dc.contributor.author |
Sacharidis, D |
en |
dc.contributor.author |
Mouratidis, K |
en |
dc.contributor.author |
Papadias, D |
en |
dc.date.accessioned |
2014-03-01T01:59:19Z |
|
dc.date.available |
2014-03-01T01:59:19Z |
|
dc.date.issued |
2010 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/28916 |
|
dc.subject |
Experimental Evaluation |
en |
dc.subject |
Generic Algorithm |
en |
dc.subject |
Information Loss |
en |
dc.title |
k-Anonymity in the Presence of External Databases |
en |
heal.type |
journalArticle |
en |
heal.identifier.primary |
10.1109/TKDE.2009.120 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/TKDE.2009.120 |
en |
heal.publicationDate |
2010 |
en |
heal.abstract |
The concept of k-anonymity has received considerable attention due to the need of several organizations to release microdata without revealing the identity of individuals. Although all previous k-anonymity techniques assume the existence of a public database (PD) that can be used to breach privacy, none utilizes PD during the anonymization process. Specifically, existing generalization algorithms create anonymous tables using only |
en |
heal.journalName |
IEEE Transactions on Knowledge and Data Engineering |
en |
dc.identifier.doi |
10.1109/TKDE.2009.120 |
en |