ABSTRACT

This chapter describes how to model the threat from a re-identification attack. By modeling the threat we mean deciding on the final set of equations to use for measuring the risk of re-identification, and deciding on the list of quasi-identifiers in the data set.