Australian and New Zealand Journal of Public Health 38:6, 548-552.Koenig, Jacob Metcalf, Arvind Narayanan, Alondra Nelson, Frank Pasquale, Fran Lewitter. (2017) Ten simple rules for responsible big data research.A Viewpoint of Security for Digital Health Care in the United States:.Efraimidis. (2015) Versatile Query Scrambling for Private Web Search.Serre, William C. Miller. (2010) Geomasking sensitive health data and privacy protection: an evaluation using an E911 database.
In this paper, k-anonymity notion is adopted to be used in wireless sensor networks (WSN) as a security Framework with two levels of privacy.International Transactions in Operational Research 22:4, 693-712.International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 16:supp01, 121-138.IEEE Transactions on Knowledge and Data Engineering 21:7, 1073-1087.
A k-anonymity privacy-preserving approach in wirelessValli Kumari, Ch. Sarojini. (2012) A Coalitional Game Theoretic Mechanism for Privacy Preserving Publishing Based on k-Anonymity.
k-anonymity and l-diversity approaches for privacyScientific Influence and Impact: k-anonymity was the first formal privacy protection model.
Weber, Andreas Heinemann, Sen-ching Samson Cheung, Jayahsri Chaudhari, Jithendra K. Paruchuri. (2007) Security and Privacy in Pervasive Computing.International Journal of Communication Systems 28:1, 167-186.Valli Kumari. 2011. Attribute Based Anonymity for Preserving Privacy.International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems.Hussain, D. B. Skillicorn. (2010) The case for service provider anonymity.
Transactions of the Institute of Systems, Control and Information Engineers 29:3, 130-135.IEEE Transactions on Wireless Communications 15:2, 1218-1225.The concept of k-anonymity was first introduced by Latanya Sweeney and Pierangela Samarati.IEEE Intelligent Transportation Systems Magazine 8:3, 63-74.Secure Multiparty Computation via Oblivious Polynomial Evaluation.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 20:06, 907-919.International Journal of Software Engineering and Knowledge Engineering 24:07, 1091-1111.
Privacy Enhancing Technologies: A Review - AboutAmelioration of Anonymity Modus Operandi for Privacy Preserving Data Publishing.Concurrency and Computation: Practice and Experience 24:10, 1108-1122.IEEE Transactions on Parallel and Distributed Systems 20:5, 725-739.Radaelli, V. K. Singh, A. S. Pentland. (2015) Unique in the shopping mall: On the reidentifiability of credit card metadata.
Query Processing with K-AnonymityBlocking Anonymity Threats Raised by Frequent Itemset Mining.Journal of the Association for Information Science and Technology 67:1, 148-163.Loewenstein. (2015) Privacy and human behavior in the age of information.IEICE Transactions on Information and Systems E97.D:4, 876-883.Journal of the American Medical Informatics Association 23:e1, e131-e137.IEEE Transactions on Knowledge and Data Engineering 26:10, 2520-2533.Probability in the Engineering and Informational Sciences 26:02, 245-262.
IEEE Transactions on Knowledge and Data Engineering 25:11, 2644-2657.
On the privacy offered by (k, δ) -anonymity, InformationAbdelMalik. (2009) Evaluating Predictors of Geographic Area Population Size Cut-offs to Manage Re-identification Risk.IEEE Transactions on Knowledge and Data Engineering 23:8, 1244-1260.
K-Anonymity - link.springer.com
Anonymity: Formalisation of Privacy k-anonymity - CiteSeerXInternational Journal of Distributed Sensor Networks 2013, 1-10.Vidya Banu, N. Nagaveni. (2013) Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario.Mateo-Sanz. (2013) Distributed Architecture With Double-Phase Microaggregation for the Private Sharing of Biomedical Data in Mobile Health.
Singaravel. (2015) An approach for prevention of privacy breach and information leakage in sensitive data mining.IEEE Transactions on Knowledge and Data Engineering 21:11, 1643-1647.Breaux, Hanan Hibshi, Ashwini Rao. (2014) Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements.Journal of the American Medical Informatics Association 20:1, 102-108.