Search results
Use Amnesia to transform personal data to anonymous data that can be used for statistical analysis. Data anonymized with Amnesia are *statistically guaranteed* that they cannot be linked to the original data. Guarantees no links to the original data. Offers k-anonymity & km-anonynity.
- Get Started
Download the latest version of Amnesia anonymization tool...
- Get in Touch
Contact with Amnesia anonymization tool's support team. ×...
- Amnesia New How-To Tutorials
Amnesia is a flexible, user-friendly, free, and open-source...
- About
MONITOR Dashboard - customized portals as-a-service to...
- Get Started
A simple Python package to quickly run privacy metrics for your data. Obtain the K-anonimity, L-diversity and T-closeness to asses how anonymous your transformed data is, and how it's balanced with data usability.
k-anonymity is a property possessed by certain anonymized data. The term k -anonymity was first introduced by Pierangela Samarati and Latanya Sweeney in a paper published in 1998, [1] although the concept dates to a 1986 paper by Tore Dalenius. [2]
15 paź 2024 · A dataset is k-anonymous if quasi-identifiers for each person in the dataset are identical to at least k – 1 other people also in the dataset. You can compute the k -anonymity value based on...
ARX is a comprehensive open source data anonymization tool aiming to provide scalability and usability. It supports various anonymization techniques, methods for analyzing data quality and re-identification risks and it supports well-known privacy models, such as k-anonymity, l-diversity, t-closeness and differential privacy. - arx-deidentifier/arx
Typical examples include k-anonymity, l-diversity, t-closeness or δ-presence. The basic idea of k-anonymity is to protect a dataset against re-identification by generalizing the attributes which could be used in a linkage attack (quasi identifiers).
14 kwi 2021 · What is k-Anonymity? How Can k-Anonymity Help Prevent a Privacy Attack? How Is k-Anonymity Implemented? How is l-Diversity Achieved Using k-Anonymization? Data Masking and De-Identification with Immuta