Por favor, use este identificador para citar o enlazar este ítem:
http://hdl.handle.net/10609/92790
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Casas-Roma, Jordi | - |
dc.contributor.author | Herrera-Joancomartí, Jordi | - |
dc.contributor.author | Torra, Vicenç | - |
dc.contributor.other | Universitat Autònoma de Barcelona (UAB) | - |
dc.contributor.other | Artificial Intelligence Research Institute | - |
dc.contributor.other | Universitat Oberta de Catalunya (UOC) | - |
dc.date.accessioned | 2019-04-02T13:44:34Z | - |
dc.date.available | 2019-04-02T13:44:34Z | - |
dc.date.issued | 2014-08-22 | - |
dc.identifier.citation | Casas-Roma, J., Herrera-Joancomartí, J. & Torra, V. (2015). A summary of k-degree anonymous methods for privacy-preserving on networks. Studies in Computational Intelligence, 567(), 231-250. doi: 10.1007/978-3-319-09885-2_13 | - |
dc.identifier.issn | 1860-949XMIAR | - |
dc.identifier.issn | 1860-9503MIAR | - |
dc.identifier.uri | http://hdl.handle.net/10609/92790 | - |
dc.description.abstract | In recent years there has been a significant raise in the use of graph-formatted data. For instance, social and healthcare networks present relationships among users, revealing interesting and useful information for researches and other third-parties. Notice that when someone wants to publicly release this information it is necessary to preserve the privacy of users who appear in these networks. Therefore, it is essential to implement an anonymization process in the data in order to preserve users' privacy. Anonymization of graph-based data is a problem which has been widely studied last years and several anonymization methods have been developed. In this chapter we summarize some methods for privacy-preserving on networks, focusing on methods based on the k-anonymity model. We also compare the results of some k-degree anonymous methods on our experimental set up, by evaluating the data utility and the information loss on real networks. | en |
dc.language.iso | eng | - |
dc.publisher | Studies in Computational Intelligence | - |
dc.relation.ispartof | Studies in Computational Intelligence, 2015, 567() | - |
dc.relation.uri | https://doi.org/10.1007/978-3-319-09885-2_13 | - |
dc.rights | CC BY-NC-ND | - |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ | - |
dc.subject | privacy | en |
dc.subject | k-anonymity | en |
dc.subject | social networks | en |
dc.subject | information loss | en |
dc.subject | data utility | en |
dc.subject | graphs | en |
dc.subject | privadesa | ca |
dc.subject | privacidad | es |
dc.subject | k-anonimat | ca |
dc.subject | k-anonimato | es |
dc.subject | xarxes socials | ca |
dc.subject | redes sociales | es |
dc.subject | pèrdua d'informació | ca |
dc.subject | pérdida de información | es |
dc.subject | utilitat de dades | ca |
dc.subject | utilidad de datos | es |
dc.subject | gráficos | es |
dc.subject | gràfics | ca |
dc.subject.lcsh | Data protection | en |
dc.title | A summary of k-degree anonymous methods for privacy-preserving on networks | - |
dc.type | info:eu-repo/semantics/article | - |
dc.subject.lemac | Protecció de dades | ca |
dc.subject.lcshes | Protección de datos | es |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | - |
dc.identifier.doi | 10.1007/978-3-319-09885-2_13 | - |
dc.gir.id | AR/0000004425 | - |
dc.relation.projectID | info:eu-repo/grantAgreement/TIN2011-27076-C03-02 | - |
dc.relation.projectID | info:eu-repo/grantAgreement/CSD2007-0004 | - |
dc.type.version | info:eu-repo/semantics/submittedVersion | - |
Aparece en las colecciones: | Articles cientÍfics Articles |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
Summarykdegree.pdf | Preprint | 391,3 kB | Adobe PDF | Visualizar/Abrir |
Comparte:
Los ítems del Repositorio están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.