2004
DOI: 10.1007/978-3-540-30570-5_17
|View full text |Cite
|
Sign up to set email alerts
|

Anonymizing Tables

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
219
0
3

Year Published

2005
2005
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 204 publications
(224 citation statements)
references
References 13 publications
2
219
0
3
Order By: Relevance
“…However, most approach for preserving privacy using k-anonymity in recently [8]- [10]. Data displaying through k-anonymity by generalized.…”
Section: Data Encryptionmentioning
confidence: 99%
“…However, most approach for preserving privacy using k-anonymity in recently [8]- [10]. Data displaying through k-anonymity by generalized.…”
Section: Data Encryptionmentioning
confidence: 99%
“…Our solution adapts for 2-microaggregation a corrected version of the [1] and [2] approach to 2-anonymizing categorical data through partial suppression. The algorithm in [1] and [2] could not be used as published, as it relies on [4] to solve a minimum weight [1,2]-factor, a problem not dealt with by [4], but by the substantially more recent literature mentioned in Section 2.…”
Section: A 2-approximation Algorithm For 2-microaggregationmentioning
confidence: 99%
“…2. Compute the minimum weight [1,2]-factor F min of graph G (see Section 2). By optimality, F min consists only of connected components with a single edge (two vertices) or two adjacent edges (three vertices).…”
Section: A 2-approximation Algorithm For 2-microaggregationmentioning
confidence: 99%
See 1 more Smart Citation
“…Fung et al [5] present a top-down heuristic to make a table to be released k-anonymous. As to the theoretical results, Meyerson and Williams [9] and Aggarwal et al [1,2] proved the optimal k-anonymity is NP-hard (based on the number of cells and number of attributes that are generalized and suppressed) and describe approximation algorithms for optimal k-anonymity. Sun et al [13] proved that k-anonymity problem is also NP-hard even in the restricted cases, which could imply the results in [1,2,9] as well.…”
Section: Introductionmentioning
confidence: 99%