Further Reading
Dwork, C. (2006). Differential privacy. In Automata, languages and programming. Berlin: Springer.
Li, Ninghui, et al. (2007). t-Closeness: Privacy beyond k-anonymity and l-diversity. IEEE 23rd International Conference on Data Engineering, 7.
Machanavajjhala, A., et al. (2007). l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data, 1(1), Article 3, 1–12.
Sweeney, L. (2002). k-anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5).
The European Parliament and of the Council Working Party. (2014). Opinion 05/2014 on anonymisation techniques. http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp216_en.pdf. Retrieved on 29 Dec 2014.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this entry
Cite this entry
Smith, M., Agrawal, R. (2017). Anonymization Techniques. In: Schintler, L., McNeely, C. (eds) Encyclopedia of Big Data. Springer, Cham. https://doi.org/10.1007/978-3-319-32001-4_9-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-32001-4_9-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32001-4
Online ISBN: 978-3-319-32001-4
eBook Packages: Springer Reference Business and ManagementReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences