On computational anonymity

作者: Klara Stokes

DOI: 10.1007/978-3-642-33627-0_26

关键词: Table (database)Computer scienceComputer securityInformation privacyAnonymityAdversaryConfidentialityRelaxation (approximation)Theoretical computer science

摘要: The concern of data privacy is to mask so that they can be transferred untrusted third parties without leaking confidential individual information. In this work we distinguish between theoretical anonymity and computational anonymity. We present a relaxation k-anonymity, called (k,l)-anonymity, which makes sense when it assumed the knowledge an adversary limited. (k,l)-Anonymity also regarded as quantification in terms adversary's limitations. Combinatorics, or more precisely, hypergraphs, are used represent relations (k,l)-anonymous table. Finally, algorithm for (k,l)-anonymization tables.

参考文章(1)
Universitat Rovira i Virgili, Universitat Rovira i Virgili Dalian University of Technology Press. pp. 66- 81 ,(2013)