2011 6th IEEE Joint International Information Technology and Artificial Intelligence Conference 2011
DOI: 10.1109/itaic.2011.6030363
|View full text |Cite
|
Sign up to set email alerts
|

The (P, α, K) anonymity model for privacy protection of personal information in the social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…In [47], Xiao and Tao present a generalization framework based on the concept of personalized anonymity, where an individual can specify the degree of privacy protection for his sensitive data. Some variants of k-anonymity have also been proposed to support personalized privacy preservation, such as (P, α, K )-anonymity [48], personalized (α, k)-anonymity [49], PK -anonymity [50], individualized (α, k)-anonymity [51], etc. In current studies, individual's personalized preference on privacy preserving is formulated through the parameters of the anonymity model (e.g.…”
Section: Discussionmentioning
confidence: 99%
“…In [47], Xiao and Tao present a generalization framework based on the concept of personalized anonymity, where an individual can specify the degree of privacy protection for his sensitive data. Some variants of k-anonymity have also been proposed to support personalized privacy preservation, such as (P, α, K )-anonymity [48], personalized (α, k)-anonymity [49], PK -anonymity [50], individualized (α, k)-anonymity [51], etc. In current studies, individual's personalized preference on privacy preserving is formulated through the parameters of the anonymity model (e.g.…”
Section: Discussionmentioning
confidence: 99%