Page 750 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 750
The secondary data user can request access to the open attributes by utilizing R‐XAR. Figure 8.4.4
lists an example of an R‐XAR. If the secondary data consumer requests attribute identified as
quasi‐identifiers, DAP publishes anonymized data that contains attributes calculated as
quasi‐identifiers. The user also declares the required anonymization method, privacy protection
level, sensitive attributes combinations, open attributes, and quasi‐identifiers utilizing the R‐XAR.
1 <?xml version="1.0" encoding="utf‐8"?>
2 <anonymize type="k(3)">
3 <head>
4 <sensitive>
5 <rdf:RDF>
6 <v:Kind>
7 <v:hasTelephone>
8 <rdf:Description>
9 <rdf:type number="2" />
10 </rdf:Description>
11 </v:hasTelephone>
12 </v:Kind>
13 </rdf:RDF>
14 <PowerConsumption />
15 </sensitive>
16 <group name="addr" type="quasi" />
17 </head>
18 <rdf:RDF>
19 <v:Kind>
20 <v:bday />
21 <v:hasTelephone>
22 <rdf:Description>
23 <rdf:value note="TelephoneNumber" type="quasi" />
24 </rdf:Description>
25 </v:hasTelephone>
26 </v:Kind>
27 </rdf:RDF>
28 <PowerConsumption note="PowerConsumption" />
29 </anonymize>
Fig. 8.4.4 R‐XAR Example
The formats of XAS and its subset XAR utilize the cascading style sheets (CSS) format and the
Semantic Web standard. The XAS can be processed utilizing an XML schema, RDL schema, OWL
method, and other related tools.
740 ITU‐T's Technical Reports and Specifications