10 Matching Annotations
  1. Feb 2024
  2. Apr 2022
    1. K-Anonymity, L-Diversity, and T-ClosenessIn this section, I will introduce three techniques that can be used to reduce the probability that certain attacks can be performed. The simplest of these methods is k-anonymity, followed by l-diversity, and then followed by t-closeness. Other methods have been proposed to form a sort of alphabet soup, but these are the three most commonly utilized. With each of these, the analysis that must be performed on the dataset becomes increasingly complex and undeniably has implications on the statistical validity of the dataset.

      privacy metrics

  3. Feb 2022
  4. Jun 2021
  5. Oct 2020
  6. Jul 2020
  7. Nov 2018
    1. his documentation needs to be easily findable and accessible by anyone who uses the dataset.

      How about easily understandable and doesn't use the element in its own definition? COAR vocabularies are really good examples of how metadata documentation should be presented and written IMO

  8. Aug 2018
  9. Jul 2018