Return to Article Details Dynamic k-Anonymity security protecting technique for restricting information mining Download Download PDF