Have decided to do research and implementation on "Mondrian Multidimensional K-Anonymity" algorithm. I just hope the algorithm can be formulated with reasonable amount of effort.
Inproceedings (DBLP:conf/icde/LeFevreDR06)
LeFevre, K.; DeWitt, D. J. & Ramakrishnan, R.
Liu, L.; Reuter, A.; Whang, K.-Y. & Zhang, J. (ed.)
Mondrian Multidimensional K-Anonymity
IEEE Computer Society, 2006, 25
Access: [IEEE] [pdf]
Computer, Technology, Databases, Google, Internet, Mobile, Linux, Microsoft, Open Source, Security, Social Media, Web Development, Business, Finance
Subscribe to:
Post Comments (Atom)
Popular Posts
-
新加坡人口400万,亚洲人口4亿,全世界人口6亿。 但是,我一人可能就很有可能是世界最傻的了。我真是个不折不扣的大木头。真是受不了自己。
-
I recently wrote a code snippet to fill arrays with a value. The below method is a generic method that will accept different data types. Hop...
-
If you are working with PowerShell and need a fast way to list all files in a directory, including those buried in subfolders, this one-line...
-
I was at Bugis Junction today and saw 蘇打綠 (Soda Green) performing. They look so much different especially the lead singer. I find their song...
-
*********** Try to sleep now, close your eyes Soon the birds would stop singing Twinkling stars, are shining bright They'll be watch...
Hello, Do you have the implementation of Mondrian algorithm ?
ReplyDelete