How much privacy? — a system to safe guard personal privacy while releasing databases

14Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We propose two models to quantitatively measure the degree of privacy invasion based on the granular computing methodology. The total cost model measures the privacy invasion in light of the effort needed for an investigator to find individual’s private information.The average benefit model measures the privacy invasion in light of the benefit an investigator gets when his investigation improves the assessment of individuals private information.These two models can remedy the inadequacy of the deterministic formulation of privacy proposed in [4].These two measurements have been implemented in CellSecu 2.0, and a more relaxed generalization procedure, called external generalization, has also been implemented.

Cite

CITATION STYLE

APA

Chiang, Y. T., Chiang, Y. C., Hsu, T. S., Liau, C. J., & Wang, D. W. (2002). How much privacy? — a system to safe guard personal privacy while releasing databases. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2475, pp. 226–233). Springer Verlag. https://doi.org/10.1007/3-540-45813-1_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free