ログイン
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 学術論文等

Anonymization of Sensitive Quasi-Identifiers for l-diversity and t-closeness

https://uec.repo.nii.ac.jp/records/8922
https://uec.repo.nii.ac.jp/records/8922
5a20c07f-f607-42eb-829a-02c7b7ad1a51
名前 / ファイル ライセンス アクション
1-TDSC.pdf 1-TDSC (4.1 MB)
Item type 学術雑誌論文 / Journal Article(1)
公開日 2019-01-21
タイトル
タイトル Anonymization of Sensitive Quasi-Identifiers for l-diversity and t-closeness
言語 en
言語
言語 eng
キーワード
言語 en
主題 privacy
キーワード
言語 en
主題 data mining
キーワード
言語 en
主題 l-diversity
キーワード
言語 en
主題 t-closeness
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_6501
資源タイプ journal article
著者 Sei, Yuichi

× Sei, Yuichi

en Sei, Yuichi

Search repository
Okumura, Hiroshi

× Okumura, Hiroshi

en Okumura, Hiroshi

Search repository
Takenouchi, Takao

× Takenouchi, Takao

en Takenouchi, Takao

Search repository
Ohsuga, Akihiko

× Ohsuga, Akihiko

en Ohsuga, Akihiko

Search repository
抄録
内容記述タイプ Abstract
内容記述 A number of studies on privacy-preserving data mining have been proposed. Most of them assume that they can separate quasi-identifiers (QIDs) from sensitive attributes. For instance, they assume that address, job, and age are QIDs but are not sensitive attributes and that a disease name is a sensitive attribute but is not a QID. However, all of these attributes can have features that are both sensitive attributes and QIDs in practice. In this paper, we refer to these attributes as sensitive QIDs and we propose novel privacy models, namely, (l1, ..., lq)-diversity and (t1, ..., tq)-closeness, and a method that can treat sensitive QIDs. Our method is composed of two algorithms: an anonymization algorithm and a reconstruction algorithm. The anonymization algorithm, which is conducted by data holders, is simple but effective, whereas the reconstruction algorithm, which is conducted by data analyzers, can be conducted according to each data analyzer’s objective. Our proposed method was experimentally evaluated using real data sets.
書誌情報 en : IEEE Transactions on Dependable and Secure Computing

巻 16, 号 4, p. 580-593, 発行日 2019-07
出版者
出版者 IEEE
ISSN
収録物識別子タイプ ISSN
収録物識別子 1545-5971
DOI
関連タイプ isVersionOf
識別子タイプ DOI
関連識別子 10.1109/TDSC.2017.2698472
権利
権利情報 © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This is not the published version. Please cite only the published version.
関連サイト
識別子タイプ DOI
関連識別子 https://doi.org/10.1109/TDSC.2017.2698472
著者版フラグ
出版タイプ AM
出版タイプResource http://purl.org/coar/version/c_ab4af688f83e57aa
戻る
0
views
See details
Views

Versions

Ver.1 2023-05-15 09:36:04.940806
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR 2.0
  • OAI-PMH JPCOAR 1.0
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3