|
|
|
|
LEADER |
06255nam a22006135i 4500 |
001 |
978-3-540-25955-8 |
003 |
DE-He213 |
005 |
20151204163014.0 |
007 |
cr nn 008mamaa |
008 |
121227s2004 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540259558
|9 978-3-540-25955-8
|
024 |
7 |
|
|a 10.1007/b97945
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D35
|
072 |
|
7 |
|a UMB
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.74
|2 23
|
245 |
1 |
0 |
|a Privacy in Statistical Databases
|h [electronic resource] :
|b CASC Project Final Conference, PSD 2004, Barcelona, Spain, June 9-11, 2004. Proceedings /
|c edited by Josep Domingo-Ferrer, Vicenç Torra.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2004.
|
300 |
|
|
|a X, 374 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 3050
|
505 |
0 |
|
|a Foundations of Tabular Protection -- Survey on Methods for Tabular Data Protection in ARGUS -- Data Swapping: Variations on a Theme by Dalenius and Reiss -- Bounds for Cell Entries in Two-Way Tables Given Conditional Relative Frequencies -- Methods for Tabular Protection -- A New Tool for Applying Controlled Rounding to a Statistical Table in Microsoft Excel -- Getting the Best Results in Controlled Rounding with the Least Effort -- Computational Experiments with Minimum-Distance Controlled Perturbation Methods -- Balancing Quality and Confidentiality for Multivariate Tabular Data -- Reducing the Set of Tables ? -ARGUS Considers in a Hierarchical Setting -- Approaches to Identify the Amount of Publishable Information in Business Surveys through Waivers -- Maximum Utility-Minimum Information Loss Table Server Design for Statistical Disclosure Control of Tabular Data -- A Fast Network Flows Heuristic for Cell Suppression in Positive Tables -- Masking for Microdata Protection -- On the Security of Noise Addition for Privacy in Statistical Databases -- Microaggregation for Categorical Variables: A Median Based Approach -- Evaluating Fuzzy Clustering Algorithms for Microdata Protection -- To Blank or Not to Blank? A Comparison of the Effects of Disclosure Limitation Methods on Nonlinear Regression Estimates -- Outlier Protection in Continuous Microdata Masking -- Risk in Microdata Protection -- Re-identification Methods for Masked Microdata -- Masking and Re-identification Methods for Public-Use Microdata: Overview and Research Problems -- A Bayesian Hierarchical Model Approach to Risk Estimation in Statistical Disclosure Limitation -- Individual Risk Estimation in ?-Argus: A Review -- Analysis of Re-identification Risk Based on Log-Linear Models -- Synthetic Data -- New Approaches to Confidentiality Protection: Synthetic Data, Remote Access and Research Data Centers -- Multiply-Imputing Confidential Characteristics and File Links in Longitudinal Linked Data -- Fast Generation of Accurate Synthetic Microdata -- Software and Case Studies -- Trade-Off between Disclosure Risk and Information Loss Using Multivariate Microaggregation: A Case Study on Business Data -- The ARGUS Software in the CASC-Project -- Different Grades of Statistical Disclosure Control Correlated with German Statistics Law -- Developing Adoptable Disclosure Protection Techniques: Lessons Learned from a U.S. Experience -- Privacy Preserving and Data Mining in an On-Line Statistical Database of Additive Type.
|
520 |
|
|
|a Privacy in statistical databases is about ?nding tradeo?s to the tension between the increasing societal and economical demand for accurate information and the legal and ethical obligation to protect the privacy of individuals and enterprises, which are the source of the statistical data. Statistical agencies cannot expect to collect accurate information from individual or corporate respondents unless these feel the privacy of their responses is guaranteed; also, recent surveys of Web users show that a majority of these are unwilling to provide data to a Web site unless they know that privacy protection measures are in place. “Privacy in Statistical Databases2004” (PSD2004) was the ?nal conference of the CASC project (“Computational Aspects of Statistical Con?dentiality”, IST-2000-25069). PSD2004 is in the style of the following conferences: “Stat- tical Data Protection”, held in Lisbon in 1998 and with proceedings published by the O?ce of O?cial Publications of the EC, and also the AMRADS project SDC Workshop, held in Luxemburg in 2001 and with proceedings published by Springer-Verlag, as LNCS Vol. 2316. The Program Committee accepted 29 papers out of 44 submissions from 15 di?erentcountriesonfourcontinents.Eachsubmittedpaperreceivedatleasttwo reviews. These proceedings contain the revised versions of the accepted papers. These papers cover the foundations and methods of tabular data protection, masking methods for the protection of individual data (microdata), synthetic data generation, disclosure risk analysis, and software/case studies.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Mathematical statistics.
|
650 |
|
0 |
|a Database management.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Law and legislation.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Database Management.
|
650 |
2 |
4 |
|a Probability and Statistics in Computer Science.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|
700 |
1 |
|
|a Domingo-Ferrer, Josep.
|e editor.
|
700 |
1 |
|
|a Torra, Vicenç.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540221180
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 3050
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/b97945
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Computer Science (Springer-11645)
|