Permutation anonymization

@article{Li2015PermutationA,
  title={Permutation anonymization},
  author={Dong Li and Xianmang He and LongBin Cao and HuaHui Chen},
  journal={Journal of Intelligent Information Systems},
  year={2015},
  volume={47},
  pages={427-445}
}
In data publishing, anonymization techniques have been designed to provide privacy protection. Anatomy is an important techniques for privacy preserving in data publication and attracts considerable attention in the literature. However, anatomy is fragile under background knowledge attack and the presence attack. In addition, anatomy can only be applied… CONTINUE READING