Published June 21, 2022
| Version v1
Lesson
Open
De-identification techniques (Anonymize - Pseudonymize)
Creators
Description
Basic techniques and tools for protecting your (personal) sensitive data. The protection model(K-anonymity, L-diversity, T-closeness) will be handled. Different levels of access control and best practices on passwords.
Files
SecurityofData_LCRDM_20220615_toshare.pdf
Files
(3.3 MB)
Name | Size | Download all |
---|---|---|
md5:38bc02e62566ac0332fd494eb29932b2
|
3.3 MB | Preview Download |