We will discuss privacy breaches as well as data anonymization. For an introduction to the field of privacy, see E. Zheleva, L. Getoor, Privacy in social networks: A survey. Before you enroll in the seminar, you might want to take a look at that survey and at the references listed below.
Initial references
Privacy breaches
1 L. Backstrom, C. Dwork, J. Kleinberg, Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography. In WWW, 2007.
2 A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In Security and Privacy, 2008.
3 G. Cormode, D. Srivastava, T. Yu, and Q. Zhang. Anonymizing bipartite graph data using safe groupings. In VLDB, 2008.
Data anonymization
4 G. Aggarwal et al. Approximation algorithms for k-anonimity. In JPT, 2005.
5 A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In ICDE, 2006.
6 C. Dwork, Differential Privacy: A Survey of Results. In TAMC, 2008.
Admission settings
The course is part of admission "Anmeldung gesperrt (global)".
Erzeugt durch Migration 128 13:45:31 03.09.2014 Settings for unsubscribe:
Admission locked.
Registration mode
The enrolment is binding, participants cannot unsubscribe themselves.