Lesson Open Access

De-identification techniques (Anonymize - Pseudonymize)

Hanne Vlietinck

Basic techniques and tools for protecting your (personal) sensitive data. The protection model(K-anonymity, L-diversity, T-closeness) will be handled. Different levels of access control and best practices on passwords. 

Files (3.3 MB)
Name Size
SecurityofData_LCRDM_20220615_toshare.pdf
md5:38bc02e62566ac0332fd494eb29932b2
3.3 MB Download
87
82
views
downloads
All versions This version
Views 8787
Downloads 8282
Data volume 270.3 MB270.3 MB
Unique views 7878
Unique downloads 7171

Share

Cite as