-unsupervised learning
Knowledge-Based Systems
Anonymization methods for taxonomic microdata
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Hybrid microdata via model-based clustering
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Heuristic supervised approach for record linkage
MDAI'12 Proceedings of the 9th international conference on Modeling Decisions for Artificial Intelligence
Marginality: a numerical mapping for enhanced exploitation of taxonomic attributes
MDAI'12 Proceedings of the 9th international conference on Modeling Decisions for Artificial Intelligence
Radiator: context propagation based on delayed aggregation
Proceedings of the 2013 conference on Computer supported cooperative work
Priority driven k-anonymisation for privacy protection
AusDM '08 Proceedings of the 7th Australasian Data Mining Conference - Volume 87
Class-Restricted Clustering and Microperturbation for Data Privacy
Management Science
On the use of decentralization to enable privacy in web-scale recommendation services
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
MAGE: A semantics retaining K-anonymization method for mixed data
Knowledge-Based Systems
Multivariate microaggregation by iterative optimization
Applied Intelligence
Hi-index | 0.01 |
k-Anonymity is a useful concept to solve the tension between data utility and respondent privacy in individual data (microdata) protection. However, the generalization and suppression approach proposed in the literature to achieve k-anonymity is not equally suited for all types of attributes: (i) generalization/suppression is one of the few possibilities for nominal categorical attributes; (ii) it is just one possibility for ordinal categorical attributes which does not always preserve ordinality; (iii) and it is completely unsuitable for continuous attributes, as it causes them to lose their numerical meaning. Since attributes leading to disclosure (and thus needing k-anonymization) may be nominal, ordinal and also continuous, it is important to devise k-anonymization procedures which preserve the semantics of each attribute type as much as possible. We propose in this paper to use categorical microaggregation as an alternative to generalization/suppression for nominal and ordinal k-anonymization; we also propose continuous microaggregation as the method for continuous k-anonymization.