2015
DOI: 10.1007/978-3-319-17533-1_36
|View full text |Cite
|
Sign up to set email alerts
|

ADKAM: A-Diversity K-Anonymity Model via Microaggregation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…The main characteristic of our model is that it can simplify the calculation of the integrated information of the access history by using the number and the frequency of access. With the proposed model, we can protect privacy from the collision of different databases as well as the update of the database items, which cannot be effectively handled by many of the exciting methods such as k-anonymity [4][5] and differential privacy [6] [7].…”
Section: Introductionmentioning
confidence: 99%
“…The main characteristic of our model is that it can simplify the calculation of the integrated information of the access history by using the number and the frequency of access. With the proposed model, we can protect privacy from the collision of different databases as well as the update of the database items, which cannot be effectively handled by many of the exciting methods such as k-anonymity [4][5] and differential privacy [6] [7].…”
Section: Introductionmentioning
confidence: 99%