Articles with "based anonymization" as a keyword



Photo from archive.org

Scalable non-deterministic clustering-based k-anonymization for rich networks

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Information Security"

DOI: 10.1007/s10207-018-0409-1

Abstract: In this paper, we tackle the problem of graph anonymization in the context of privacy-preserving social network mining. We present a greedy and non-deterministic algorithm to achieve k-anonymity on labeled and undirected networks. Our work… read more here.

Keywords: scalable non; clustering based; anonymization; based anonymization ... See more keywords
Photo by campaign_creators from unsplash

Improving MapReduce privacy by implementing multi-dimensional sensitivity-based anonymization

Sign Up to like & get
recommendations!
Published in 2017 at "Journal of Big Data"

DOI: 10.1186/s40537-017-0104-5

Abstract: Big data is predominantly associated with data retrieval, storage, and analytics. Data analytics is prone to privacy violations and data disclosures, which can be partly attributed to the multi-user characteristics of big data environments. Adversaries… read more here.

Keywords: sensitivity based; big data; anonymization; based anonymization ... See more keywords
Photo by charlesdeluvio from unsplash

Embedding Risk-Based Anonymization into Data Access Control for Providing Individual-Level Health Data in a Secure Way

Sign Up to like & get
recommendations!
Published in 2022 at "Studies in health technology and informatics"

DOI: 10.3233/shti210953

Abstract: Especially in biomedical research, individual-level data must be protected due to the sensitivity of the data that is associated with patients. The broad goal of scientific data re-use is to allow many researchers to derive… read more here.

Keywords: control; based anonymization; access control; risk based ... See more keywords