Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/10609/109856
Registro completo de metadatos
Campo DC Valor Lengua/Idioma
dc.contributor.authorStokes, Klara-
dc.contributor.authorTorra, Vicenç-
dc.contributor.otherUniversitat Oberta de Catalunya. Internet Interdisciplinary Institute (IN3)-
dc.contributor.otherConsejo Superior de Investigaciones Científicas (CSIC)-
dc.date.accessioned2020-02-18T08:24:09Z-
dc.date.available2020-02-18T08:24:09Z-
dc.date.issued2012-12-
dc.identifier.citationStokes, K. & Torra, V. (2012). Multiple releases of k-anonymous data sets and k-anonymous relational databases. International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems, 20(6), 839-853. doi: 10.1142/S0218488512400260en
dc.identifier.issn0218-4885MIAR
-
dc.identifier.urihttp://hdl.handle.net/10609/109856-
dc.description.abstractIn data privacy, the evaluation of the disclosure risk has to take into account the fact that several releases of the same or similar information about a population are common. In this paper we discuss this issue within the scope of k-anonymity. We also show how this issue is related to the publication of privacy protected databases that consist of linked tables. We present algorithms for the implementation of k-anonymity for this type of data.en
dc.language.isoeng-
dc.publisherInternational Journal of Uncertainty, Fuzziness and Knowlege-Based Systems-
dc.relation.ispartofInternational Journal of Uncertainty, Fuzziness and Knowlege-Based Systems, 2012, 20(6)-
dc.relation.urihttps://doi.org/10.1142/S0218488512400260-
dc.subjectdata privacyen
dc.subjectdisclosure risken
dc.subjectk-anonymityen
dc.subjectdatabasesen
dc.subjectprivacitat de dadesca
dc.subjectprivacidad de datoses
dc.subjectcomunicació de riscosca
dc.subjectcomunicación de riesgoses
dc.subjectk-anonimatca
dc.subjectk-anonimatoes
dc.subjectbases de dadesca
dc.subjectbases de datoses
dc.subject.lcshComputer securityen
dc.titleMultiple releases of k-anonymous data sets and k-anonymous relational databasesen
dc.typeinfo:eu-repo/semantics/article-
dc.subject.lemacSeguretat informàticaca
dc.subject.lcshesSeguridad informáticaes
dc.rights.accessRightsinfo:eu-repo/semantics/closedAccess-
dc.identifier.doi10.1142/S0218488512400260-
dc.gir.idAR/0000004264-
dc.relation.projectIDinfo:eu-repo/grantAgreement/CONSOLIDER INGENIO 2010 CSD2007-00004-
dc.relation.projectIDinfo:eu-repo/grantAgreement/TSI2007-65406-C03-
dc.relation.projectIDinfo:eu-repo/grantAgreement/TIN2009-11689-
dc.relation.projectIDinfo:eu-repo/grantAgreement/TIN2012-32757-
dc.relation.projectIDinfo:eu-repo/grantAgreement/TIN2011-27076-C03-
Aparece en las colecciones: Articles cientÍfics
Articles

Ficheros en este ítem:
No hay ficheros asociados a este ítem.
Comparte:
Exporta:
Consulta las estadísticas

Los ítems del Repositorio están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.