KAMP:Preserving k-anonymity for Combinations of Patterns
碩士 === 國立中興大學 === 電機工程學系所 === 101 === As huge data are increasingly generated and accumulated, outsourcing data for storage, management, and knowledge discovery is becoming a paradigm. However, given that a lot of sensitive information and valuable knowledge are hidden in data, the outsourcing of da...
Main Authors: | Chia-Hao Hsu, 許家豪 |
---|---|
Other Authors: | 蔡曉萍 |
Format: | Others |
Language: | zh-TW |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/6h6s7y |
Similar Items
-
Pattern-Guided k-Anonymity
by: Rolf Niedermeier, et al.
Published: (2013-10-01) -
Privacy Preservation of k-Anonymity Based on Decision Tree
by: Teng-Wei Yang, et al.
Published: (2012) -
The K-Anonymization Method Satisfying Personalized Privacy Preservation
by: J.L. Song, et al.
Published: (2015-12-01) -
Comparative study of k-anonymity algorithms for privacy preserving datamining
by: Abd. Elrahman, Osman Abbas Elsheikh Idris
Published: (2013) -
A Tree Based (m,k)-Anonymity Privacy Preserving Technique For Tabular Data
by: Hsu-Heng Chou, et al.
Published: (2019)