Proceedings of the 18th ACM Conference on Information and Knowledge Management 2009
DOI: 10.1145/1645953.1646333
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and anonymization for very large datasets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
3
3

Relationship

1
9

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…Literature [5] achieved to protect data privacy through multi-layer encryption in relational databases. Munts discussed the existing privacy protection technologies, including K anonymity, anonymous figure and data preprocessing as the massive data released [6].…”
Section: Related Workmentioning
confidence: 99%
“…Literature [5] achieved to protect data privacy through multi-layer encryption in relational databases. Munts discussed the existing privacy protection technologies, including K anonymity, anonymous figure and data preprocessing as the massive data released [6].…”
Section: Related Workmentioning
confidence: 99%
“…While social network graphs can be represented in tabular form, the semantics are not the same as those for tabular data. Applying classical anonymization techniques to a tabular representation of a graph will either break the data structure or fail to provide anonymity [23].…”
Section: Anonymization Of Published Datamentioning
confidence: 99%
“…Literature [4] achieved data protection in the relational database through a multi-layer encryption. Munts [5] discussed the existing data processing technology, including K anonymous, anonymous figure and data preprocessing, as the large-scale release of data problems faced some solutions. Roy focused on information flow control and differential data protection technologies into cloud computing to generate phase data in which propose a data protection system airavat, prevent mapreduce calculation authorized private data leaked out.…”
Section: Introductionmentioning
confidence: 99%