To see the other types of publications on this topic, follow the link: K-Anonymisation.

Journal articles on the topic 'K-Anonymisation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 26 journal articles for your research on the topic 'K-Anonymisation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Loukides, Grigorios, and Jian-Hua Shao. "An Efficient Clustering Algorithm for k-Anonymisation." Journal of Computer Science and Technology 23, no. 2 (2008): 188–202. http://dx.doi.org/10.1007/s11390-008-9121-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Natwichai, Juggapong, Xue Li, and Asanee Kawtrkul. "Incremental processing and indexing for (k, e)-anonymisation." International Journal of Information and Computer Security 5, no. 3 (2013): 151. http://dx.doi.org/10.1504/ijics.2013.055836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stark, Konrad, Johann Eder, and Kurt Zatloukal. "Achieving k-anonymity in DataMarts used for gene expressions exploitation." Journal of Integrative Bioinformatics 4, no. 1 (2007): 132–44. http://dx.doi.org/10.1515/jib-2007-58.

Full text
Abstract:
Abstract Gene expression profiling is a sophisticated method to discover differences in activation patterns of genes between different patient collectives. By reasonably defining patient groups from a medical point of view, subsequent gene expression analysis may reveal disease-related gene expression patterns that are applicable for tumor markers and pharmacological target identification. When releasing patient-specific data for medical studies privacy protection has to be guaranteed for ethical and legal reasons. k-anonymisation may be used to generate a sufficient number of k data twins in
APA, Harvard, Vancouver, ISO, and other styles
4

de Haro-Olmo, Francisco José, Ángel Jesús Varela-Vaca, and José Antonio Álvarez-Bermejo. "Blockchain from the Perspective of Privacy and Anonymisation: A Systematic Literature Review." Sensors 20, no. 24 (2020): 7171. http://dx.doi.org/10.3390/s20247171.

Full text
Abstract:
The research presented aims to investigate the relationship between privacy and anonymisation in blockchain technologies on different fields of application. The study is carried out through a systematic literature review in different databases, obtaining in a first phase of selection 199 publications, of which 28 were selected for data extraction. The results obtained provide a strong relationship between privacy and anonymisation in most of the fields of application of blockchain, as well as a description of the techniques used for this purpose, such as Ring Signature, homomorphic encryption,
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Yuliang, Tinghuai Ma, Jie Cao, and Meili Tang. "K-anonymisation of social network by vertex and edge modification." International Journal of Embedded Systems 8, no. 2/3 (2016): 206. http://dx.doi.org/10.1504/ijes.2016.076114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sahil bucha. "Balancing Privacy and Utility: Anonymisation Techniques for E-commerce Logistics Data." International Journal of Engineering Research and Science & Technology 17, no. 2 (2021): 65–75. https://doi.org/10.62643/ijerst.v17n2pp.65-75.

Full text
Abstract:
The study analyses the application of anonymisation techniques in e-commerce logistics, focusing on methods such as differential privacy, k-anonymity, and synthetic data generation. The growing concerns over data privacy have prompted organisations in the matter of adopting techniques to protect the sensitive information of customers while maintaining data utility for analytical purposes. The case studies highlight real-world applications, like the use of differential privacy to enhance delivery route optimisation, synthetic data to improve inventory forecasting, and k-anonymity for protecting
APA, Harvard, Vancouver, ISO, and other styles
7

Ganabathi, G. Chitra, and P. Uma Maheswari. "Efficient clustering technique for k-anonymisation with aid of optimal KFCM." International Journal of Business Intelligence and Data Mining 15, no. 4 (2019): 430. http://dx.doi.org/10.1504/ijbidm.2019.102809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Amardeep, Monika Singh, Divya Bansal, and Sanjeev Sofat. "Optimised K-anonymisation technique to deal with mutual friends and degree attacks." International Journal of Information and Computer Security 14, no. 3/4 (2021): 281. http://dx.doi.org/10.1504/ijics.2021.114706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sofat, Sanjeev, Divya Bansal, Monika Singh, and Amardeep Singh. "Optimised K-anonymisation technique to deal with mutual friends and degree attacks." International Journal of Information and Computer Security 14, no. 3/4 (2021): 281. http://dx.doi.org/10.1504/ijics.2021.10037248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yaji, Sharath, and B. Neelima. "Parallel computing for preserving privacy using k-anonymisation algorithms from big data." International Journal of Big Data Intelligence 5, no. 3 (2018): 191. http://dx.doi.org/10.1504/ijbdi.2018.092659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Yaji, Sharath, and B. Neelima.B. "Parallel computing for preserving privacy using k-anonymisation algorithms from big data." International Journal of Big Data Intelligence 5, no. 3 (2018): 191. http://dx.doi.org/10.1504/ijbdi.2018.10008733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Nguyen, Benjamin. "Techniques d’anonymisation." Statistique et société 2, no. 4 (2014): 43–50. https://doi.org/10.3406/staso.2014.933.

