Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing sequential releases
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Utility-based anonymization using local recoding
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Anatomy: simple and effective privacy preservation
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Probabilistic privacy analysis of published views
Proceedings of the 5th ACM workshop on Privacy in electronic society
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Utility-based anonymization for privacy preservation with less information loss
ACM SIGKDD Explorations Newsletter
Capturing data usefulness and privacy protection in K-anonymisation
Proceedings of the 2007 ACM symposium on Applied computing
K-anonymization incremental maintenance and optimization techniques
Proceedings of the 2007 ACM symposium on Applied computing
Approximate algorithms for K-anonymity
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Hiding the presence of individuals from shared databases
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
M-invariance: towards privacy preserving re-publication of dynamic datasets
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Anonymizing Classification Data for Privacy Preservation
IEEE Transactions on Knowledge and Data Engineering
Data & Knowledge Engineering
K-anonymization as spatial indexing: toward scalable and incremental anonymization
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Fast data anonymization with low information loss
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Privacy skyline: privacy with multidimensional adversarial knowledge
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Location anonymity in continuous location-based services
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
Towards optimal k-anonymization
Data & Knowledge Engineering
Anonymity for continuous data publishing
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Zerber: r-confidential indexing for distributed documents
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
A framework for condensation-based anonymization of string data
Data Mining and Knowledge Discovery
Adaptive data anonymization against information fusion based privacy attacks on enterprise data
Proceedings of the 2008 ACM symposium on Applied computing
Dynamic anonymization: accurate statistical analysis with privacy preservation
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Privacy-MaxEnt: integrating background knowledge in privacy quantification
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Preservation of proximity privacy in publishing numerical sensitive data
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Protecting privacy in recorded conversations
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Data utility and privacy protection trade-off in k-anonymisation
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Providing k-anonymity in data mining
The VLDB Journal — The International Journal on Very Large Data Bases
Workload-aware anonymization techniques for large-scale datasets
ACM Transactions on Database Systems (TODS)
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Composition attacks and auxiliary information in data privacy
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
An Empirical Study of Utility Measures for k-Anonymisation
BNCOD '08 Proceedings of the 25th British national conference on Databases: Sharing Data, Information and Knowledge
Protecting the Publishing Identity in Multiple Tuples
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
BSGI: An Effective Algorithm towards Stronger l-Diversity
DEXA '08 Proceedings of the 19th international conference on Database and Expert Systems Applications
Generalization-Based Privacy-Preserving Data Collection
DaWaK '08 Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery
Spatial generalisation algorithms for LBS privacy preservation
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Privacy-preserving anonymization of set-valued data
Proceedings of the VLDB Endowment
Privacy preserving document indexing infrastructure for a distributed environment
Proceedings of the VLDB Endowment
Yet another privacy metric for publishing micro-data
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Privacy-preserving data publishing for horizontally partitioned databases
Proceedings of the 17th ACM conference on Information and knowledge management
Towards privacy-preserving integration of distributed heterogeneous data
Proceedings of the 2nd PhD workshop on Information and knowledge management
Information Leakage in Optimal Anonymized and Diversified Data
Information Hiding
Towards trajectory anonymization: a generalization-based approach
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Anonymizing moving objects: how to hide a MOB in a crowd?
