Buch, Englisch, Band 4302, 383 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 610 g
CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings
Buch, Englisch, Band 4302, 383 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 610 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-49330-3
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Rechtliche Aspekte der EDV
- Technische Wissenschaften Elektronik | Nachrichtentechnik Elektronik Robotik
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz Wissensbasierte Systeme, Expertensysteme
- Mathematik | Informatik Mathematik Stochastik Mathematische Statistik
- Rechtswissenschaften Wirtschaftsrecht Medienrecht Telekommunikationsrecht, IT-Recht, Internetrecht
Weitere Infos & Material
Methods for Tabular Protection.- A Method for Preserving Statistical Distributions Subject to Controlled Tabular Adjustment.- Automatic Structure Detection in Constraints of Tabular Data.- A New Approach to Round Tabular Data.- Harmonizing Table Protection: Results of a Study.- Utility and Risk in Tabular Protection.- Effects of Rounding on the Quality and Confidentiality of Statistical Data.- Disclosure Analysis for Two-Way Contingency Tables.- Statistical Disclosure Control Methods Through a Risk-Utility Framework.- A Generalized Negative Binomial Smoothing Model for Sample Disclosure Risk Estimation.- Entry Uniqueness in Margined Tables.- Methods for Microdata Protection.- Combinations of SDC Methods for Microdata Protection.- A Fixed Structure Learning Automaton Micro-aggregation Technique for Secure Statistical Databases.- Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation.- Using the Jackknife Method to Produce Safe Plots of Microdata.- Combining Blanking and Noise Addition as a Data Disclosure Limitation Method.- Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric Data.- Adjusting Survey Weights When Altering Identifying Design Variables Via Synthetic Data.- Utility and Risk in Microdata Protection.- Risk, Utility and PRAM.- Distance Based Re-identification for Time Series, Analysis of Distances.- Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk.- Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk Assessment.- Improving Individual Risk Estimators.- Protocols for Private Computation.- Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases.- Privacy-Preserving Data Set Union.-“Secure” Log-Linear and Logistic Regression Analysis of Distributed Databases.- Case Studies.- Measuring the Impact of Data Protection Techniques on Data Utility: Evidence from the Survey of Consumer Finances.- Protecting the Confidentiality of Survey Tabular Data by Adding Noise to the Underlying Microdata: Application to the Commodity Flow Survey.- Italian Household Expenditure Survey: A Proposal for Data Dissemination.- Software.- The ARGUS Software in CENEX.- Software Development for SDC in R.- On Secure e-Health Systems.- IPUMS-International High Precision Population Census Microdata Samples: Balancing the Privacy-Quality Tradeoff by Means of Restricted Access Extracts.