Full text
Abstract:
L’opposition entre une donnée qui permet d’identifier une personne et une donnée anonyme n’est pas une opposition absolue. C’est pourquoi il existe plusieurs méthodes d’anonymisation, plus ou moins efficaces. On utilise souvent aujourd’hui la « k-anonymisation » , la « l-diversité » , ou la «confidentialité différentielle », trois techniques dont les principes sont donnés dans cet article. Les différentes techniques sont à juger à la fois sur la sécurité qu’elles procurent, et sur ce qu’elles laissent subsister comme analyses possibles.
APA, Harvard, Vancouver, ISO, and other styles
13

Matet, Benoit, Angelo Furno, Marco Fiore, Etienne Côme, and Latifa Oukhellou. "Adaptative generalisation over a value hierarchy for the k-anonymisation of Origin–Destination matrices." Transportation Research Part C: Emerging Technologies 154 (September 2023): 104236. http://dx.doi.org/10.1016/j.trc.2023.104236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Solanki, Paresh, Sanjay Garg, and Hitesh Chhinkaniwala. "Heuristic-based hybrid privacy-preserving data stream mining approach using SD-perturbation and multi-iterative k-anonymisation." International Journal of Knowledge Engineering and Data Mining 5, no. 4 (2018): 306. http://dx.doi.org/10.1504/ijkedm.2018.095522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Madan, Suman, and Puneet Goswami. "A privacy preservation model for big data in map-reduced framework based on k-anonymisation and swarm-based algorithms." International Journal of Intelligent Engineering Informatics 8, no. 1 (2020): 38. http://dx.doi.org/10.1504/ijiei.2020.10027094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Madan, Suman, and Puneet Goswami. "A privacy preservation model for big data in map-reduced framework based on k-anonymisation and swarm-based algorithms." International Journal of Intelligent Engineering Informatics 8, no. 1 (2020): 38. http://dx.doi.org/10.1504/ijiei.2020.105433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Bartholomäus, Sebastian, Yannik Siegert, Hans Werner Hense, and Oliver Heidinger. "Secure Linking of Data from Population-Based Cancer Registries with Healthcare Data to Evaluate Screening Programs." Das Gesundheitswesen 82, S 02 (2019): S131—S138. http://dx.doi.org/10.1055/a-1031-9526.

Full text
Abstract:
Abstract Background The evaluation of population-based screening programs, like the German Mammography Screening Program (MSP), requires collection and linking data from population-based cancer registries and other sources of the healthcare system on a case- specific level. To link such sensitive data, we developed a method that is compliant with German data protection regulations and does not require written individual consent. Methods Our method combines a probabilistic record linkage on encrypted identifying data with ‘blinded anonymisation’. It ensures that all data either are encrypted or
APA, Harvard, Vancouver, ISO, and other styles
18

Mauw, Sjouke, Yunior Ramírez-Cruz, and Rolando Trujillo-Rasua. "Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation." Knowledge and Information Systems 64, no. 4 (2022): 1077–100. http://dx.doi.org/10.1007/s10115-022-01662-z.

Full text
Abstract:
AbstractActive re-identification attacks constitute a serious threat to privacy-preserving social graph publication, because of the ability of active adversaries to leverage fake accounts, a.k.a. sybil nodes, to enforce structural patterns that can be used to re-identify their victims on anonymised graphs. Several formal privacy properties have been enunciated with the purpose of characterising the resistance of a graph against active attacks. However, anonymisation methods devised on the basis of these properties have so far been able to address only restricted special cases, where the advers
APA, Harvard, Vancouver, ISO, and other styles
19

Matet, Benoit, Angelo Furno, Marco Fiore, Etienne Come, and Latifa Oukhellou. "Adaptative Generalisation Over a Value Hierarchy for the K-Anonymisation of Origin-Destination Matrices." SSRN Electronic Journal, 2022. http://dx.doi.org/10.2139/ssrn.4273504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Almeida, João Rafael, João Paulo Barraca, and José Luís Oliveira. "Preserving Privacy when Querying OMOP CDM Databases." Studies in Health Technology and Informatics, July 1, 2022. https://doi.org/10.3233/SHTI220930.

Full text
Abstract:
Anonymisation is currently one of the biggest challenges when sharing sensitive personal information. Its importance depends largely on the application domain, but when dealing with health information, this becomes a more serious issue. A simpler approach to avoid inadequate disclosure is to ensure that all data that can be associated directly with an individual is removed from the original dataset. However, some studies have shown that simple anonymisation procedures can sometimes be reverted using specific patients’ characteristics. In this work, we propose a secure architecture to sha
APA, Harvard, Vancouver, ISO, and other styles
21

Ren, Wang, Xin Tong, Jing Du, et al. "Privacy Enhancing Techniques in the Internet of Things Using Data Anonymisation." Information Systems Frontiers, May 11, 2021. http://dx.doi.org/10.1007/s10796-021-10116-w.