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
On the comparison of microdata disclosure control algorithms
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Continuous privacy preserving publishing of data streams
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
HIDE: heterogeneous information DE-identification
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Privacy-preserving incremental data dissemination
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Adversarial-knowledge dimensions in data privacy
The VLDB Journal — The International Journal on Very Large Data Bases
Genetic algorithm-based clustering approach for k-anonymization
Expert Systems with Applications: An International Journal
Privacy-preserving data publishing for cluster analysis
Data & Knowledge Engineering
Decomposition: Privacy Preservation for Multiple Sensitive Attributes
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Confidentiality-preserving distributed proofs of conjunctive queries
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Anonymization-based attacks in privacy-preserving data publishing
ACM Transactions on Database Systems (TODS)
A framework for efficient data anonymization under privacy and accuracy constraints
ACM Transactions on Database Systems (TODS)
A brief survey on anonymization techniques for privacy preserving publishing of social network data
ACM SIGKDD Explorations Newsletter
A tree-based approach to preserve the privacy of software engineering data and predictive models
PROMISE '09 Proceedings of the 5th International Conference on Predictor Models in Software Engineering
On the tradeoff between privacy and utility in data publishing
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing location-based RFID data
C3S2E '09 Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering
Attacks on privacy and deFinetti's theorem
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Location Diversity: Enhanced Privacy Protection in Location Based Services
LoCA '09 Proceedings of the 4th International Symposium on Location and Context Awareness
Data and Structural k-Anonymity in Social Networks
Privacy, Security, and Trust in KDD
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Proceedings of the 11th Annual conference on Genetic and evolutionary computation
Clustering-Based Frequency l-Diversity Anonymization
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
A utility-theoretic approach to privacy and personalization
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 2
A novel anonymization algorithm: Privacy protection and knowledge preservation
Expert Systems with Applications: An International Journal
Formal anonymity models for efficient privacy-preserving joins
Data & Knowledge Engineering
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
An integrated framework for de-identifying unstructured medical data
Data & Knowledge Engineering
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Proceedings of the 18th ACM conference on Information and knowledge management
Fast and effective histogram construction
Proceedings of the 18th ACM conference on Information and knowledge management
Movement data anonymity through generalization
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
TIAMAT: a tool for interactive analysis of microdata anonymization techniques
Proceedings of the VLDB Endowment
Data publishing against realistic adversaries
Proceedings of the VLDB Endowment
Anonymization of set-valued data via top-down, local generalization
Proceedings of the VLDB Endowment
Secure construction of k-unlinkable patient records from distributed providers
Artificial Intelligence in Medicine
A reciprocal framework for spatial K-anonymity
Information Systems
COP: privacy-preserving multidimensional partition in DAS paradigm
Proceedings of the 2009 EDBT/ICDT Workshops
Transparent anonymization: Thwarting adversaries who know the algorithm
ACM Transactions on Database Systems (TODS)
Private record matching using differential privacy
Proceedings of the 13th International Conference on Extending Database Technology
The hardness and approximation algorithms for l-diversity
Proceedings of the 13th International Conference on Extending Database Technology
Algorithm-safe privacy-preserving data publishing
Proceedings of the 13th International Conference on Extending Database Technology
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Speeding up clustering-based k-anonymisation algorithms with pre-partitioning
BNCOD'07 Proceedings of the 24th British national conference on Databases
Generating microdata with p-sensitive k-anonymity property
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Efficient k-anonymization using clustering techniques
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Risk & distortion based K-anonymity
WISA'07 Proceedings of the 8th international conference on Information security applications
Privacy protection on multiple sensitive attributes
ICICS'07 Proceedings of the 9th international conference on Information and communications security
A secure multi-dimensional partition based index in DAS
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Allowing privacy protection algorithms to jump out of local optimums: an ordered greed framework
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Privacy-preserving data mining: A feature set partitioning approach
Information Sciences: an International Journal
Privacy-aware location data publishing
ACM Transactions on Database Systems (TODS)
Non-homogeneous generalization in privacy preserving data publishing
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
P-Sensitive K-Anonymity with Generalization Constraints
Transactions on Data Privacy
Movement Data Anonymity through Generalization
Transactions on Data Privacy
Efficient Anonymizations with Enhanced Utility
Transactions on Data Privacy
Enabling search services on outsourced private spatial data
The VLDB Journal — The International Journal on Very Large Data Bases
Versatile publishing for privacy preservation
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Comparison of microaggregation approaches on anonymized data quality
Expert Systems with Applications: An International Journal
Anonymization of moving objects databases by clustering and perturbation
Information Systems
Approximate algorithms with generalizing attribute values for k-anonymity
Information Systems
An online framework for publishing privacy-sensitive location traces
Proceedings of the Ninth ACM International Workshop on Data Engineering for Wireless and Mobile Access
Centralized and Distributed Anonymization for High-Dimensional Healthcare Data
ACM Transactions on Knowledge Discovery from Data (TKDD)
Systematic clustering method for l-diversity model
ADC '10 Proceedings of the Twenty-First Australasian Conference on Database Technologies - Volume 104
Privacy-aware access control with generalization boundaries
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
Anonymizing data with quasi-sensitive attribute values
CIKM '10 Proceedings of the 19th ACM international conference on Information and knowledge management
On the identification of property based generalizations in microdata anonymization
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
A privacy protection technique for publishing data mining models and research data
ACM Transactions on Management Information Systems (TMIS)
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming
Theory of privacy and anonymity
Algorithms and theory of computation handbook
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Proceedings of the 1st ACM International Health Informatics Symposium
On-the-fly hierarchies for numerical attributes in data anonymization
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
A family of enhanced (L,α)-diversity models for privacy preserving data publishing
Future Generation Computer Systems
The Role of Ontologies in the Anonymization of Textual Variables
Proceedings of the 2010 conference on Artificial Intelligence Research and Development: Proceedings of the 13th International Conference of the Catalan Association for Artificial Intelligence
Extending l-diversity to generalize sensitive data
Data & Knowledge Engineering
Minimizing minimality and maximizing utility: analyzing method-based attacks on anonymized data
Proceedings of the VLDB Endowment
Fragments and loose associations: respecting privacy in data publishing
Proceedings of the VLDB Endowment
A privacy policy conflict detection method for multi-owner privacy data protection
Electronic Commerce Research
Preventing range disclosure in k-anonymised data
Expert Systems with Applications: An International Journal
Ontology-based anonymization of categorical values
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
ACM Transactions on Database Systems (TODS)
ACM Transactions on Database Systems (TODS)
Extended k-anonymity models against sensitive attribute disclosure
Computer Communications
Local and global recoding methods for anonymizing set-valued data
The VLDB Journal — The International Journal on Very Large Data Bases
SABRE: a Sensitive Attribute Bucketization and REdistribution framework for t-closeness
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving publishing microdata with full functional dependencies
Data & Knowledge Engineering
A utility-theoretic approach to privacy in online services
Journal of Artificial Intelligence Research
Privacy-preserving data sharing in cloud computing
Journal of Computer Science and Technology
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
A user-oriented anonymization mechanism for public data
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
FAANST: fast anonymizing algorithm for numerical streaming data
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
PCTA: privacy-constrained clustering-based transaction data anonymization
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
An efficient clustering algorithm for k-anonymisation
Journal of Computer Science and Technology
Differentially private data release for data mining
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Protecting privacy in data release
Foundations of security analysis and design VI
Trajectory privacy in location-based services and data publication
ACM SIGKDD Explorations Newsletter
On the declassification of confidential documents
MDAI'11 Proceedings of the 8th international conference on Modeling decisions for artificial intelligence
Publishing anonymous survey rating data
Data Mining and Knowledge Discovery
On-the-fly generalization hierarchies for numerical attributes revisited
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Challenges in secure sensor-cloud computing
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Protecting privacy of sensitive value distributions in data release
STM'10 Proceedings of the 6th international conference on Security and trust management
Cloning for privacy protection in multiple independent data publications
Proceedings of the 20th ACM international conference on Information and knowledge management
Privacy-aware querying over sensitive trajectory data
Proceedings of the 20th ACM international conference on Information and knowledge management
Utility-driven anonymization in data publishing
Proceedings of the 20th ACM international conference on Information and knowledge management
k-Anonymous Decision Tree Induction
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
Data anonymization using an improved utility measurement
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
k-ARQ: k-anonymous ranking queries
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part I
A semantic information loss metric for privacy preserving publication
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
Privacy streamliner: a two-stage approach to improving algorithm efficiency
Proceedings of the second ACM conference on Data and Application Security and Privacy
