Privacy-preserving data publishing: A survey of recent developments

BCM Fung, K Wang, R Chen, PS Yu - ACM Computing Surveys (Csur), 2010 - dl.acm.org
The collection of digital information by governments, corporations, and individuals has
created tremendous opportunities for knowledge-and information-based decision making …

[HTML][HTML] A survey of privacy-preserving mechanisms for heterogeneous data types

M Cunha, R Mendes, JP Vilela - Computer science review, 2021 - Elsevier
Due to the pervasiveness of always connected devices, large amounts of heterogeneous
data are continuously being collected. Beyond the benefits that accrue for the users, there …

[PDF][PDF] 面向数据库应用的隐私保护研究综述

周水庚, 李丰, 陶宇飞, 肖小奎 - 计算机学报, 2009 - cjc.ict.ac.cn
摘要随着数据挖掘和数据发布等数据库应用的出现与发展, 如何保护隐私数据和防止敏感信息
泄露成为当前面临的重大挑战. 隐私保护技术需要在保护数据隐私的同时不影响数据应用 …

A taxonomy of privacy-preserving record linkage techniques

D Vatsalan, P Christen, VS Verykios - Information Systems, 2013 - Elsevier
The process of identifying which records in two or more databases correspond to the same
entity is an important aspect of data quality activities such as data pre-processing and data …

A scalable two-phase top-down specialization approach for data anonymization using mapreduce on cloud

X Zhang, LT Yang, C Liu, J Chen - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
A large number of cloud services require users to share private data like electronic health
records for data analysis or mining, bringing privacy concerns. Anonymizing data sets via …

Privacy in internet of things: From principles to technologies

C Li, B Palanisamy - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Ubiquitous deployment of low-cost smart devices and widespread use of high-speed
wireless networks have led to the rapid development of the Internet of Things (IoT). IoT …

[图书][B] Introduction to privacy-preserving data publishing: Concepts and techniques

BCM Fung, K Wang, AWC Fu, SY Philip - 2010 - taylorfrancis.com
Gaining access to high-quality data is a vital necessity in knowledge-based decision
making. But data in its raw form often contains sensitive information about individuals …

Centralized and distributed anonymization for high-dimensional healthcare data

N Mohammed, BCM Fung, PCK Hung… - ACM Transactions on …, 2010 - dl.acm.org
Sharing healthcare data has become a vital requirement in healthcare system management;
however, inappropriate sharing and usage of healthcare data could threaten patients' …

Multirelational k-anonymity

ME Nergiz, C Clifton, AE Nergiz - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
k-Anonymity protects privacy by ensuring that data cannot be linked to a single individual. In
a k-anonymous data set, any identifying information occurs in at least k tuples. Much …

Thoughts on k-anonymization

ME Nergiz, C Clifton - Data & Knowledge Engineering, 2007 - Elsevier
k-Anonymity is a method for providing privacy protection by ensuring that data cannot be
traced to an individual. In a k-anonymous dataset, any identifying information occurs in at …