2015
DOI: 10.1016/j.ins.2015.06.018
|View full text |Cite
|
Sign up to set email alerts
|

Conditional anonymity with non-probabilistic adversary

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
1
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 48 publications
1
1
0
Order By: Relevance
“…We do so because the privacy level of the perturbed graph is measured in terms of the initial threats present in the original graph. This is consistent with previous uses of the terminology conditional privacy in microdata anonymisation [5,9], to reflect the fact that the privacy of a dataset is measured in terms of the a priori adversary knowledge.…”
Section: Definition 33 ((K )-Anonymity)supporting
confidence: 87%
“…We do so because the privacy level of the perturbed graph is measured in terms of the initial threats present in the original graph. This is consistent with previous uses of the terminology conditional privacy in microdata anonymisation [5,9], to reflect the fact that the privacy of a dataset is measured in terms of the a priori adversary knowledge.…”
Section: Definition 33 ((K )-Anonymity)supporting
confidence: 87%
“…In 2015, Chen et al [109] proposed the concept of settheoretic conditional anonymity by considering the threat from non-probabilistic adversary. They also proposed a metric for set-theoretic conditional anonymity and a variant of an existing metric for probabilistic conditional anonymity to evaluate system's degree of anonymity quantitatively.…”
Section: A Metrics Based On Set Theorymentioning
confidence: 99%