|
|
|
|
LEADER |
02974nam a22006135i 4500 |
001 |
978-3-319-45381-1 |
003 |
DE-He213 |
005 |
20160830110508.0 |
007 |
cr nn 008mamaa |
008 |
160830s2016 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319453811
|9 978-3-319-45381-1
|
024 |
7 |
|
|a 10.1007/978-3-319-45381-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.76.A65
|
050 |
|
4 |
|a TA345-345.5
|
072 |
|
7 |
|a JPP
|2 bicssc
|
072 |
|
7 |
|a UB
|2 bicssc
|
072 |
|
7 |
|a COM018000
|2 bisacsh
|
072 |
|
7 |
|a POL017000
|2 bisacsh
|
082 |
0 |
4 |
|a 004
|2 23
|
245 |
1 |
0 |
|a Privacy in Statistical Databases
|h [electronic resource] :
|b UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14–16, 2016, Proceedings /
|c edited by Josep Domingo-Ferrer, Mirjana Pejić-Bach.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a X, 273 p. 45 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 9867
|
505 |
0 |
|
|a Tabular Data Protection -- Microdata and Big Data Masking -- Protection Using Privacy Models -- Synthetic Data -- Remote and Cloud Access -- Disclosure Risk Assessment -- Co-utile Anonymization.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2016, held in Dubrovnik, Croatia in September 2016 under the sponsorship of the UNESCO chair in Data Privacy. The 19 revised full papers presented were carefully reviewed and selected from 35 submissions. The scope of the conference is on following topics: tabular data protection; microdata and big data masking; protection using privacy models; synthetic data; remote and cloud access; disclosure risk assessment; co-utile anonymization.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Database management.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Appl. in Administrative Data Processing.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Database Management.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
|
|a Domingo-Ferrer, Josep.
|e editor.
|
700 |
1 |
|
|a Pejić-Bach, Mirjana.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319453804
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 9867
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-45381-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|