作者: Klara Stokes
DOI: 10.1007/978-3-642-33627-0_26
关键词: Table (database) 、 Computer science 、 Computer security 、 Information privacy 、 Anonymity 、 Adversary 、 Confidentiality 、 Relaxation (approximation) 、 Theoretical computer science
摘要: The concern of data privacy is to mask so that they can be transferred untrusted third parties without leaking confidential individual information. In this work we distinguish between theoretical anonymity and computational anonymity. We present a relaxation k-anonymity, called (k,l)-anonymity, which makes sense when it assumed the knowledge an adversary limited. (k,l)-Anonymity also regarded as quantification in terms adversary's limitations. Combinatorics, or more precisely, hypergraphs, are used represent relations (k,l)-anonymous table. Finally, algorithm for (k,l)-anonymization tables.