Access the full text.
Sign up today, get DeepDyve free for 14 days.
J. Domingo-Ferrer, J. Mateo-Sanz (2002)
Practical Data-Oriented Microaggregation for Statistical Disclosure ControlIEEE Trans. Knowl. Data Eng., 14
L. Sweeney (2002)
k-Anonymity: A Model for Protecting PrivacyInt. J. Uncertain. Fuzziness Knowl. Based Syst., 10
W. E. Yancey, W. E. Winkler, R. H. Creecy (2002)
Inference Control in Statistical Databases
L. Sweeney (2002)
Achieving k-Anonymity Privacy Protection Using Generalization and SuppressionInt. J. Uncertain. Fuzziness Knowl. Based Syst., 10
(2004)
k-Anonymity: Algorithms and hardness
(1986)
Finding a needle in a haystack - or identifying anonymous census records
Jerome Reiter (2005)
Releasing multiply imputed, synthetic public use microdata: an illustration and empirical studyJournal of the Royal Statistical Society: Series A (Statistics in Society), 168
William Yancey, W. Winkler, R. Creecy (2002)
Disclosure Risk Assessment in Perturbative Microdata Protection
A. Meyerson, Ryan Williams (2004)
On the complexity of optimal K-anonymity
G. Duncan, S. Fienberg, R. Krishnan, R. Padman, S. Roehrig (2001)
Disclosure Limitation Methods and Information Loss for Tabular Data
F. Sebé, J. Domingo-Ferrer, J. Mateo-Sanz, V. Torra (2002)
Post-Masking Optimization of the Tradeoff between Information Loss and Disclosure Risk in Masked Microdata Sets
A. Oganian, J. Domingo-Ferrer (2001)
On the complexity of optimal microaggregation for statistical disclosure controlStatistical journal of the United Nations economic commission for Europe, 18
P. Samarati, L. Sweeney (1998)
Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression
W. E. Winkler (2004)
Privacy in Statistical Databases
G. Duncan, S. Keller-McNulty, S. Stokes (2004)
Disclosure Risk vs. Data Utility: The R-U Confidentiality Map as Applied to TopcodingCHANCE, 17
(2005)
Privacy in statistical databases: Methods and performance metrics for microdata protection
J. Mateo-Sanz, J. Domingo-Ferrer, F. Sebé (2005)
Probabilistic Information Loss Measures in Confidentiality Protection of Continuous MicrodataData Mining and Knowledge Discovery, 11
V. Torra (2004)
Microaggregation for Categorical Variables: A Median Based Approach
P. Doyle, J. Lane, J. Theeuwes, L. Zayatz (2001)
Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies
W. Winkler (2004)
Re-identification Methods for Masked Microdata
L. Willenborg, T. Waal (2000)
Elements of Statistical Disclosure Control
(2003)
μ-ARGUS version 3.2 Software and User’s Manual
(1993)
Panels of enterprises and confidentiality: the small aggregates method
P. Samarati (2001)
Protecting Respondents' Identities in Microdata ReleaseIEEE Trans. Knowl. Data Eng., 13
J. Domingo-Ferrer, Josep and, V. Torra (2004)
Comparing SDC Methods for Microdata on the Basis of Information Loss and Disclosure Risk
Universitat Rovira (2001)
Chapter 6 A Quantitative Comparison of Disclosure Control Methods for Microdata
k-Anonymity is a useful concept to solve the tension between data utility and respondent privacy in individual data (microdata) protection. However, the generalization and suppression approach proposed in the literature to achieve k-anonymity is not equally suited for all types of attributes: (i) generalization/suppression is one of the few possibilities for nominal categorical attributes; (ii) it is just one possibility for ordinal categorical attributes which does not always preserve ordinality; (iii) and it is completely unsuitable for continuous attributes, as it causes them to lose their numerical meaning. Since attributes leading to disclosure (and thus needing k-anonymization) may be nominal, ordinal and also continuous, it is important to devise k-anonymization procedures which preserve the semantics of each attribute type as much as possible. We propose in this paper to use categorical microaggregation as an alternative to generalization/suppression for nominal and ordinal k-anonymization; we also propose continuous microaggregation as the method for continuous k-anonymization.
Data Mining and Knowledge Discovery – Springer Journals
Published: Aug 23, 2005
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.