Full text
Abstract:
AbstractThe Internet of Things (IoT) and Industrial 4.0 bring enormous potential benefits by enabling highly customised services and applications, which create huge volume and variety of data. However, preserving the privacy in IoT and Industrial 4.0 against re-identification attacks is very challenging. In this work, we considered three main data types generated in IoT: context data, continuous data, and media data. We first proposed a stream data anonymisation method based on k-anonymity for data collected by IoT devices; and then privacy enhancing techniques for both continuous data and med
APA, Harvard, Vancouver, ISO, and other styles
22

Antonio, Landi, Capparelli Esperanza Patricia Francesco, Finocchiaro Giulia, Pini Sofia, and PCP PREVENT. "Anonymisation and Pseudonymisation as Solutions for the Protection of Personal Data (PREVENT PCP project)." Diritto, Economia e Tecnologie della Privacy" January 2024 (January 12, 2024). https://doi.org/10.5281/zenodo.14184904.

Full text
Abstract:
This article, focused on the intricacies of anonymisation and pseudonymisation as pivotal techniques for personal data protection within the framework of the General Data Protection Regulation (GDPR), was developed in the context of the PREVENT PCP project which is based on the Pre-Commercial Procurement (PCP) approach. This EU-funded initiative, as a collaborative effort aimed at developing new innovative technologies for early detection and tracking of unattended items in public spaces safeguarding public safety using among others video surveillance techniques, has been instrumental in shapi
APA, Harvard, Vancouver, ISO, and other styles
23

"Preservation of Privacy using Multidimensional K-Anonymity Method for Non-Relational Data." International Journal of Recent Technology and Engineering 8, no. 2S10 (2019): 544–47. http://dx.doi.org/10.35940/ijrte.b1096.0982s1019.

Full text
Abstract:
Mining of huge data having complexity is a challenging issue also maintaining Privacy of data is also equally important ,sometimes there is a need to release data for use of researchers or for the purpose of gaining knowledge or earn money this release of data includes releas e of all attributes of personal data. when this type of data like Insurance record data, Medical diagnosis data, funding scheme data is release even if we remove sensitive attribute like Name for hiding personal details still data re-identification is possible by linking public data like voters data with these released da
APA, Harvard, Vancouver, ISO, and other styles
24

Lu, Yang. "Semantic-based Privacy-preserving Record Linkage." International Journal of Population Data Science 7, no. 3 (2022). http://dx.doi.org/10.23889/ijpds.v7i3.1956.

Full text
Abstract:
IntroductionSharing aggregated electronic health records (EHRs) for integrated health care and public health studies is increasingly demanded. Patient privacy demands that anonymisation procedures are in place for data sharing.
 ObjectiveTraditional methods such as k-anonymity and its derivations are often overgeneralising resulting in lower data accuracy. To tackle this issue, we proposed the Semantic Linkage K-Anonymity (SLKA) approach to balance the privacy and utility preservation through detecting risky combinations hidden in the record linkage releases.
 ApproachK-anonymity pro
APA, Harvard, Vancouver, ISO, and other styles
25

Avraam, Demetris, Elinor Jones, and Paul Burton. "A deterministic approach for protecting privacy in sensitive personal data." BMC Medical Informatics and Decision Making 22, no. 1 (2022). http://dx.doi.org/10.1186/s12911-022-01754-4.

Full text
Abstract:
Abstract Background Data privacy is one of the biggest challenges for any organisation which processes personal data, especially in the area of medical research where data include sensitive information about patients and study participants. Sharing of data is therefore problematic, which is at odds with the principle of open data that is so important to the advancement of society and science. Several statistical methods and computational tools have been developed to help data custodians and analysts overcome this challenge. Methods In this paper, we propose a new deterministic approach for ano
APA, Harvard, Vancouver, ISO, and other styles
26

O’Keefe, Christine M. "Privacy, Governance and Public Acceptability in Population Data Linkage for Research." International Journal of Population Data Science 1, no. 1 (2017). http://dx.doi.org/10.23889/ijpds.v1i1.405.

Full text
Abstract:
ABSTRACT
 IntroductionFor several years, Population Data Linkage initiatives around the world have been successfully linking population‐based administrative and other datasets and making extracts available for research under strong confidentiality protections1. This paper provides an overview of current approaches in a range of scenarios, then outlines current relevant trends and potential implications for population data linkage initiatives.MethodsApproaches to protecting the confidentiality of data in research can also reduce the statistical usefulness, and the trade‐off between confide
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!