Proceedings of the 3rd International Conference on Smart City Applications 2018
DOI: 10.1145/3286606.3286793
|View full text |Cite
|
Sign up to set email alerts
|

Knowledge Based Access Control a model for security and privacy in the Big Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…Pseudonymization replaces an identifier with a randomly generated identifier called pseudonym and it generates several identification keys in order to create a connection between distinct information related to individuals [13]. In the following, the most used pseudonymization techniques as mentioned in [14].…”
Section: Pseudonymizationmentioning
confidence: 99%
“…Pseudonymization replaces an identifier with a randomly generated identifier called pseudonym and it generates several identification keys in order to create a connection between distinct information related to individuals [13]. In the following, the most used pseudonymization techniques as mentioned in [14].…”
Section: Pseudonymizationmentioning
confidence: 99%
“…e first one represents a set of information that contains personal details other than identifiers [19,20]. In addition, QI attributes like "Age" and "Gender" attributes do not identify a record directly and are separate by themselves [21,22]. Even though the individual identifiers are removed, QI attributes can be utilized by a malicious person to track an individual and to reveal its identity when we gather these attributes together with the assistance of other pieces of background knowledge information [23,24].…”
Section: Background and Definitionsmentioning
confidence: 99%
“…e second type is considered as private personal attributes [22,25]. For instance, in a hospital data set, "Disease" is a sensitive attribute; in a financial data set, "CCV" number is a sensitive attribute, and the "annual income" is a sensitive attribute in a census data set [21,23]. Moreover, sensitive attributes (SA) should be hidden while publishing and sharing data [21,24].…”
Section: Background and Definitionsmentioning
confidence: 99%
See 1 more Smart Citation