{"id":"https://openalex.org/W2038699380","doi":"https://doi.org/10.5220/0005058203500360","title":"Randomized Addition of Sensitive Attributes for l-diversity","display_name":"Randomized Addition of Sensitive Attributes for l-diversity","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2038699380","doi":"https://doi.org/10.5220/0005058203500360","mag":"2038699380"},"language":"en","primary_location":{"id":"doi:10.5220/0005058203500360","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005058203500360","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005058203500360","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045716284","display_name":"Yuichi Sei","orcid":"https://orcid.org/0000-0002-2552-6717"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Yuichi Sei","raw_affiliation_strings":["The University of Electro-Communications, Japan","Graduate School of Information systems, The University of Electro-Communications, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"The University of Electro-Communications, Japan","institution_ids":["https://openalex.org/I20529979"]},{"raw_affiliation_string":"Graduate School of Information systems, The University of Electro-Communications, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013259601","display_name":"Akihiko Ohsuga","orcid":"https://orcid.org/0000-0001-6717-7028"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Akihiko Ohsuga","raw_affiliation_strings":["The University of Electro-Communications, Japan","Graduate School of Information systems, The University of Electro-Communications, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"The University of Electro-Communications, Japan","institution_ids":["https://openalex.org/I20529979"]},{"raw_affiliation_string":"Graduate School of Information systems, The University of Electro-Communications, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045716284"],"corresponding_institution_ids":["https://openalex.org/I20529979"],"apc_list":null,"apc_paid":null,"fwci":0.818,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.80533461,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"350","last_page":"360"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.8694487810134888},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7661243677139282},{"id":"https://openalex.org/keywords/diversity","display_name":"Diversity (politics)","score":0.5953448414802551},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.5381842851638794},{"id":"https://openalex.org/keywords/randomized-response","display_name":"Randomized response","score":0.4383547604084015},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4343963861465454},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43316009640693665},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.4132831394672394},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3714926242828369},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3376826345920563},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24385973811149597},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1367211639881134},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09470036625862122}],"concepts":[{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.8694487810134888},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7661243677139282},{"id":"https://openalex.org/C2781316041","wikidata":"https://www.wikidata.org/wiki/Q1230584","display_name":"Diversity (politics)","level":2,"score":0.5953448414802551},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5381842851638794},{"id":"https://openalex.org/C2776441110","wikidata":"https://www.wikidata.org/wiki/Q1436628","display_name":"Randomized response","level":3,"score":0.4383547604084015},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4343963861465454},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43316009640693665},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4132831394672394},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3714926242828369},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3376826345920563},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24385973811149597},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1367211639881134},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09470036625862122},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0},{"id":"https://openalex.org/C185429906","wikidata":"https://www.wikidata.org/wiki/Q1130160","display_name":"Estimator","level":2,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005058203500360","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005058203500360","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005058203500360","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005058203500360","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W71083564","https://openalex.org/W121997080","https://openalex.org/W1968868556","https://openalex.org/W1978426363","https://openalex.org/W2010709473","https://openalex.org/W2025483242","https://openalex.org/W2045014265","https://openalex.org/W2050169439","https://openalex.org/W2052806235","https://openalex.org/W2064868049","https://openalex.org/W2098331493","https://openalex.org/W2107927452","https://openalex.org/W2119047901","https://openalex.org/W2119067110","https://openalex.org/W2127121749","https://openalex.org/W2134167315","https://openalex.org/W2135581534","https://openalex.org/W2142406320","https://openalex.org/W2162105856","https://openalex.org/W2168730434","https://openalex.org/W2170711577","https://openalex.org/W2911978475"],"related_works":["https://openalex.org/W2390860973","https://openalex.org/W2062077319","https://openalex.org/W2078874904","https://openalex.org/W2735520535","https://openalex.org/W2905288883","https://openalex.org/W3046367122","https://openalex.org/W3022534164","https://openalex.org/W4396832952","https://openalex.org/W3046095319","https://openalex.org/W3197497514"],"abstract_inverted_index":{"When":[0],"a":[1,60,80,100,153],"data":[2,61,118],"holder":[3],"wants":[4],"to":[5,15,33],"share":[6],"databases":[7],"that":[8,35,56,59,117,144],"contain":[9],"personal":[10],"attributes,":[11],"individual":[12,115],"privacy":[13,157],"needs":[14],"be":[16],"considered.":[17],"Existing":[18],"anonymization":[19],"techniques,":[20],"such":[21],"as":[22],"l-diversity,":[23,104],"remove":[24],"identifiers":[25],"and":[26,68,109,129,139,158],"generalize":[27],"quasi-identifiers":[28],"(QIDs)":[29],"from":[30],"the":[31,44,69,76,85,133,161],"database":[32,45,71,81],"ensure":[34],"adversaries":[36],"cannot":[37,89],"specify":[38],"each":[39,114],"individual's":[40],"sensitive":[41,111],"attributes.":[42],"Usually,":[43],"is":[46,54],"anonymized":[47,70,162],"based":[48,123],"on":[49,64,124,128],"one-size-fits-all":[50],"measures.":[51],"Therefore,":[52],"it":[53,91,122],"possible":[55],"several":[57],"QIDs":[58,107,125],"user":[62],"focuses":[63],"are":[65],"all":[66],"generalized,":[67],"has":[72],"no":[73],"value":[74],"for":[75,103,148],"user.":[77],"Moreover,":[78],"if":[79],"does":[82,130],"not":[83,131],"satisfy":[84],"eligibility":[86,134],"requirement,":[87],"we":[88,98,141],"anonymize":[90],"by":[92],"existing":[93],"methods.":[94],"In":[95],"this":[96],"paper,":[97],"propose":[99],"new":[101],"technique":[102],"which":[105],"keeps":[106],"unchanged":[108],"randomizes":[110],"attributes":[112],"of":[113,160],"so":[116],"users":[119],"can":[120,150],"analyze":[121],"they":[126],"focus":[127],"require":[132],"requirement.":[135],"Through":[136],"mathematical":[137],"analysis":[138],"simulations,":[140],"will":[142],"prove":[143],"our":[145],"proposed":[146],"method":[147],"l-diversity":[149],"result":[151],"in":[152],"better":[154],"tradeoff":[155],"between":[156],"utility":[159],"database.":[163]},"counts_by_year":[{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
