The Open UniversitySkip to content
 

Annex 3: Practical examples of some key anonymisation techniques

Yang, Mu; Sassone, Vladimiro and O'Hara, Kieron (2012). Annex 3: Practical examples of some key anonymisation techniques. In: Information Commissioner's Office, (ICO) ed. Anonymisation: Managing Data Protection Risk: Code of Practice. Wilmslow: Information Commissioner's Office, pp. 80–103.

URL: http://ico.org.uk/
Google Scholar: Look up in Google Scholar
Item Type: Book Section
Academic Unit/School: Faculty of Science, Technology, Engineering and Mathematics (STEM) > Computing and Communications
Faculty of Science, Technology, Engineering and Mathematics (STEM)
Item ID: 40664
Depositing User: Mu Yang
Date Deposited: 05 Aug 2014 15:41
Last Modified: 02 May 2018 14:01
URI: http://oro.open.ac.uk/id/eprint/40664
Share this page:

Actions (login may be required)

Policies | Disclaimer

© The Open University   contact the OU