|
Table of contents
Volume 5, Issue 2, August 2012
|
Theoretical Results on De-Anonymization via Linkage Attacks
Martin M. Merener
Transactions on Data Privacy 5:2 (2012) 377 - 402
Abstract, PDF
|
Comparison of Remote Analysis with Statistical Disclosure Control for Protecting the Confidentiality of Business Data
Christine M. O'Keefe, Natalie Shlomo
Transactions on Data Privacy 5:2 (2012) 403 - 432
Abstract, PDF
|
A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining
Hongwei Tian, Weining Zhang, Shouhuai Xu, Patrick Sharkey
Transactions on Data Privacy 5:2 (2012) 433 - 467
Abstract, PDF
|
An Enhanced Utility-Driven Data Anonymization Method
Stuart Morton, Malika Mahoui, P. Joseph Gibson, Saidaiah Yechuri
Transactions on Data Privacy 5:2 (2012) 469 - 503
Abstract, PDF
|