Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
IEEE Transactions on Knowledge and Data Engineering
Bottom-Up Generalization: A Data Mining Solution to Privacy Protection
ICDM '04 Proceedings of the Fourth IEEE International Conference on Data Mining
Top-Down Specialization for Information and Privacy Preservation
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Incognito: efficient full-domain K-anonymity
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Template-Based Privacy Preservation in Classification Problems
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
ICDT'05 Proceedings of the 10th international conference on Database Theory
Anonymizing sequential releases
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing Classification Data for Privacy Preservation
IEEE Transactions on Knowledge and Data Engineering
Minimality attack in privacy preserving data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
K-anonymization as spatial indexing: toward scalable and incremental anonymization
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Anonymity for continuous data publishing
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Privacy-MaxEnt: integrating background knowledge in privacy quantification
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Preservation of proximity privacy in publishing numerical sensitive data
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Data reduction approach for sensitive associative classification rule hiding
ADC '08 Proceedings of the nineteenth conference on Australasian database - Volume 75
Protecting privacy in recorded conversations
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Data utility and privacy protection trade-off in k-anonymisation
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
An efficient clustering method for k-anonymization
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Protecting the Publishing Identity in Multiple Tuples
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Data Quality in Privacy Preservation for Associative Classification
ADMA '08 Proceedings of the 4th international conference on Advanced Data Mining and Applications
T-rotation: Multiple Publications of Privacy Preserving Data Sequence
ADMA '08 Proceedings of the 4th international conference on Advanced Data Mining and Applications
An Anonymity Model Achievable Via Microaggregation
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Spatial generalisation algorithms for LBS privacy preservation
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Anonymizing bipartite graph data using safe groupings
Proceedings of the VLDB Endowment
Privacy preserving serial data publishing by role composition
Proceedings of the VLDB Endowment
Yet another privacy metric for publishing micro-data
Proceedings of the 7th ACM workshop on Privacy in the electronic society
L-Diversity Based Dynamic Update for Large Time-Evolving Microdata
AI '08 Proceedings of the 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Privacy-preserving data mashup
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Privacy-preserving incremental data dissemination
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Genetic algorithm-based clustering approach for k-anonymization
Expert Systems with Applications: An International Journal
Privacy protection for RFID data
Proceedings of the 2009 ACM symposium on Applied Computing
Privacy-preserving data publishing for cluster analysis
Data & Knowledge Engineering
The union-split algorithm and cluster-based anonymization of social networks
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Anonymization-based attacks in privacy-preserving data publishing
ACM Transactions on Database Systems (TODS)
On the tradeoff between privacy and utility in data publishing
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing healthcare data: a case study on the blood transfusion service
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Information Sciences: an International Journal
Data and Structural k-Anonymity in Social Networks
Privacy, Security, and Trust in KDD
Clustering-Based Frequency l-Diversity Anonymization
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Social networks integration and privacy preservation using subgraph generalization
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics
WADS '09 Proceedings of the 11th International Symposium on Algorithms and Data Structures
Injecting purpose and trust into data anonymisation
Proceedings of the 18th ACM conference on Information and knowledge management
Density-based microaggregation for statistical disclosure control
Expert Systems with Applications: An International Journal
Class-based graph anonymization for social network data
Proceedings of the VLDB Endowment
Anonymization of set-valued data via top-down, local generalization
Proceedings of the VLDB Endowment
Anonymizing bipartite graph data using safe groupings
The VLDB Journal — The International Journal on Very Large Data Bases
Transparent anonymization: Thwarting adversaries who know the algorithm
ACM Transactions on Database Systems (TODS)
The hardness and approximation algorithms for l-diversity
Proceedings of the 13th International Conference on Extending Database Technology
Algorithm-safe privacy-preserving data publishing
Proceedings of the 13th International Conference on Extending Database Technology
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Proceedings of the 2010 EDBT/ICDT Workshops
Privacy-preserving sequential pattern release
PAKDD'07 Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining
(α, k)-anonymity based privacy preservation by lossy join
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
Generating microdata with p-sensitive k-anonymity property
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Practical issues on privacy-preserving health data mining
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Privacy protection on multiple sensitive attributes
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Allowing privacy protection algorithms to jump out of local optimums: an ordered greed framework
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Privacy-preserving data mining through knowledge model sharing
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
k-jump strategy for preserving privacy in micro-data disclosure
Proceedings of the 13th International Conference on Database Theory
K-isomorphism: privacy preserving network publication against structural attacks
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Non-homogeneous generalization in privacy preserving data publishing
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
P-Sensitive K-Anonymity with Generalization Constraints
Transactions on Data Privacy
Efficient Anonymizations with Enhanced Utility
Transactions on Data Privacy
Versatile publishing for privacy preservation
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Centralized and Distributed Anonymization for High-Dimensional Healthcare Data
ACM Transactions on Knowledge Discovery from Data (TKDD)
Systematic clustering method for l-diversity model
ADC '10 Proceedings of the Twenty-First Australasian Conference on Database Technologies - Volume 104
Microdata protection through approximate microaggregation
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight
Proceedings of the 2010 ACM workshop on Insider threats
Understanding privacy risk of publishing decision trees
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming
Theory of privacy and anonymity
Algorithms and theory of computation handbook
On-the-fly hierarchies for numerical attributes in data anonymization
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
A family of enhanced (L,α)-diversity models for privacy preserving data publishing
Future Generation Computer Systems
Extending l-diversity to generalize sensitive data
Data & Knowledge Engineering
Relationships and data sanitization: a study in scarlet
Proceedings of the 2010 workshop on New security paradigms
Minimizing minimality and maximizing utility: analyzing method-based attacks on anonymized data
Proceedings of the VLDB Endowment
Preventing range disclosure in k-anonymised data
Expert Systems with Applications: An International Journal
ACM Transactions on Database Systems (TODS)
Extended k-anonymity models against sensitive attribute disclosure
Computer Communications
Privacy-preserving publishing microdata with full functional dependencies
Data & Knowledge Engineering
Privacy-preserving data sharing in cloud computing
Journal of Computer Science and Technology
A user-oriented anonymization mechanism for public data
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Checking anonymity levels for anonymized data
ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
Associative classification rules hiding for privacy preservation
International Journal of Intelligent Information and Database Systems
Can the Utility of Anonymized Data be Used for Privacy Breaches?
ACM Transactions on Knowledge Discovery from Data (TKDD)
Differentially private data release for data mining
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preservation for associative classification: an approximation algorithm
International Journal of Business Intelligence and Data Mining
Anonymity meets game theory: secure data integration with malicious participants
The VLDB Journal — The International Journal on Very Large Data Bases
Publishing anonymous survey rating data
Data Mining and Knowledge Discovery
On-the-fly generalization hierarchies for numerical attributes revisited
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
An approximate microaggregation approach for microdata protection
Expert Systems with Applications: An International Journal
Cloning for privacy protection in multiple independent data publications
Proceedings of the 20th ACM international conference on Information and knowledge management
k-ARQ: k-anonymous ranking queries
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part I
Privacy-preserving publishing data with full functional dependencies
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
Limiting disclosure of sensitive data in sequential releases of databases
Information Sciences: an International Journal
Secure distributed computation of anonymized views of shared databases
ACM Transactions on Database Systems (TODS)
A practical approximation algorithm for optimal k-anonymity
Data Mining and Knowledge Discovery
k-Concealment: An Alternative Model of k-Type Anonymity
Transactions on Data Privacy
Microaggregation- and permutation-based anonymization of movement data
Information Sciences: an International Journal
Information based data anonymization for classification utility
Data & Knowledge Engineering
Detecting dependencies in an anonymized dataset
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Proceedings of the Sixth International Workshop on Data Mining for Online Advertising and Internet Economy
Improvements on a privacy-protection algorithm for DNA sequences with generalization lattices
Computer Methods and Programs in Biomedicine
A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining
Transactions on Data Privacy
Privacy protection in social networks using l-diversity
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification
International Journal of Information Security and Privacy
Priority driven k-anonymisation for privacy protection
AusDM '08 Proceedings of the 7th Australasian Data Mining Conference - Volume 87
Studying genotype-phenotype attack on k-anonymised medical and genomic data
AusDM '09 Proceedings of the Eighth Australasian Data Mining Conference - Volume 101
Incremental processing and indexing for k, e-anonymisation
International Journal of Information and Computer Security
Improving accuracy of classification models induced from anonymized datasets
Information Sciences: an International Journal
A general framework for privacy preserving data publishing
Knowledge-Based Systems
The effect of homogeneity on the computational complexity of combinatorial data anonymization
Data Mining and Knowledge Discovery
MAGE: A semantics retaining K-anonymization method for mixed data
Knowledge-Based Systems
Multivariate microaggregation by iterative optimization
Applied Intelligence
Journal of Computer Security
Hi-index | 0.01 |
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymity model has been introduced for protecting individual identification. Recent studies show that a more sophisticated model is necessary to protect the association of individuals to sensitive information. In this paper, we propose an (α, k)-anonymity model to protect both identifications and relationships to sensitive information in data. We discuss the properties of (α, k)-anonymity model. We prove that the optimal (α, k)-anonymity problem is NP-hard. We first presentan optimal global-recoding method for the (α, k)-anonymity problem. Next we propose a local-recoding algorithm which is more scalable and result in less data distortion. The effectiveness and efficiency are shown by experiments. We also describe how the model can be extended to more general case.