Have decided to do research and implementation on "Mondrian Multidimensional K-Anonymity" algorithm. I just hope the algorithm can be formulated with reasonable amount of effort.
Inproceedings (DBLP:conf/icde/LeFevreDR06)
LeFevre, K.; DeWitt, D. J. & Ramakrishnan, R.
Liu, L.; Reuter, A.; Whang, K.-Y. & Zhang, J. (ed.)
Mondrian Multidimensional K-Anonymity
IEEE Computer Society, 2006, 25
Access: [IEEE] [pdf]
Computer, Technology, Databases, Google, Internet, Mobile, Linux, Microsoft, Open Source, Security, Social Media, Web Development, Business, Finance
Subscribe to:
Post Comments (Atom)
Popular Posts
-
Robocopy, short for "Robust File Copy" is an advanced command-line utility included in Windows. It's designed to copy files an...
-
I would like to apologize that sigining of my guestbook is not possible at the moment due to an unexpected bug. There is already 74 entries ...
-
Installed FortiClient recently but the challenge in disabling the application/service from running automatically on every start-up annoyed m...
-
*********** Try to sleep now, close your eyes Soon the birds would stop singing Twinkling stars, are shining bright They'll be watch...
-
Singapore’s Land Transport Authority has just released an updated official MRT map including seven new stations on the Thomson-East Coast Li...
Hello, Do you have the implementation of Mondrian algorithm ?
ReplyDelete