|
|
|
|
LEADER |
04997nam a22005775i 4500 |
001 |
978-3-319-11257-2 |
003 |
DE-He213 |
005 |
20151123195157.0 |
007 |
cr nn 008mamaa |
008 |
140910s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319112572
|9 978-3-319-11257-2
|
024 |
7 |
|
|a 10.1007/978-3-319-11257-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.76.A65
|
050 |
|
4 |
|a TA345-345.5
|
072 |
|
7 |
|a JPP
|2 bicssc
|
072 |
|
7 |
|a UB
|2 bicssc
|
072 |
|
7 |
|a COM018000
|2 bisacsh
|
072 |
|
7 |
|a POL017000
|2 bisacsh
|
082 |
0 |
4 |
|a 004
|2 23
|
245 |
1 |
0 |
|a Privacy in Statistical Databases
|h [electronic resource] :
|b UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings /
|c edited by Josep Domingo-Ferrer.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XII, 367 p. 68 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8744
|
505 |
0 |
|
|a Tabular Data Protection -- Enabling Statistical Analysis of Suppressed Tabular Data -- Assessing the Information Loss of Controlled Adjustment Methods in Two-Way Tables -- Further Developments with Perturbation Techniques to Protect Tabular Data -- Comparison of Different Sensitivity Rules for Tabular Data and Presenting a New Rule – The Interval Rule -- Pre-tabular Perturbation with Controlled Tabular Adjustment: Some Considerations -- Measuring Disclosure Risk with Entropy in Population Based Frequency Tables -- A CTA Model Based on the Huber Function -- Microdata Masking Density Approximant Based on Noise Multiplied Data -- Reverse Mapping to Preserve the Marginal Distributions of Attributes in Masked Microdata -- JPEG-Based Microdata Protection -- Protection Using Privacy Models -- Improving the Utility of Differential Privacy via Univariate Microaggregation -- Differentially Private Exponential Random Graphs -- km-Anonymity for Continuous Data Using Dynamic Hierarchies -- Differentially-Private Logistic Regression for Detecting Multiple-SNP Association in GWAS Databases -- Synthetic Data -- Disclosure Risk Evaluation for Fully Synthetic Categorical Data -- v-Dispersed Synthetic Data Based on a Mixture Model with Constraints -- Nonparametric Generation of Synthetic Data for Small Geographic Areas -- Using Partially Synthetic Data to Replace Suppression in the Business Dynamics Statistics: Early Results -- Synthetic Longitudinal Business Databases for International Comparisons -- Record Linkage -- A Comparison of Blocking Methods for Record Linkage -- Probabilistic Record Linkage for Disclosure Risk Assessment -- Hierarchical Linkage Clustering with Distributions of Distances for Large-Scale Record Linkage -- Remote Access -- Comparison of Two Remote Access Systems Recently Developed and Implemented in Australia -- Privacy-Preserving Protocols -- Towards Secure and Practical Location Privacy through Private Equality Testing -- Case Studies -- Controlled Shuffling, Statistical Confidentiality and Microdata Utility: A Successful Experiment with a 10% Household Sample of the 2011 Population Census of Ireland for the IPUMS-International Database -- Balancing Confidentiality and Usability: Protecting Sensitive Data in the Case of Inward Foreign AffiliaTes Statistics (FATS) -- Applicability of Confidentiality Methods to Personal and Business Data.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2014, held in Ibiza, Spain in September 2014 under the sponsorship of the UNESCO chair in Data Privacy. The 27 revised full papers presented were carefully reviewed and selected from 41 submissions. The scope of the conference is on following topics: tabular data protection, microdata masking, protection using privacy models, synthetic data, record linkage, remote access, privacy-preserving protocols, and case studies.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Database management.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Appl. in Administrative Data Processing.
|
650 |
2 |
4 |
|a Database Management.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
|
|a Domingo-Ferrer, Josep.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319112565
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8744
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-11257-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|