enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Data anonymization - Wikipedia

    en.wikipedia.org/wiki/Data_anonymization

    De-anonymization is the reverse process in which anonymous data is cross-referenced with other data sources to re-identify the anonymous data source. [3] Generalization and perturbation are the two popular anonymization approaches for relational data. [ 4 ]

  3. Data masking - Wikipedia

    en.wikipedia.org/wiki/Data_masking

    Data masking or data obfuscation is the process of modifying sensitive data in such a way that it is of no or little value to unauthorized intruders while still being usable by software or authorized personnel. Data masking can also be referred as anonymization, or tokenization, depending on different context.

  4. Datafly algorithm - Wikipedia

    en.wikipedia.org/wiki/Datafly_algorithm

    Datafly algorithm is an algorithm for providing anonymity in medical data. The algorithm was developed by Latanya Arvette Sweeney in 1997−98. [1] [2] Anonymization is achieved by automatically generalizing, substituting, inserting, and removing information as appropriate without losing many of the details found within the data.

  5. De-identification - Wikipedia

    en.wikipedia.org/wiki/De-identification

    When applied to metadata or general data about identification, the process is also known as data anonymization. Common strategies include deleting or masking personal identifiers , such as personal name , and suppressing or generalizing quasi-identifiers , such as date of birth.

  6. Data re-identification - Wikipedia

    en.wikipedia.org/wiki/Data_re-identification

    Data re-identification or de-anonymization is the practice of matching anonymous data ... By combining the GIC data with the voter database of the city Cambridge ...

  7. Tokenization (data security) - Wikipedia

    en.wikipedia.org/wiki/Tokenization_(data_security)

    Not all organizational data can be tokenized, and needs to be examined and filtered. When databases are utilized on a large scale, they expand exponentially, causing the search process to take longer, restricting system performance, and increasing backup processes. A database that links sensitive information to tokens is called a vault.

  8. l-diversity - Wikipedia

    en.wikipedia.org/wiki/L-diversity

    l-diversity, also written as -diversity, is a form of group based anonymization that is used to preserve privacy in data sets by reducing the granularity of a data representation. This reduction is a trade off that results in some loss of effectiveness of data management or mining algorithms in order to gain

  9. k-anonymity - Wikipedia

    en.wikipedia.org/wiki/K-anonymity

    Because k-anonymization does not include any randomization, attackers can make reliable, unambiguous inferences about data sets that may harm individuals. For example, if the 19-year-old John from Kerala is known to be in the database above, then it can be reliably said that he has either cancer, a heart-related disease, or a viral infection.