000 | 04996nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-319-11257-2 | ||
003 | DE-He213 | ||
005 | 20200420221301.0 | ||
007 | cr nn 008mamaa | ||
008 | 140910s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319112572 _9978-3-319-11257-2 |
||
024 | 7 |
_a10.1007/978-3-319-11257-2 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
050 | 4 | _aTA345-345.5 | |
072 | 7 |
_aJPP _2bicssc |
|
072 | 7 |
_aUB _2bicssc |
|
072 | 7 |
_aCOM018000 _2bisacsh |
|
072 | 7 |
_aPOL017000 _2bisacsh |
|
082 | 0 | 4 |
_a004 _223 |
245 | 1 | 0 |
_aPrivacy in Statistical Databases _h[electronic resource] : _bUNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings / _cedited by Josep Domingo-Ferrer. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXII, 367 p. 68 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8744 |
|
505 | 0 | _aTabular Data Protection -- Enabling Statistical Analysis of Suppressed Tabular Data -- Assessing the Information Loss of Controlled Adjustment Methods in Two-Way Tables -- Further Developments with Perturbation Techniques to Protect Tabular Data -- Comparison of Different Sensitivity Rules for Tabular Data and Presenting a New Rule - The Interval Rule -- Pre-tabular Perturbation with Controlled Tabular Adjustment: Some Considerations -- Measuring Disclosure Risk with Entropy in Population Based Frequency Tables -- A CTA Model Based on the Huber Function -- Microdata Masking Density Approximant Based on Noise Multiplied Data -- Reverse Mapping to Preserve the Marginal Distributions of Attributes in Masked Microdata -- JPEG-Based Microdata Protection -- Protection Using Privacy Models -- Improving the Utility of Differential Privacy via Univariate Microaggregation -- Differentially Private Exponential Random Graphs -- km-Anonymity for Continuous Data Using Dynamic Hierarchies -- Differentially-Private Logistic Regression for Detecting Multiple-SNP Association in GWAS Databases -- Synthetic Data -- Disclosure Risk Evaluation for Fully Synthetic Categorical Data -- v-Dispersed Synthetic Data Based on a Mixture Model with Constraints -- Nonparametric Generation of Synthetic Data for Small Geographic Areas -- Using Partially Synthetic Data to Replace Suppression in the Business Dynamics Statistics: Early Results -- Synthetic Longitudinal Business Databases for International Comparisons -- Record Linkage -- A Comparison of Blocking Methods for Record Linkage -- Probabilistic Record Linkage for Disclosure Risk Assessment -- Hierarchical Linkage Clustering with Distributions of Distances for Large-Scale Record Linkage -- Remote Access -- Comparison of Two Remote Access Systems Recently Developed and Implemented in Australia -- Privacy-Preserving Protocols -- Towards Secure and Practical Location Privacy through Private Equality Testing -- Case Studies -- Controlled Shuffling, Statistical Confidentiality and Microdata Utility: A Successful Experiment with a 10% Household Sample of the 2011 Population Census of Ireland for the IPUMS-International Database -- Balancing Confidentiality and Usability: Protecting Sensitive Data in the Case of Inward Foreign AffiliaTes Statistics (FATS) -- Applicability of Confidentiality Methods to Personal and Business Data. | |
520 | _aThis book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2014, held in Ibiza, Spain in September 2014 under the sponsorship of the UNESCO chair in Data Privacy. The 27 revised full papers presented were carefully reviewed and selected from 41 submissions. The scope of the conference is on following topics: tabular data protection, microdata masking, protection using privacy models, synthetic data, record linkage, remote access, privacy-preserving protocols, and case studies. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aDatabase management. | |
650 | 0 | _aApplication software. | |
650 | 0 | _aComputers and civilization. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputer Appl. in Administrative Data Processing. |
650 | 2 | 4 | _aDatabase Management. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aComputers and Society. |
700 | 1 |
_aDomingo-Ferrer, Josep. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319112565 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8744 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-11257-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c53211 _d53211 |