Filters








3 Hits in 2.4 sec

FF-Anonymity: When Quasi-identifiers Are Missing

Ke Wang, Yabo Xu, Ada W. C. Fu, Raymond C. W. Wong
2009 Proceedings / International Conference on Data Engineering  
This assumption does not hold when an attribute has both sensitive values and identifying values, which is typically the case.  ...  Existing approaches on privacy-preserving data publishing rely on the assumption that data can be divided into quasi-identifier attributes (QI) and sensitive attribute (SA).  ...  Problem II: find a minimal FF-anonymization T * , that is, no specialization on T * leads to an FF-anonymization.  ... 
doi:10.1109/icde.2009.184 dblp:conf/icde/WangXFW09 fatcat:w2fvjfgtq5f2ho2hhh5hskatoe

Proceedings of the Forty-Sixth Annual Meeting of the American Philological Association Held at Haverford, Pa., December, 1914 Also of the May and November Meetings of the Philological Association of the Pacific Coast Held Respectively at Seattle, Washington, and San Francisco, California 1914

1914 Transactions and Proceedings of the American Philological Association  
Menander, Quintilian's judgment of: 141 ff.; anonymous Greek critic of: 143 f.; Epitrepontes, arbitration scene, rhetorical studies in: 141 ff.; preliminiaries of arbitration: I56 ff.; speech of Davus:  ...  Persian when medial in a different manner than when initial where the pronunciation is clearly shown in the cuneiform syllabary, e.g. Ar/axfaOra, ar/a, Av.. tr;4a, + xSaOra; cf.  ...  Volumes v, vi, and vii are out of print. A charge of fifty cents each is made for the Index of Authors and Index of Subjects to Vols. i-xx, to Vols. xxi-xxx, and to Vols. XXXI-XL.  ... 
doi:10.2307/282695 fatcat:5bvivz25lfhhrohrjid56dcqdy

Privacy-preserving data publishing

Benjamin C. M. Fung, Ke Wang, Rui Chen, Philip S. Yu
2010 ACM Computing Surveys  
FF-Anonymity. All previous work assumes that the data table can be divided into quasi-identifying (QID) attributes and sensitive attributes.  ...  Yet, this assumption does not hold when an attribute contains both sensitive values and quasi-identifying values.  ... 
doi:10.1145/1749603.1749605 fatcat:ivbwule7bjafvmdvh236gbwryu