Cargando…
Algorithms for Constructing Anonymizing Arrays
Attribute-based methods are inherently identity-less as authorization decisions are made in terms of attributes possessed by the subject rather than identity. However, anonymity against the system is not guaranteed when attribute distribution allows for the composition of a policy that few subjects...
Autores principales: | Lanus, Erin, Colbourn, Charles J. |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7254900/ http://dx.doi.org/10.1007/978-3-030-48966-3_29 |
Ejemplares similares
-
Nonexposure Accurate Location K-Anonymity Algorithm in LBS
por: Jia, Jinying, et al.
Publicado: (2014) -
Neurotics Not Anonymous
por: Quine, Michael
Publicado: (1968) -
Sincerely, Anonymous
por: Paterson, Grace
Publicado: (2020) -
An Efficient Big Data Anonymization Algorithm Based on Chaos and Perturbation Techniques †
por: Eyupoglu, Can, et al.
Publicado: (2018) -
The anonymous venetian
por: Leon, Donna