Browsing by Subject "k-anonymity"
Now showing items 1-4 of 4
Open AccessMicroaggregation is one of the most commonly employed microdata protection methods. The basic idea of microaggregation is to anonymize data by aggregating original records into small groups of at least k elements and, ...
(Springer Verlag, 2008)
Restricted access - publisher's policyMicroaggregation is one of the most commonly employed microdata protection methods. This method builds clusters of at least k original records and replaces the records in each cluster with the centroid of the cluster. ...
Incremental k-Anonymous microaggregation in large-scale electronic surveys with optimized scheduling (Institute of Electrical and Electronics Engineers (IEEE), 2018-10-15)
Open AccessImprovements in technology have led to enormous volumes of detailed personal information made available for any number of statistical studies. This has stimulated the need for anonymization techniques striving to attain a ...
Mathematically optimized, recursive prepartitioning strategies for k-anonymous microaggregation of large-scale datasets (2019-11-11)
Restricted access - publisher's policyThe technical contents of this work fall within the statistical disclosure control (SDC) field, which concerns the postprocessing of the demographic portion of the statistical results of surveys containing sensitive personal ...