Logo des Repositoriums
 

Structural composition attacks on anonymized data

dc.contributor.authorNilges, Tobias
dc.contributor.authorMüller-Quade, Jörn
dc.contributor.authorHuber, Matthias
dc.contributor.editorKatzenbeisser, Stefan
dc.contributor.editorLotz, Volkmar
dc.contributor.editorWeippl, Edgar
dc.date.accessioned2019-01-25T14:17:29Z
dc.date.available2019-01-25T14:17:29Z
dc.date.issued2014
dc.description.abstractAnonymized releases of databases are increasingly available in public. The composition of two releases does not necessarily fulfil any anonymity notion, even if the individual releases do fulfil that anonymity notion on their own. In this paper, we study composition scenarios and provide formalizations. We introduce a formal framework to study the composition of databases on a structural level and show the equivalence of the composition scenarios used in the literature. We show that known attacks on anonymity notions can be reduced to two simple properties and only need limited side information.en
dc.identifier.isbn978-3-88579-622-0
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/20063
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-262
dc.subjectdatabase anonymization
dc.subjectdata composition
dc.subjectanonymity notions
dc.titleStructural composition attacks on anonymized dataen
dc.typeText/Conference Paper
gi.citation.endPage460
gi.citation.publisherPlaceBonn
gi.citation.startPage443
gi.conference.date19.-21. März 2014
gi.conference.locationWien, Österreich
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
443.pdf
Größe:
160.52 KB
Format:
Adobe Portable Document Format