|
Table of contents
Volume 6, Issue 1, April 2013
|
Achieving k-anonymity Using Improved Greedy Heuristics for Very Large Relational Databases
Korra Sathya Babu, Nithin Reddy, Nitesh Kumar, Mark Elliot, Sanjay Kumar Jena
Transactions on Data Privacy 6:1 (2013) 1 - 17
Abstract, PDF
|
Differential-Private Data Publishing Through Component Analysis
Xiaoqian Jiang, Zhanglong Ji, Shuang Wang, Noman Mohammed, Samuel Cheng, Lucila Ohno-Machado
Transactions on Data Privacy 6:1 (2013) 19 - 34
Abstract, PDF
|
Practicing Differential Privacy in Health Care: A Review
Fida K. Dankar, Khaled El Emam
Transactions on Data Privacy 6:1 (2013) 35 - 67
Abstract, PDF
|
Privacy Preserving Distributed DBSCAN
Clustering
Jinfei Liu, Li Xiong, Jun Luo, Joshua Zhexue Huang
Transactions on Data Privacy 6:1 (2013) 69 - 85
Abstract, PDF
|
Preserving Privacy for Interesting Location Pattern Mining from Trajectory Data
Shen-Shyang Ho, Shuhua Ruan
Transactions on Data Privacy 6:1 (2013) 87 - 106
Abstract, PDF
|
Top Location Anonymization for Geosocial Network Datasets
Amirreza Masoumzadeh, James Joshi
Transactions on Data Privacy 6:1 (2013) 107 - 126
Abstract, PDF
|