Browsing by Subject "k-anonymity"
Now showing items 1-2 of 2
Open AccessMicroaggregation is one of the most commonly employed microdata protection methods. The basic idea of microaggregation is to anonymize data by aggregating original records into small groups of at least k elements and, ...
(Springer Verlag, 2008)
Restricted access - publisher's policyMicroaggregation is one of the most commonly employed microdata protection methods. This method builds clusters of at least k original records and replaces the records in each cluster with the centroid of the cluster. ...