Author of the publication

Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk.

, , , and . Privacy in Statistical Databases, volume 4302 of Lecture Notes in Computer Science, page 217-232. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk., , , and . Trans. Data Priv., 2 (3): 153-183 (2009)Modeling the Risk & Utility of Information Sharing in Social Networks., , and . SocialCom/PASSAT, page 441-450. IEEE Computer Society, (2012)ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure., , and . Secure Data Management, volume 5159 of Lecture Notes in Computer Science, page 32-49. Springer, (2008)Latency-sensitive power control for wireless ad-hoc networks., , and . Q2SWinet, page 31-38. ACM, (2005)Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk., , , and . Privacy in Statistical Databases, volume 4302 of Lecture Notes in Computer Science, page 217-232. Springer, (2006)A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization., , and . IEEE Trans. Knowl. Data Eng., 26 (7): 1591-1601 (2014)