May 2023
Intermediate to advanced
336 pages
10h 3m
English
This chapter covers
In the previous chapter we discussed different privacy-enhancing techniques that can be utilized in data mining operations and how to implement the k-anonymity privacy model. In this chapter we’ll explore another set of privacy models that the research community has proposed to mitigate the flaws in the k-anonymity model. Toward the end of this chapter, we’ll discuss the recent evolution of data management techniques, ...