k-Anonymization Revisited

  title={k-Anonymization Revisited},
  author={Aristides Gionis and Arnon Mazza and Tamir Tassa},
  journal={2008 IEEE 24th International Conference on Data Engineering},
In this paper we introduce new notions of k-type anonymizations. Those notions achieve similar privacy goals as those aimed by Sweenie and Samarati when proposing the concept of k-anonymization: an adversary who knows the public data of an individual cannot link that individual to less than k records in the anonymized table. Every anonymized table that satisfies k-anonymity complies also with the anonymity constraints dictated by the new notions, but the converse is not necessarily true. Thus… CONTINUE READING
Highly Cited
This paper has 82 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 47 extracted citations

Privacy preserving data mining on published data in healthcare: A survey

2016 7th International Conference on Computer Science and Information Technology (CSIT) • 2016
View 7 Excerpts
Highly Influenced

Anonymization on refining partition: Same privacy, more utility

The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014) • 2014
View 6 Excerpts
Highly Influenced

Achieving Probabilistic Anonymity in a Linear and Hybrid Randomization Model

IEEE Transactions on Information Forensics and Security • 2016
View 3 Excerpts

83 Citations

Citations per Year
Semantic Scholar estimates that this publication has 83 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 21 references

On the Complexity of Optimal K-Anonymity

View 7 Excerpts
Highly Influenced

Anonymizing Tables

ICDT • 2005
View 4 Excerpts
Highly Influenced

Approximation Algorithms for k-Anonymity 1

View 7 Excerpts
Highly Influenced

Incognito: Efficient Full-Domain K-Anonymity

View 4 Excerpts
Highly Influenced

Achieving anonymity via clustering

ACM Trans. Algorithms • 2010
View 1 Excerpt

Privacy Preserving Data Mining

Advances in Information Security • 2006
View 1 Excerpt

Similar Papers

Loading similar papers…