k-Anonymity: A Model for Protecting Privacy

@article{Sweeney2002kAnonymityAM,
  title={k-Anonymity: A Model for Protecting Privacy},
  author={Latanya Sweeney},
  journal={International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems},
  year={2002},
  volume={10},
  pages={557-570}
}
  • Latanya Sweeney
  • Published in
    International Journal of…
    2002
  • Computer Science
  • Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers. How can a data holder release a version of its private data with scientific guarantees that the individuals who are the subjects of the data cannot be re-identified while the data remain practically useful? The solution provided in this paper includes a formal protection model named k… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Figures and Topics from this paper.

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 4,691 CITATIONS

    Foolproofing network communication by k-diverse padding

    VIEW 15 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    Expert Sources in Warnings May Reduce the Extent of Identity Disclosure in Cyber Contexts

    VIEW 5 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Implementing privacy using modified tree and map technique

    VIEW 4 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    User Privacy in Recommender Systems

    VIEW 7 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    De-Identifying Government Datasets

    VIEW 7 EXCERPTS
    HIGHLY INFLUENCED

    On Preventing Location Attacks for Urban Vehicular Networks

    VIEW 4 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    A novel anonymous authenticated key agreement protocol for vehicular ad hoc networks

    VIEW 5 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Sharing Patient Disease Data with Privacy Preservation

    VIEW 6 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    FILTER CITATIONS BY YEAR

    2002
    2020

    CITATION STATISTICS

    • 508 Highly Influenced Citations

    • Averaged 421 Citations per year from 2017 through 2019

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 24 REFERENCES

    k-Anonymity: A Model for Protecting Privacy

    • Latanya Sweeney
    • Computer Science
    • International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
    • 2002

    k-anonymity: a model for protecting privacy

    • L. Sweeney
    • International Journal on Uncertainty, Fuzziness and Knowledge-based Systems,
    • 2002

    Computational Data Privacy Protection, LIDAP-WP5

    • L. Sweeney
    • 2000

    Detection and elimination of inference channels in multilevel relational database systems