000 | 06446nam a22006855i 4500 | ||
---|---|---|---|
001 | 978-3-540-49332-7 | ||
003 | DE-He213 | ||
005 | 20240730190033.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2006 gw | s |||| 0|eng d | ||
020 |
_a9783540493327 _9978-3-540-49332-7 |
||
024 | 7 |
_a10.1007/11930242 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aPrivacy in Statistical Databases _h[electronic resource] : _bCENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings / _cedited by Josep Domingo-Ferrer, Luisa Franconi. |
250 | _a1st ed. 2006. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2006. |
|
300 |
_aXI, 383 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v4302 |
|
505 | 0 | _aMethods for Tabular Protection -- A Method for Preserving Statistical Distributions Subject to Controlled Tabular Adjustment -- Automatic Structure Detection in Constraints of Tabular Data -- A New Approach to Round Tabular Data -- Harmonizing Table Protection: Results of a Study -- Utility and Risk in Tabular Protection -- Effects of Rounding on the Quality and Confidentiality of Statistical Data -- Disclosure Analysis for Two-Way Contingency Tables -- Statistical Disclosure Control Methods Through a Risk-Utility Framework -- A Generalized Negative Binomial Smoothing Model for Sample Disclosure Risk Estimation -- Entry Uniqueness in Margined Tables -- Methods for Microdata Protection -- Combinations of SDC Methods for Microdata Protection -- A Fixed Structure Learning Automaton Micro-aggregation Technique for Secure Statistical Databases -- Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation -- Using the Jackknife Method to Produce Safe Plots of Microdata -- Combining Blanking and Noise Addition as a Data Disclosure Limitation Method -- Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric Data -- Adjusting Survey Weights When Altering Identifying Design Variables Via Synthetic Data -- Utility and Risk in Microdata Protection -- Risk, Utility and PRAM -- Distance Based Re-identification for Time Series, Analysis of Distances -- Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk -- Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk Assessment -- Improving Individual Risk Estimators -- Protocols for Private Computation -- Single-Database Private Information Retrieval SchemesĀ : Overview, Performance Study, and Usage with Statistical Databases -- Privacy-Preserving Data Set Union.-"Secure" Log-Linear and Logistic Regression Analysis of Distributed Databases -- Case Studies -- Measuring the Impact of Data Protection Techniques on Data Utility: Evidence from the Survey of Consumer Finances -- Protecting the Confidentiality of Survey Tabular Data by Adding Noise to the Underlying Microdata: Application to the Commodity Flow Survey -- Italian Household Expenditure Survey: A Proposal for Data Dissemination -- Software -- The ARGUS Software in CENEX -- Software Development for SDC in R -- On Secure e-Health Systems -- IPUMS-International High Precision Population Census Microdata Samples: Balancing the Privacy-Quality Tradeoff by Means of Restricted Access Extracts. | |
520 | _aPrivacy in statistical databases is a discipline whose purpose is to provide - lutions to the con?ict between the increasing social, political and economical demand of accurate information, and the legal and ethical obligation to protect the privacy of the individuals and enterprises to which statistical data refer. - yond law and ethics, there are also practical reasons for statistical agencies and data collectors to invest in this topic: if individual and corporate respondents feel their privacyguaranteed,they arelikelyto providemoreaccurateresponses. There are at least two traditions in statistical database privacy: one stems from o?cial statistics, where the discipline is also known as statistical disclosure control (SDC), and the other originates from computer science and database technology.Bothstartedinthe1970s,butthe1980sandtheearly1990ssawlittle privacy activity on the computer science side. The Internet era has strengthened the interest of both statisticians and computer scientists in this area. Along with the traditional topics of tabular and microdata protection, some research lines have revived and/or appeared, such as privacy in queryable databases and protocols for private data computation. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aDatabase management. _93157 |
|
650 | 0 |
_aComputer science _xMathematics. _93866 |
|
650 | 0 |
_aMathematical statistics. _99597 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aComputers _xLaw and legislation. _975151 |
|
650 | 0 |
_aInformation technology _xLaw and legislation. _982531 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aDatabase Management. _93157 |
650 | 2 | 4 |
_aProbability and Statistics in Computer Science. _931857 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aLegal Aspects of Computing. _953952 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
700 | 1 |
_aDomingo-Ferrer, Josep. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9141139 |
|
700 | 1 |
_aFranconi, Luisa. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9141140 |
|
710 | 2 |
_aSpringerLink (Online service) _9141141 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540493303 |
776 | 0 | 8 |
_iPrinted edition: _z9783540832959 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v4302 _9141142 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/11930242 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c93067 _d93067 |