Login / Signup
K-anonymity on sensitive transaction items.
Shyue-Liang Wang
Yu-Chuan Tsai
Hung-Yu Kao
Tzung-Pei Hong
Published in:
GrC (2011)
Keyphrases
</>
information loss
privacy preserving
database
privacy protection
attribute values
private information
privacy preservation
location based services
concurrency control
privacy preserving data mining
transaction management
integrity constraints
real time database systems
location privacy