Towards Attack and Defense Views to K-Anonymous Using Information Theory Approach | IEEE Journals & Magazine | IEEE Xplore