000 | 06738nam a22007335i 4500 | ||
---|---|---|---|
001 | 978-3-540-25955-8 | ||
003 | DE-He213 | ||
005 | 20240423125631.0 | ||
007 | cr nn 008mamaa | ||
008 | 121227s2004 gw | s |||| 0|eng d | ||
020 |
_a9783540259558 _9978-3-540-25955-8 |
||
024 | 7 |
_a10.1007/b97945 _2doi |
|
050 | 4 | _aQA76.9.D35 | |
050 | 4 | _aQ350-390 | |
072 | 7 |
_aUMB _2bicssc |
|
072 | 7 |
_aGPF _2bicssc |
|
072 | 7 |
_aCOM021000 _2bisacsh |
|
072 | 7 |
_aUMB _2thema |
|
072 | 7 |
_aGPF _2thema |
|
082 | 0 | 4 |
_a005.73 _223 |
082 | 0 | 4 |
_a003.54 _223 |
245 | 1 | 0 |
_aPrivacy in Statistical Databases _h[electronic resource] : _bCASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004, Proceedings / _cedited by Josep Domingo-Ferrer, Vicenc Torra. |
250 | _a1st ed. 2004. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2004. |
|
300 |
_aX, 374 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v3050 |
|
505 | 0 | _aFoundations of Tabular Protection -- Survey on Methods for Tabular Data Protection in ARGUS -- Data Swapping: Variations on a Theme by Dalenius and Reiss -- Bounds for Cell Entries in Two-Way Tables Given Conditional Relative Frequencies -- Methods for Tabular Protection -- A New Tool for Applying Controlled Rounding to a Statistical Table in Microsoft Excel -- Getting the Best Results in Controlled Rounding with the Least Effort -- Computational Experiments with Minimum-Distance Controlled Perturbation Methods -- Balancing Quality and Confidentiality for Multivariate Tabular Data -- Reducing the Set of Tables ? -ARGUS Considers in a Hierarchical Setting -- Approaches to Identify the Amount of Publishable Information in Business Surveys through Waivers -- Maximum Utility-Minimum Information Loss Table Server Design for Statistical Disclosure Control of Tabular Data -- A Fast Network Flows Heuristic for Cell Suppression in Positive Tables -- Masking for Microdata Protection -- On the Security of Noise Addition for Privacy in Statistical Databases -- Microaggregation for Categorical Variables: A Median Based Approach -- Evaluating Fuzzy Clustering Algorithms for Microdata Protection -- To Blank or Not to Blank? A Comparison of the Effects of Disclosure Limitation Methods on Nonlinear Regression Estimates -- Outlier Protection in Continuous Microdata Masking -- Risk in Microdata Protection -- Re-identification Methods for Masked Microdata -- Masking and Re-identification Methods for Public-Use Microdata: Overview and Research Problems -- A Bayesian Hierarchical Model Approach to Risk Estimation in Statistical Disclosure Limitation -- Individual Risk Estimation in ?-Argus: A Review -- Analysis of Re-identification Risk Based on Log-Linear Models -- Synthetic Data -- New Approaches toConfidentiality Protection: Synthetic Data, Remote Access and Research Data Centers -- Multiply-Imputing Confidential Characteristics and File Links in Longitudinal Linked Data -- Fast Generation of Accurate Synthetic Microdata -- Software and Case Studies -- Trade-Off between Disclosure Risk and Information Loss Using Multivariate Microaggregation: A Case Study on Business Data -- The ARGUS Software in the CASC-Project -- Different Grades of Statistical Disclosure Control Correlated with German Statistics Law -- Developing Adoptable Disclosure Protection Techniques: Lessons Learned from a U.S. Experience -- Privacy Preserving and Data Mining in an On-Line Statistical Database of Additive Type. | |
520 | _aPrivacy in statistical databases is about ?nding tradeo?s to the tension between the increasing societal and economical demand for accurate information and the legal and ethical obligation to protect the privacy of individuals and enterprises, which are the source of the statistical data. Statistical agencies cannot expect to collect accurate information from individual or corporate respondents unless these feel the privacy of their responses is guaranteed; also, recent surveys of Web users show that a majority of these are unwilling to provide data to a Web site unless they know that privacy protection measures are in place. “Privacy in Statistical Databases2004” (PSD2004) was the ?nal conference of the CASC project (“Computational Aspects of Statistical Con?dentiality”, IST-2000-25069). PSD2004 is in the style of the following conferences: “Stat- tical Data Protection”, held in Lisbon in 1998 and with proceedings published by the O?ce of O?cial Publications of the EC, and also the AMRADS project SDC Workshop, held in Luxemburg in 2001 and with proceedings published by Springer-Verlag, as LNCS Vol. 2316. The Program Committee accepted 29 papers out of 44 submissions from 15 di?erentcountriesonfourcontinents.Eachsubmittedpaperreceivedatleasttwo reviews. These proceedings contain the revised versions of the accepted papers. These papers cover the foundations and methods of tabular data protection, masking methods for the protection of individual data (microdata), synthetic data generation, disclosure risk analysis, and software/case studies. | ||
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aInformation theory. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aDatabase management. | |
650 | 0 |
_aComputer science _xMathematics. |
|
650 | 0 | _aMathematical statistics. | |
650 | 0 | _aComputers and civilization. | |
650 | 0 |
_aComputers _xLaw and legislation. |
|
650 | 0 |
_aInformation technology _xLaw and legislation. |
|
650 | 1 | 4 | _aData Structures and Information Theory. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aDatabase Management. |
650 | 2 | 4 | _aProbability and Statistics in Computer Science. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aLegal Aspects of Computing. |
700 | 1 |
_aDomingo-Ferrer, Josep. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aTorra, Vicenc. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540221180 |
776 | 0 | 8 |
_iPrinted edition: _z9783662203705 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v3050 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/b97945 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
912 | _aZDB-2-BAE | ||
942 | _cSPRINGER | ||
999 |
_c180095 _d180095 |