2022
DOI: 10.1007/978-981-16-6309-3_28
|View full text |Cite
|
Sign up to set email alerts
|

Contextualization of Personal Data Discovery and Anonymization Tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 8 publications
0
1
0
Order By: Relevance
“…Three types of challenges can be distinguished when in the process of data anonymization, which are related to organizational context, functional or business context, and technical context. Each of these three contexts includes a list of related contextual elements [28], and the instantiation of these contextual elements can alert if the anonymization process can be short-circuited. Here, the contextual elements are clearly identified (i.e.…”
Section: Challenges Faced By Data Anonymization Expertsmentioning
confidence: 99%
See 1 more Smart Citation
“…Three types of challenges can be distinguished when in the process of data anonymization, which are related to organizational context, functional or business context, and technical context. Each of these three contexts includes a list of related contextual elements [28], and the instantiation of these contextual elements can alert if the anonymization process can be short-circuited. Here, the contextual elements are clearly identified (i.e.…”
Section: Challenges Faced By Data Anonymization Expertsmentioning
confidence: 99%
“…The architecture of the context-based personal data discovery tool is shown in the Figure 4. All details about our approach and the implementation can be found in our book chapter in [28].…”
Section: Context-based Tools For Improving Anonymizationmentioning
confidence: 99%
“…In Figure 2, five new edges have been introduced to change the structure of G for privacy preservation. Recently, many solutions have been proposed to preserve the privacy of SN users in G publishing [15][16][17][18][19][20][21]. These solutions have been used to preserve either nodes' or edges' privacy in the release of G. Recently, differential privacy-based solutions have also been proposed to alter the G's structure for privacy preservation [22].…”
Section: Introductionmentioning
confidence: 99%