Priority driven K-anonymisation for privacy protection
Paper
Paper/Presentation Title | Priority driven K-anonymisation for privacy protection |
---|---|
Presentation Type | Paper |
Authors | Sun, Xiaoxun (Author), Wang, Hua (Author) and Li, Jiuyong (Author) |
Editors | Roddick, John F., Li, Jiuyong, Christen, Peter and Kennedy, Paul J. |
Journal or Proceedings Title | Proceedings of the 7th Australasian Data Mining Conference (AusDM 2008): Data Mining and Analytics 2008 |
Number of Pages | 6 |
Year | 2008 |
Place of Publication | Gold Coast, Australia |
ISBN | 9781920682682 |
Web Address (URL) of Paper | http://crpit.com/Vol87.html |
Conference/Event | 7th Australasian Data Mining Conference (AusDM 2008) |
Event Details | 7th Australasian Data Mining Conference (AusDM 2008) Parent Australasian Data Mining Conference (AusDM) Event Date 27 to end of 28 Nov 2008 Event Location Glenelg, Adelaide |
Abstract | [Abstract]: Given the threat of re-identi¯cation in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a diffcult problem. K-anonymity is a major technique |
Keywords | K-anonymity; privacy protection |
ANZSRC Field of Research 2020 | 461399. Theory of computation not elsewhere classified |
Public Notes | File reproduced in accordance with the copyright policy of the publisher/author. |
Byline Affiliations | Department of Mathematics and Computing |
University of South Australia |
https://research.usq.edu.au/item/9z3x9/priority-driven-k-anonymisation-for-privacy-protection
Download files
1835
total views152
total downloads1
views this month1
downloads this month