Chapter 7. Privacy in Databases
Learning Objectives
After studying this chapter, you should be able to:
Explain the difference between summary tables and microdata tables
Understand the concept of re-identification
Present an overview of the types of re-identification attacks
Explain the difference between anonymization and de-identification
Discuss the importance of quasi-identifiers and how they pose a threat to privacy
List and explain the basic techniques for privacy-preserving data publishing
Explain and illustrate the concept of k-anonymity
Discuss approaches to protecting frequency tables
Discuss approaches to protecting magnitude tables
Understand the nature of the privacy threat to queryable databases
Discuss approaches to query restriction ...
Get Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.