A Novel Approach Of Privacy Preserving Data With Anonymizing Tree Structure
Abstract
References
Australian Privacy Act. www.austlii.edu.au/au/legis/cth/consol act/pa1988108.
Canadian Privacy Act. laws-lois.justice.gc.ca/eng/acts/P-21/.
Data Protection Act 1998, UK. www.legislation.gov.uk/ukpga/1998/29/contents.
GR Law. www.dpa.gr/portal/page? pageid=33,43560& dad=portal.
M. Nergiz, C. Clifton, and A. Nergiz. Multirelational k-anonymity. IEEE TKDE, pages 104–1117, 2009.
M. Terrovitis, N. Mamoulis, and P. Kalnis. Privacy- preserving Anonymization of Set-valued Data. PVLDB, 1(1), 2008.
M. Terrovitis, N. Mamoulis, and P. Kalnis. Local and global recoding methods for anonymizing set-valued data. The VLDB Journal, 2010.
R. Chaytor and K. Wang. Small-domain randomization: Same privacy more utility. In VLDB, 2010.
R. Chen, N. Mohammed, B. C. M. Fung, B. C. Desai, and L. Xiong. Publishing set-valued data via differential privacy. PVLDB,4(11):1087–1098, 2011.
J. Cheng, A.W.-c. Fu, and J. Liu. K-isomorphism: privacy preserving network publication against structural attacks. In SIGMOD, 2010.
G. Cormode , Personal privacy vs population privacy: learning to attack anonymization.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â