Database Anonymization (Record no. 85105)

000 -LEADER
fixed length control field 04022nam a22005055i 4500
001 - CONTROL NUMBER
control field 978-3-031-02347-7
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730163910.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220601s2016 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783031023477
-- 978-3-031-02347-7
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Domingo-Ferrer, Josep.
245 10 - TITLE STATEMENT
Title Database Anonymization
Sub Title Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2016.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XV, 120 p.
490 1# - SERIES STATEMENT
Series statement Synthesis Lectures on Information Security, Privacy, and Trust,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Preface -- Acknowledgments -- Introduction -- Privacy in Data Releases -- Anonymization Methods for Microdata -- Quantifying Disclosure Risk: Record Linkage -- The k-Anonymity Privacy Model -- Beyond k-Anonymity: l-Diversity and t-Closeness -- t-Closeness Through Microaggregation -- Differential Privacy -- Differential Privacy by Multivariate Microaggregation -- Differential Privacy by Individual Ranking Microaggregation -- Conclusions and Research Directions -- Bibliography -- Authors' Biographies .
520 ## - SUMMARY, ETC.
Summary, etc The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects the data refer to. Disclosure risk limitation has a long record in the statistical and computer science research communities, who have developed a variety of privacy-preserving solutions for data releases. This Synthesis Lecture provides a comprehensive overview of the fundamentals of privacy in data releases focusing on the computer science perspective. Specifically, we detail the privacy models, anonymization methods, and utility and risk metrics that have been proposed so far in the literature. Besides, as a more advanced topic, we identify and discuss in detail connections between several privacy models (i.e., how to accumulate the privacy guaranteesthey offer to achieve more robust protection and when such guarantees are equivalent or complementary); we also explore the links between anonymization methods and privacy models (how anonymization methods can be used to enforce privacy models and thereby offer ex ante privacy guarantees). These latter topics are relevant to researchers and advanced practitioners, who will gain a deeper understanding on the available data anonymization solutions and the privacy guarantees they can offer.
700 1# - AUTHOR 2
Author 2 Sánchez, David.
700 1# - AUTHOR 2
Author 2 Soria-Comas, Jordi.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-031-02347-7
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2016.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1945-9750
912 ## -
-- ZDB-2-SXSC

No items available.