Sign Up to like & get
recommendations!
0
Published in 2018 at "International Journal of Information Security"
DOI: 10.1007/s10207-018-0409-1
Abstract: In this paper, we tackle the problem of graph anonymization in the context of privacy-preserving social network mining. We present a greedy and non-deterministic algorithm to achieve k-anonymity on labeled and undirected networks. Our work…
read more here.
Keywords:
scalable non;
clustering based;
anonymization;
based anonymization ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Journal of Big Data"
DOI: 10.1186/s40537-017-0104-5
Abstract: Big data is predominantly associated with data retrieval, storage, and analytics. Data analytics is prone to privacy violations and data disclosures, which can be partly attributed to the multi-user characteristics of big data environments. Adversaries…
read more here.
Keywords:
sensitivity based;
big data;
anonymization;
based anonymization ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "Studies in health technology and informatics"
DOI: 10.3233/shti210953
Abstract: Especially in biomedical research, individual-level data must be protected due to the sensitivity of the data that is associated with patients. The broad goal of scientific data re-use is to allow many researchers to derive…
read more here.
Keywords:
control;
based anonymization;
access control;
risk based ... See more keywords