A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is
This assumption does not hold when an attribute has both sensitive values and identifying values, which is typically the case. ... Existing approaches on privacy-preserving data publishing rely on the assumption that data can be divided into quasi-identifier attributes (QI) and sensitive attribute (SA). ... Problem II: find a minimal FF-anonymization T * , that is, no specialization on T * leads to an FF-anonymization. ...doi:10.1109/icde.2009.184 dblp:conf/icde/WangXFW09 fatcat:w2fvjfgtq5f2ho2hhh5hskatoe
Menander, Quintilian's judgment of: 141 ff.; anonymous Greek critic of: 143 f.; Epitrepontes, arbitration scene, rhetorical studies in: 141 ff.; preliminiaries of arbitration: I56 ff.; speech of Davus: ... Persian when medial in a different manner than when initial where the pronunciation is clearly shown in the cuneiform syllabary, e.g. Ar/axfaOra, ar/a, Av.. tr;4a, + xSaOra; cf. ... Volumes v, vi, and vii are out of print. A charge of fifty cents each is made for the Index of Authors and Index of Subjects to Vols. i-xx, to Vols. xxi-xxx, and to Vols. XXXI-XL. ...doi:10.2307/282695 fatcat:5bvivz25lfhhrohrjid56dcqdy
FF-Anonymity. All previous work assumes that the data table can be divided into quasi-identifying (QID) attributes and sensitive attributes. ... Yet, this assumption does not hold when an attribute contains both sensitive values and quasi-identifying values. ...doi:10.1145/1749603.1749605 fatcat:ivbwule7bjafvmdvh236gbwryu