Lec12a-anonymity4

Lec12a-anonymity4 - - K-anonymity 2 K-minimal...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.edu Spring, 2011 COMP 7370 Advanced Computer and Network Security Generalizing Data to Provide Anonymity when Disclosing Information
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: - K-anonymity 2 K-minimal generalization 3 K-minimal generalization 4 The number of different possible strategies for a domain hierarchy...
View Full Document

Page1 / 4

Lec12a-anonymity4 - - K-anonymity 2 K-minimal...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online