6. Anonymization process
This section describes a seven-step anonymization process, inspired by and adapted to the RGPD context (figure 3 ) :
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Anonymization process
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!