Probabilistic Anonymity

@inproceedings{Lodha2007ProbabilisticA,
  title={Probabilistic Anonymity},
  author={Sachin Lodha and Dilys Thomas},
  booktitle={PinKDD},
  year={2007}
}
In this age of globalization, organizations need to publish their micro-data owing to legal directives or share it with busine s associates in order to remain competitive. This puts personal pr ivacy at risk. To surmount this risk, attributes that clearly identi fy individuals, such asName, Social Security Number , Driving License Number , are generally removed or replaced by random values. But this may not be enough because such de-identi fied databases can sometimes be joined with other… CONTINUE READING
Highly Cited
This paper has 21 citations. REVIEW CITATIONS

References

Publications referenced by this paper.
Showing 1-10 of 36 references

First estimates from the national crime victimization

  • K. Baum
  • survey: Identity theft,
  • 2004
Highly Influential
3 Excerpts

A model for preserving privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems

  • L. Sweeney.k-Anonymity
  • 2002
Highly Influential
7 Excerpts

Clustering for privacy

  • G. Aggarwal, T. Feder, K. Kenthapadi, R. Panigrahy, D. Thomas, A. Zhu
  • Proceedings of the ACM Symposium on Principles of…
  • 2006
Highly Influential
6 Excerpts

and A

  • G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas
  • Zhu. Approximation algorithms for k-Anonymity…
  • 2005
Highly Influential
6 Excerpts

Approximation algorithms for kAnonymity

  • T. Feder, K. Kenthapadi, R. Panigrahy, D. Thomas, A. Zhu
  • Earlier version appeared in Proc . of the Intl…
  • 2005

Similar Papers

Loading similar papers…