.

(k, l)-Clustering for Transactional Data Streams Anonymization

LAUR Repository

Show simple item record

dc.contributor.author Haraty, Ramzi en_US
dc.contributor.author Tekli, Jimmy en_US
dc.contributor.author Al Bouna, Bechara en_US
dc.contributor.author Issa, Youssef Bou en_US
dc.contributor.author Kamradt, Marc en_US
dc.contributor.editor Su, Chunhua
dc.contributor.editor Kikuchi, Hiroaki
dc.date.accessioned 2019-03-18T12:08:48Z
dc.date.available 2019-03-18T12:08:48Z
dc.date.datecopyrighted 2018 en_US
dc.identifier.isbn 9783319998077 en_US
dc.identifier.uri http://hdl.handle.net/10725/10229
dc.description.abstract In this paper, we address the correlation problem in the anonymization of transactional data streams. We propose a bucketization-based technique, entitled (k, l)-clustering to prevent such privacy breaches by ensuring that the same k individuals remain grouped together over the entire anonymized stream. We evaluate our algorithm in terms of utility by considering two different (k, l)-clustering approaches. en_US
dc.language.iso en en_US
dc.publisher Springer en_US
dc.subject Computer security -- Congresses en_US
dc.subject Computer networks -- Security measures -- Congresses en_US
dc.title (k, l)-Clustering for Transactional Data Streams Anonymization en_US
dc.type Conference Paper / Proceeding en_US
dc.creator.school SAS en_US
dc.creator.identifier 199729410 en_US
dc.creator.department Computer Science And Mathematics en_US
dc.description.physdesc cxiv, 624 pages : illustrations en_US
dc.publisher.place Cham, Switzerland en_US
dc.keywords Data privacy en_US
dc.keywords Data stream en_US
dc.keywords Correlation en_US
dc.keywords Anonymization en_US
dc.description.bibliographiccitations Includes bibliographical references. en_US
dc.identifier.doi https://doi.org/10.1007/978-3-319-99807-7_35 en_US
dc.identifier.ctation Tekli, J., Al Bouna, B., Issa, Y. B., Kamradt, M., & Haraty, R. (2018, September). (k, l)-Clustering for Transactional Data Streams Anonymization. In International Conference on Information Security Practice and Experience (pp. 544-556). Springer, Cham. en_US
dc.creator.email rharaty@lau.edu.lb en_US
dc.date.created September 25-27, 2018 en_US
dc.description.pages 544-556 en_US
dc.conference.place Tokyo, Japan en_US
dc.conference.subtitle 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, proceedings en_US
dc.conference.title Information security practice and experience en_US
dc.description.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php en_US
dc.identifier.url https://link.springer.com/chapter/10.1007/978-3-319-99807-7_35 en_US
dc.description.note Part of the Lecture Notes in Computer Science book series (LNCS, volume 11125) en_US
dc.identifier.orcid https://orcid.org/0000-0002-6978-3627 en_US
dc.date.datepublished 2018 en_US
dc.creator.ispartof Lebanese American University en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account