A literature survey and classifications on data deanonymisation

D Al-Azizy, D Millard, I Symeonidis, K O'Hara… - Risks and Security of …, 2016 - Springer
The problem of disclosing private anonymous data has become increasingly serious
particularly with the possibility of carrying out deanonymisation attacks on publishing data …

Privacy models and disclosure risk measures

V Torra, V Torra - Data Privacy: Foundations, New Developments and the …, 2017 - Springer
Privacy Models and Disclosure Risk Measures | SpringerLink Skip to main content
Advertisement SpringerLink Account Menu Find a journal Publish with us Track your research …

Learning to de-anonymize social networks

K Sharad - 2016 - cl.cam.ac.uk
Releasing anonymized social network data for analysis has been a popular idea among
data providers. Despite evidence to the contrary the belief that anonymization will solve the …

Data Protection for Online Social Networks and -Stability for Graphs

V Torra, T Shafie, J Salas - IEEE Transactions on Emerging …, 2015 - ieeexplore.ieee.org
Graphs can be used as a model for online social networks. In this framework, vertices
represent individuals and edges relationships between individuals. In recent years, different …

A formalization of record linkage and its application to data protection

V Torra, K Stokes - … of Uncertainty, Fuzziness and Knowledge-Based …, 2012 - World Scientific
Re-identification and record linkage are tools used to measure disclosure risk in data
privacy. Given two data files, record linkage establishes links between those records that …

Data privacy: A survey of results

V Torra, G Navarro-Arribas - Advanced Research in Data Privacy, 2015 - Springer
In this paper we present an overview of the results obtained by our research group within the
area of data privacy. Results focus on data-driven problems (respondent and owner privacy …

Transparency and microaggregation

V Torra - UNECE (United Nations Economic Commission for …, 2015 - diva-portal.org
Transparency has an important effect on disclosure risk. In general, masking methods have
to be evaluated taking into account that intruders can use all available information to attack …

Towards the formalization of re-identification for some data masking methods

V Torra - Artificial Intelligence Research and Development, 2012 - ebooks.iospress.nl
Re-identification methods are in common use in data privacy for disclosure risk assessment.
Record linkage is one of these re-identification methods. Given two data files, record linkage …

A Metric for Anonymity based on Subjective Logic

A Bni - 2014 - diva-portal.org
Abstract § Anonymity metrics have been proposed to evaluate anonymity preserving
systems by estimating the amount of information displayed by these systems due to …