Login / Signup
Obscuring Provenance Confidential Information via Graph Transformation.
Jamal Ali Hussein
Luc Moreau
Vladimiro Sassone
Published in:
IFIPTM (2015)
Keyphrases
</>
graph transformation
confidential information
information loss
statistical databases
confidential data
data quality
sensitive information
metadata
disclosure risk
private information
data mining
mutual information
data sets