4. Anonymization templates
In its opinion on anonymization techniques , the G29 describes two main anonymization models: generalization and randomization. Both models have their advantages and disadvantages, and need to be adapted according to the need in question.
4.1 Randomization
Randomization covers a range of techniques whose aim is to reduce risk, either by adding dummy data, or by permuting real data. More specifically, the techniques used are: noise addition, permutation and differential confidentiality.
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Anonymization templates
Bibliography
Standards and norms
- ISO Technologie de l'information : technique de sécurité - ISO/IEC 29100 - 2011
Regulations
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), OJEU L 119/1 of 4 May 2013, http://eur-lex.europa.eu/legal-content/FR/TXT/PDF/?uri=CELEX:32016R0679&from=FR...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference