k-Anonymous data collection

نویسندگان

  • Sheng Zhong
  • Zhiqiang Yang
  • Tingting Chen
چکیده

Article history: Received 12 October 2007 Received in revised form 6 April 2009 Accepted 2 May 2009

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Measurement invariance tests of the Impression Management sub-scale of the Balanced Inventory of Desirable Responding

The Impression Management (IM) subscale of the Balanced Inventory of Desirable Responding (Paulhus, 1988) has been used as a proxy for common method variance in anonymous settings and as a cause of faking on personality testing in confidential settings. This study uses confirmatory factor analysis to conduct measurement invariance/equivalence tests (also known as multiple group analysis) on the...

متن کامل

Using Clustering Approach Privacy Preserving Update to Anonymous and Confidential Databases

In order to update k-anonymous and confidential database, the suppression based and generalization based updating protocol technique has been proposed. These protocols check whether the database inserted with the new tuple is still k anonymous without knowing the content of the table and database respectively. But these methods will not work if initial database is empty. Also, if the incoming t...

متن کامل

مقایسه نیمرخ شخصیتی معتادان گمنام و غیر گمنام زندانی مرد

Aim: This study compared the personality profiles of inmate anonymous and non-anonymous male addicts. Method: The participants of study were anonymous and non-anonymous male addicts of the prisons of the Hamadan province in 1391. The population was 3130 addicts, including 627 anonymous and 2503 non-anonymous addicts. The 310 addicts were selected by stratified random sampling the sample size wa...

متن کامل

k -Anonymous Data Mining: A Survey

Data mining technology has attracted significant interest as a means of identifying patterns and trends from large collections of data. It is however evident that the collection and analysis of data that include personal information may violate the privacy of the individuals to whom information refers. Privacy protection in data mining is then becoming a crucial issue that has captured the atte...

متن کامل

Generalization-Based Privacy-Preserving Data Collection

In privacy-preserving data mining, there is a need to consider on-line data collection applications in a client-server-to-user (CS2U) model, in which a trusted server can help clients create and disseminate anonymous data. Existing privacy-preserving data publishing (PPDP) and privacy-preserving data collection (PPDC) methods do not sufficiently address the needs of these applications. In this ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Inf. Sci.

دوره 179  شماره 

صفحات  -

تاریخ انتشار 2009