k-Anonymous data collection
نویسندگان
چکیده
Article history: Received 12 October 2007 Received in revised form 6 April 2009 Accepted 2 May 2009
منابع مشابه
Measurement invariance tests of the Impression Management sub-scale of the Balanced Inventory of Desirable Responding
The Impression Management (IM) subscale of the Balanced Inventory of Desirable Responding (Paulhus, 1988) has been used as a proxy for common method variance in anonymous settings and as a cause of faking on personality testing in confidential settings. This study uses confirmatory factor analysis to conduct measurement invariance/equivalence tests (also known as multiple group analysis) on the...
متن کاملUsing Clustering Approach Privacy Preserving Update to Anonymous and Confidential Databases
In order to update k-anonymous and confidential database, the suppression based and generalization based updating protocol technique has been proposed. These protocols check whether the database inserted with the new tuple is still k anonymous without knowing the content of the table and database respectively. But these methods will not work if initial database is empty. Also, if the incoming t...
متن کاملمقایسه نیمرخ شخصیتی معتادان گمنام و غیر گمنام زندانی مرد
Aim: This study compared the personality profiles of inmate anonymous and non-anonymous male addicts. Method: The participants of study were anonymous and non-anonymous male addicts of the prisons of the Hamadan province in 1391. The population was 3130 addicts, including 627 anonymous and 2503 non-anonymous addicts. The 310 addicts were selected by stratified random sampling the sample size wa...
متن کاملk -Anonymous Data Mining: A Survey
Data mining technology has attracted significant interest as a means of identifying patterns and trends from large collections of data. It is however evident that the collection and analysis of data that include personal information may violate the privacy of the individuals to whom information refers. Privacy protection in data mining is then becoming a crucial issue that has captured the atte...
متن کاملGeneralization-Based Privacy-Preserving Data Collection
In privacy-preserving data mining, there is a need to consider on-line data collection applications in a client-server-to-user (CS2U) model, in which a trusted server can help clients create and disseminate anonymous data. Existing privacy-preserving data publishing (PPDP) and privacy-preserving data collection (PPDC) methods do not sufficiently address the needs of these applications. In this ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Sci.
دوره 179 شماره
صفحات -
تاریخ انتشار 2009