Restoring compromised privacy in micro-data disclosure
Abstract
References
Index Terms
- Restoring compromised privacy in micro-data disclosure
Recommendations
Privacy streamliner: a two-stage approach to improving algorithm efficiency
CODASPY '12: Proceedings of the second ACM conference on Data and Application Security and PrivacyIn releasing data with sensitive information, a data owner usually has seemingly conflicting goals, including privacy preservation, utility optimization, and algorithm efficiency. In this paper, we observe that a high computational complexity is usually ...
Preventing range disclosure in k-anonymised data
k-Anonymisation is an approach to preventing sensitive information about individuals being identified or inferred from a dataset. Existing work achieves this by ensuring that each individual is linked to multiple sensitive values, but they have not ...
Flexible adversary disclosure risk measure for identity and attribute disclosure attacks
AbstractIndividuals generate tremendous amount of personal data each day, with a wide variety of uses. This datum often contains sensitive information about individuals, which can be disclosed by “adversaries”. Even when direct identifiers such as social ...
Comments
Information & Contributors
Information
Published In

- General Chair:
- Dengguo Feng,
- Program Chairs:
- David Basin,
- Peng Liu
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 257Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in