Towards a Privacy Diagnosis Centre : Measuring k-anonymity
Most of the recent efforts addressing the issue of privacy have focused on devising algorithms for the anonymization and diversification of data.
| Main Authors: | Mirakabad, Mohammad Reza Zare, Jantan, Aman, Bressan, Stephane |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/24985/ http://eprints.usm.my/24985/1/Towards_a_Privacy_Diagnosis_Centre_Measuring_A_anonymity.pdf |
Similar Items
A Framework For Privacy Diagnosis And
Preservation In Data Publishing
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Toward Pure Componentware
by: Alhazbi, Saleh, et al.
Published: (2007)
by: Alhazbi, Saleh, et al.
Published: (2007)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
A Privacy Framework And Guidelines For Psychiatric Behavioural Monitoring System
by: Ramli, Rusyaizila
Published: (2016)
by: Ramli, Rusyaizila
Published: (2016)
Privacy Preservation Model For Data Exposure In Android Smartphone Usage
by: Abu Bakar, Anizah
Published: (2021)
by: Abu Bakar, Anizah
Published: (2021)
Dependencies Management in Dynamically Updateable Component-Based System.
by: Alhazbi, Saleh, et al.
Published: (2007)
by: Alhazbi, Saleh, et al.
Published: (2007)
Determining The Black-Box Component's Failure.
by: Hilal, Ibrahim, et al.
Published: (2007)
by: Hilal, Ibrahim, et al.
Published: (2007)
Protocol Based Interaction in Component-Based Software Systems.
by: Alhazbi, Saleh, et al.
Published: (2007)
by: Alhazbi, Saleh, et al.
Published: (2007)
Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM based Intrusion Detection Sensors
by: Jazzar, Mahmoud, et al.
by: Jazzar, Mahmoud, et al.
The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism
by: Ibrahim, Ayman Khallel
Published: (2020)
by: Ibrahim, Ayman Khallel
Published: (2020)
Cancer Patient Portal : Investigating Users' Willingness To Publish From The Privacy Perspective
by: Chan, Hoon Hong
Published: (2009)
by: Chan, Hoon Hong
Published: (2009)
Collaborative healthcare information systems in privacy preservation based on K-anonymization model / Asmaa Hatem Rashid
by: Rashid, Asmaa Hatem
Published: (2014)
by: Rashid, Asmaa Hatem
Published: (2014)
Image Encrytion Using Block Based Transformation Algorithm
by: Bani Younes, Mohammad Ali, et al.
Published: (2008)
by: Bani Younes, Mohammad Ali, et al.
Published: (2008)
"To Tell Or Not To Tell?" : Incorporating Disclosure And Privacy Requirements In Web Portal Design For Malaysian Cancer Patients.
by: Zakaria, Nasriah
Published: (2007)
by: Zakaria, Nasriah
Published: (2007)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Privacy in the Converged Communications Platform
by: Gita, Radhakrishna
Published: (2008)
by: Gita, Radhakrishna
Published: (2008)
Accurate and reliable diagnosis and classification using probabilistic ensemble simplified fuzzy ARTMAP
by: Loo, C.K., et al.
Published: (2005)
by: Loo, C.K., et al.
Published: (2005)
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020)
by: Thamer, Khalil Esmeel
Published: (2020)
k-Resilient Identity-Based Encryption in the Standard Model
by: HENG, S.-H.
Published: (2006)
by: HENG, S.-H.
Published: (2006)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Smartal (Student Management Portal): Functional Requirement Analysis To Develop The English Language Diagnosis Module.
by: Rajamanicam, Roshini
Published: (2010)
by: Rajamanicam, Roshini
Published: (2010)
Autonomous and deterministic probabilistic neural network using global k-means
by: Chang, Roy Kwang Yang, et al.
Published: (2006)
by: Chang, Roy Kwang Yang, et al.
Published: (2006)
Adaptive Case Based Reasoning for Fault Diagnosis
by: Pang, Shen Yee, et al.
Published: (2009)
by: Pang, Shen Yee, et al.
Published: (2009)
Rule Learning and Extraction Using a Hybrid Neural Network: A Case Study on Fault Detection and Diagnosis
by: Tan, Shing Chiang, et al.
Published: (2005)
by: Tan, Shing Chiang, et al.
Published: (2005)
Theoretic evidence k-nearest neighbourhood classifiers in a bimodal biometric verification system
by: Jin, , ATB, et al.
Published: (2003)
by: Jin, , ATB, et al.
Published: (2003)
Machinery fault diagnosis using advanced correlation filters
by: Loo, C. K., et al.
Published: (2007)
by: Loo, C. K., et al.
Published: (2007)
Machinery fault diagnosis using advanced correlation filters
by: Loo, C. K., et al.
Published: (2007)
by: Loo, C. K., et al.
Published: (2007)
A Systematic Design Method For Modeling
Complex Processes And Interactions
In Web Hypermedia Applications
by: Jantan, Azrul Hazri
Published: (2009)
by: Jantan, Azrul Hazri
Published: (2009)
An Improved K-Nearest Neighbors Approach Using Modified Term Weighting And Similarity Coefficient For Text Classification
by: Kadhim, Ammar Ismael
Published: (2016)
by: Kadhim, Ammar Ismael
Published: (2016)
A conceptual anonymity model to ensure privacy for sensitive network data
by: Arafat, N.H.M., et al.
Published: (2021)
by: Arafat, N.H.M., et al.
Published: (2021)
Morphology approach for features extraction in retinal images for diabetic retionopathy diagnosis
by: Abdurrazaq, Ibrahim, et al.
Published: (2008)
by: Abdurrazaq, Ibrahim, et al.
Published: (2008)
On the optimal alpha-k curve of the sample myriad
by: Lim, Heng Siong, et al.
Published: (2007)
by: Lim, Heng Siong, et al.
Published: (2007)
A Hybrid Method For K-Anonymization Using Clustering Technique
by: Abd.Rahim, Y, et al.
Published: (2011)
by: Abd.Rahim, Y, et al.
Published: (2011)
Aesthetic measures for assessing graphic screens
by: Chek, David Ling Ngo, et al.
Published: (2000)
by: Chek, David Ling Ngo, et al.
Published: (2000)
Measuring the aesthetic elements of screen designs
by: Ngo, D
Published: (2001)
by: Ngo, D
Published: (2001)
Criteria for measuring KM performance outcomes in organisations
by: Chong, Siong Choy, et al.
Published: (2006)
by: Chong, Siong Choy, et al.
Published: (2006)
Design Processes For Web-Based Hypermedia Engineering.
by: Jantan, Azrul Hazri, et al.
Published: (2007)
by: Jantan, Azrul Hazri, et al.
Published: (2007)
Similar Items
-
A Framework For Privacy Diagnosis And
Preservation In Data Publishing
by: Mirakabad, Mohammad Reza Zare
Published: (2010) -
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004) -
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005) -
Toward Pure Componentware
by: Alhazbi, Saleh, et al.
Published: (2007) -
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)