An information theoretic privacy and utility measure for data sanitization mechanisms
Proceedings of the second ACM conference on Data and Application Security and Privacy
Secure anonymization for incremental datasets
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Hiding emerging patterns with local recoding generalization
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Anonymizing transaction data by integrating suppression and generalization
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Satisfying privacy requirements: one step before anonymization
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Utility-preserving transaction data anonymization with low information loss
Expert Systems with Applications: An International Journal
Secure distributed computation of anonymized views of shared databases
ACM Transactions on Database Systems (TODS)
A practical approximation algorithm for optimal k-anonymity
Data Mining and Knowledge Discovery
k-Concealment: An Alternative Model of k-Type Anonymity
Transactions on Data Privacy
Utility-guided Clustering-based Transaction Data Anonymization
Transactions on Data Privacy
A rigorous and customizable framework for privacy
PODS '12 Proceedings of the 31st symposium on Principles of Database Systems
MaskIt: privately releasing user context streams for personalized mobile applications
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Differentially private search log sanitization with optimal output utility
Proceedings of the 15th International Conference on Extending Database Technology
Data privacy against composition attack
DASFAA'12 Proceedings of the 17th international conference on Database Systems for Advanced Applications - Volume Part I
Information based data anonymization for classification utility
Data & Knowledge Engineering
Secure multidimensional range queries over outsourced data
The VLDB Journal — The International Journal on Very Large Data Bases
n-confusion: a generalization of k-anonymity
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Privacy preservation by disassociation
Proceedings of the VLDB Endowment
PAKDD'12 Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Detecting dependencies in an anonymized dataset
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Publishing microdata with a robust privacy guarantee
Proceedings of the VLDB Endowment
Privacy consensus in anonymization systems via game theory
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Distributed data federation without disclosure of user existence
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Secure distributed framework for achieving ε-differential privacy
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Improvements on a privacy-protection algorithm for DNA sequences with generalization lattices
Computer Methods and Programs in Biomedicine
An automated data utility clustering methodology using data constraint rules
Proceedings of the 2012 international workshop on Smart health and wellbeing
Clustering-based k-anonymisation algorithms
DEXA'07 Proceedings of the 18th international conference on Database and Expert Systems Applications
Generically extending anonymization algorithms to deal with successive queries
Proceedings of the 21st ACM international conference on Information and knowledge management
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Clustering-based categorical data protection
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining
Transactions on Data Privacy
An Enhanced Utility-Driven Data Anonymization Method
Transactions on Data Privacy
Efficient discovery of de-identification policy options through a risk-utility frontier
Proceedings of the third ACM conference on Data and application security and privacy
Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification
International Journal of Information Security and Privacy
Privacy-preserving trajectory data publishing by local suppression
Information Sciences: an International Journal
Studying genotype-phenotype attack on k-anonymised medical and genomic data
AusDM '09 Proceedings of the Eighth Australasian Data Mining Conference - Volume 101
Journal of Computer and System Sciences
Fast clustering-based anonymization approaches with time constraints for data streams
Knowledge-Based Systems
Discovering influential authors in heterogeneous academic networks by a co-ranking method
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Pufferfish: A framework for mathematical privacy definitions
ACM Transactions on Database Systems (TODS)
The hardness of (ε, m)-anonymity
WAIM'13 Proceedings of the 14th international conference on Web-Age Information Management
Efficient Time-Stamped Event Sequence Anonymization
ACM Transactions on the Web (TWEB)
Improving accuracy of classification models induced from anonymized datasets
Information Sciences: an International Journal
A general framework for privacy preserving data publishing
Knowledge-Based Systems
Modeling and preventing inferences from sensitive value distributions in data release
Journal of Computer Security - STM'10
Journal of Computer Security
Hi-index | 0.01 |
K-Anonymity has been proposed as a mechanism for protecting privacy in microdata publishing, and numerous recoding "models" have been considered for achieving anonymity. This paper proposes a new multidimensional model, which provides an additional degree of flexibility not seen in previous (single-dimensional) approaches. Often this flexibility leads to higher-quality anonymizations, as measured both by general-purpose metrics and more specific notions of query answerability. Optimal multidimensional anonymization is NP-hard (like previous optimal anonymity problems). However, we introduce a simple greedy approximation algorithm, and experimental results show that this greedy algorithm frequently leads to more desirable anonymizations than exhaustive optimal algorithms for two single-dimensional models.