2005
DOI: 10.1007/11427995_14
|View full text |Cite
|
Sign up to set email alerts
|

Integrating Private Databases for Data Analysis

Abstract: Abstract. In today's globally networked society, there is a dual demand on both information sharing and information protection. A typical scenario is that two parties wish to integrate their private databases to achieve a common goal beneficial to both, provided that their privacy requirements are satisfied. In this paper, we consider the goal of building a classifier over the integrated data while satisfying the k-anonymity privacy requirement. The k-anonymity requirement states that domain values are general… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(20 citation statements)
references
References 8 publications
0
20
0
Order By: Relevance
“…The solution is a simple and effective method as it uses cost effective algorithms for achieving anonymity. The solution proposed in [14] is based on tree data structure called TIPS. We base our solution on subset generation and selecting the most relevant subset.…”
Section: Resultsmentioning
confidence: 99%
“…The solution is a simple and effective method as it uses cost effective algorithms for achieving anonymity. The solution proposed in [14] is based on tree data structure called TIPS. We base our solution on subset generation and selecting the most relevant subset.…”
Section: Resultsmentioning
confidence: 99%
“…There are some distributed anonymization methods in vertically partitioned data [10,14,6]. Mohammed et al [10,14] used the top-down approach and some secure computation protocols [9,15] in order to join the tables in multiple providers.…”
Section: Related Workmentioning
confidence: 99%
“…Mohammed et al [10,14] used the top-down approach and some secure computation protocols [9,15] in order to join the tables in multiple providers. The top-down approach is an algorithm to specialize a value qid of a quasiidentifier in the tables step by step.…”
Section: Related Workmentioning
confidence: 99%
“…[22] proposed a multi-dimensional generalization method, called InfoGain Mondrian, to identify a k-anonymous solution. [29][43] [44] addressed the extended data publishing scenarios, such as multiple releases and multiple data holders. [10] presented a suppression method for anonymizing high-dimensional sequential data.…”
Section: Related Workmentioning
confidence: 99%