Capturing data usefulness and privacy protection in K-anonymisation
Proceedings of the 2007 ACM symposium on Applied computing
K-anonymization incremental maintenance and optimization techniques
Proceedings of the 2007 ACM symposium on Applied computing
Protecting privacy in recorded conversations
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Data utility and privacy protection trade-off in k-anonymisation
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
An Anonymity Model Achievable Via Microaggregation
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
A measure of variance for hierarchical nominal attributes
Information Sciences: an International Journal
On the comparison of microdata disclosure control algorithms
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Towards the evaluation of time series protection methods
Information Sciences: an International Journal
Data and Structural k-Anonymity in Social Networks
Privacy, Security, and Trust in KDD
Privacy aware data sharing: balancing the usability and privacy of datasets
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
An integrated framework for de-identifying unstructured medical data
Data & Knowledge Engineering
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Proceedings of the 2010 EDBT/ICDT Workshops
User-controlled generalization boundaries for p-sensitive k-anonymity
Proceedings of the 2010 ACM Symposium on Applied Computing
Generating microdata with p-sensitive k-anonymity property
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
A three-dimensional conceptual framework for database privacy
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
WAOA'07 Proceedings of the 5th international conference on Approximation and online algorithms
Allowing privacy protection algorithms to jump out of local optimums: an ordered greed framework
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Preserving privacy in participatory sensing systems
Computer Communications
P-Sensitive K-Anonymity with Generalization Constraints
Transactions on Data Privacy
Systematic clustering method for l-diversity model
ADC '10 Proceedings of the Twenty-First Australasian Conference on Database Technologies - Volume 104
On the identification of property based generalizations in microdata anonymization
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Theory of privacy and anonymity
Algorithms and theory of computation handbook
On-the-fly hierarchies for numerical attributes in data anonymization
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
A family of enhanced (L,α)-diversity models for privacy preserving data publishing
Future Generation Computer Systems
Using classification methods to evaluate attribute disclosure risk
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
Theoretical Computer Science
Extended k-anonymity models against sensitive attribute disclosure
Computer Communications
A user-oriented anonymization mechanism for public data
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Privacy beyond single sensitive attribute
DEXA'11 Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I
On-the-fly generalization hierarchies for numerical attributes revisited
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Kd-trees and the real disclosure risks of large statistical databases
Information Fusion
Microaggregation- and permutation-based anonymization of movement data
Information Sciences: an International Journal
Improvements on a privacy-protection algorithm for DNA sequences with generalization lattices
Computer Methods and Programs in Biomedicine
An automated data utility clustering methodology using data constraint rules
Proceedings of the 2012 international workshop on Smart health and wellbeing
A modification of the Lloyd algorithm for k-anonymous quantization
Information Sciences: an International Journal
AIM: a new privacy preservation algorithm for incomplete microdata based on anatomy
ICPCA/SWS'12 Proceedings of the 2012 international conference on Pervasive Computing and the Networked World
Privacy and security in IPv6 networks: challenges and possible solutions
Proceedings of the 6th International Conference on Security of Information and Networks
The effect of homogeneity on the computational complexity of combinatorial data anonymization
Data Mining and Knowledge Discovery
Measuring the privacy of user profiles in personalized information systems
Future Generation Computer Systems
Journal of Computer Security
Hi-index | 0.00 |
In this paper, we introduce a new privacy protection property called p-sensitive k-anonymity. The existing kanonymity property protects against identity disclosure, but it fails to protect against attribute disclosure. The new introduced privacy model avoids this shortcoming. Two necessary conditions to achieve p-sensitive kanonymity property are presented, and used in developing algorithms to create masked microdata with p-sensitive k-anonymity property using generalization and suppression.