Author:
Adusumalli Sri Krishna,Valli Kumari V.
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. HIPAA: Health Insurance Portability and Accountability Act (2002),
http://www.hhs.gov/ocr/hipaa
2. Sweeney, L.: k-anonymity: A Model for Protecting Privacy. International Journal on Uncertainty. Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)
3. Machanavajjhala, A., Gehrke, J., Kifer, D.: l-Diversity: Privacy beyond k-Anonymity. In: Proceedings of the IEEE ICDE, p. 24 (2006)
4. Wong, R.C., Li, J., Fu, A.W., Wang, K.: (α, k)-Anonymity: An Enhanced k-Anonymity Model for Privacy-Preserving Data Publishing. In: Proceedings of the SIGKDD (2006)
5. Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In: Proceedings of the IEEE ICDE, pp. 106–115 (2007)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Advanced methods for generalizing time and duration during dataset anonymization;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. Impact of Data Pre‐Processing in Information Retrieval for Data Analytics;Machine Intelligence, Big Data Analytics, and IoT in Image Processing;2023-02-10
3. A clustering approach to anonymize locations during dataset de-identification;The 16th International Conference on Availability, Reliability and Security;2021-08-17
4. Sensitivity Context-Aware PrivacyPreserving Sentiment Analysis;Intelligent Manufacturing and Energy Sustainability;2021