نتایج جستجو برای: graph anonymization

تعداد نتایج: 199027  

2004
Amund Tveit Ole Edsberg Thomas Brox Røst Arild Faxvaag Øystein Nytrø Torbjørn Nordgård Martin Thorsen Ranang Anders Grimsmo

The Electronic Patient Record (EPR) is both a legal document and a tool for use by physicians and other health personnel during provision of health care. Its primary purpose is to provide and store information about the patient in clinical settings, but it’s also a source of medical knowledge (e.g. epidemiology and quality of care). Due to the sensitive nature of the data they must be handled i...

2017
Vincent Thouvenot Damien Nogues Catherine Gouttas

Digital transformation and Big Data allow the use of highly valuable data. However, these data can be individual or sensitive, and represent an obvious threat for privacy. Anonymization, which achieves a trade-off between data protection and data utility, can be used in this context. There is not global anonymization technique which fits at all applications. Here, we describe a data-driven anon...

2011
E. Boschi B. Trammell

This document describes anonymization techniques for IP flow data and the export of anonymized data using the IP Flow Information Export (IPFIX) protocol. It categorizes common anonymization schemes and defines the parameters needed to describe them. It provides guidelines for the implementation of anonymized data export and storage over IPFIX, and describes an information model and Optionsbase...

2011
David F. Nettleton Diego Sáez-Trumper Vicenç Torra

We consider two distinct types of online social network, the first made up of a log of writes to wall by users in Facebook, and the second consisting of a corpus of emails sent and received in a corporate environment (Enron). We calculate the statistics which describe the topologies of each network represented as a graph. Then we calculate the information loss and risk of disclosure for differe...

2017
Hyukki Lee Soohyung Kim Jong Wook Kim Yon Dohn Chung

BACKGROUND Publishing raw electronic health records (EHRs) may be considered as a breach of the privacy of individuals because they usually contain sensitive information. A common practice for the privacy-preserving data publishing is to anonymize the data before publishing, and thus satisfy privacy models such as k-anonymity. Among various anonymization techniques, generalization is the most c...

Journal: :PVLDB 2015
Ehsan Kazemi Seyed Hamed Hassani Matthias Grossglauser

In many graph–mining problems, two networks from different domains have to be matched. In the absence of reliable node attributes, graph matching has to rely on only the link structures of the two networks, which amounts to a generalization of the classic graph isomorphism problem. Graph matching has applications in social–network reconciliation and de-anonymization, protein–network alignment i...

2012
Muzammil M. Baig Jiuyong Li Jixue Liu Xiaofeng Ding Hua Wang

Data anonymization has become a major technique in privacy preserving data publishing. Many methods have been proposed to anonymize one dataset and a series of datasets of a data holder. However, no method has been proposed for the anonymization scenario of multiple independent data publishing. A data holder publishes a dataset, which contains overlapping population with other datasets publishe...

2006
Gary Kacmarcik Michael Gamon

This paper explores techniques for reducing the effectiveness of standard authorship attribution techniques so that an author A can preserve anonymity for a particular document D. We discuss feature selection and adjustment and show how this information can be fed back to the author to create a new document D’ for which the calculated attribution moves away from A. Since it can be labor intensi...

2009
M. Ercan Nergiz Chris Clifton

Advances in information technology, and its use in research, are increasing both the need for anonymized data and the risks of poor anonymization. [1] presented a new privacy metric, δ-presence, that clearly links the quality of anonymization to the risk posed by inadequate anonymization. It was shown that existing anonymization techniques are inappropriate for situations where δ-presence is a ...

Journal: :PVLDB 2009
Chenyun Dai Gabriel Ghinita Elisa Bertino Ji-Won Byun Ninghui Li

Releasing detailed data (microdata) about individuals poses a privacy threat, due to the presence of quasi-identifier (QID) attributes such as age or zip code. Several privacy paradigms have been proposed that preserve privacy by placing constraints on the value of released QIDs. However, in order to enforce these paradigms, data publishers need tools to assist them in selecting a suitable anon...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید