Structural composition attacks on anonymized data
dc.contributor.author | Nilges, Tobias | |
dc.contributor.author | Müller-Quade, Jörn | |
dc.contributor.author | Huber, Matthias | |
dc.contributor.editor | Katzenbeisser, Stefan | |
dc.contributor.editor | Lotz, Volkmar | |
dc.contributor.editor | Weippl, Edgar | |
dc.date.accessioned | 2019-01-25T14:17:29Z | |
dc.date.available | 2019-01-25T14:17:29Z | |
dc.date.issued | 2014 | |
dc.description.abstract | Anonymized releases of databases are increasingly available in public. The composition of two releases does not necessarily fulfil any anonymity notion, even if the individual releases do fulfil that anonymity notion on their own. In this paper, we study composition scenarios and provide formalizations. We introduce a formal framework to study the composition of databases on a structural level and show the equivalence of the composition scenarios used in the literature. We show that known attacks on anonymity notions can be reduced to two simple properties and only need limited side information. | en |
dc.identifier.isbn | 978-3-88579-622-0 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/20063 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-262 | |
dc.subject | database anonymization | |
dc.subject | data composition | |
dc.subject | anonymity notions | |
dc.title | Structural composition attacks on anonymized data | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 460 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 443 | |
gi.conference.date | 19.-21. März 2014 | |
gi.conference.location | Wien, Österreich | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1