dc.contributor.author |
Tekli, Jimmy |
|
dc.contributor.author |
Al Bouna, Bechara |
|
dc.contributor.author |
Issa, Youssef Bou |
|
dc.contributor.author |
Kamradt, Marc |
|
dc.contributor.author |
Haraty, Ramzi |
|
dc.contributor.editor |
Su, Chunhua |
|
dc.contributor.editor |
Kikuchi, Hiroaki |
|
dc.date.accessioned |
2019-03-18T12:08:48Z |
|
dc.date.available |
2019-03-18T12:08:48Z |
|
dc.date.copyright |
2018 |
en_US |
dc.date.issued |
2019-03-18 |
|
dc.identifier.isbn |
9783319998077 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10725/10229 |
|
dc.description.abstract |
In this paper, we address the correlation problem in the anonymization of transactional data streams. We propose a bucketization-based technique, entitled (k, l)-clustering to prevent such privacy breaches by ensuring that the same k individuals remain grouped together over the entire anonymized stream. We evaluate our algorithm in terms of utility by considering two different (k, l)-clustering approaches. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Springer |
en_US |
dc.subject |
Computer security -- Congresses |
en_US |
dc.subject |
Computer networks -- Security measures -- Congresses |
en_US |
dc.title |
(k, l)-Clustering for Transactional Data Streams Anonymization |
en_US |
dc.type |
Conference Paper / Proceeding |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
199729410 |
en_US |
dc.author.department |
Computer Science And Mathematics |
en_US |
dc.description.physdesc |
cxiv, 624 pages : illustrations |
en_US |
dc.publication.place |
Cham, Switzerland |
en_US |
dc.keywords |
Data privacy |
en_US |
dc.keywords |
Data stream |
en_US |
dc.keywords |
Correlation |
en_US |
dc.keywords |
Anonymization |
en_US |
dc.description.bibliographiccitations |
Includes bibliographical references. |
en_US |
dc.identifier.doi |
https://doi.org/10.1007/978-3-319-99807-7_35 |
en_US |
dc.identifier.ctation |
Tekli, J., Al Bouna, B., Issa, Y. B., Kamradt, M., & Haraty, R. (2018, September). (k, l)-Clustering for Transactional Data Streams Anonymization. In International Conference on Information Security Practice and Experience (pp. 544-556). Springer, Cham. |
en_US |
dc.author.email |
rharaty@lau.edu.lb |
en_US |
dc.conference.date |
September 25-27, 2018 |
en_US |
dc.conference.pages |
544-556 |
en_US |
dc.conference.place |
Tokyo, Japan |
en_US |
dc.conference.subtitle |
14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, proceedings |
en_US |
dc.conference.title |
Information security practice and experience |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
https://link.springer.com/chapter/10.1007/978-3-319-99807-7_35 |
en_US |
dc.note |
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11125) |
en_US |
dc.orcid.id |
https://orcid.org/0000-0002-6978-3627 |
en_US |
dc.publication.date |
2018 |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |