咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 10 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 10 篇 计算机科学与技术...
    • 1 篇 信息与通信工程
    • 1 篇 软件工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 10 篇 privacy in stati...
  • 3 篇 microaggregation
  • 2 篇 combinatorial de...
  • 2 篇 private informat...
  • 2 篇 k-anonymity
  • 2 篇 statistical disc...
  • 2 篇 record linkage
  • 1 篇 linear regressio...
  • 1 篇 perturbative pro...
  • 1 篇 information loss...
  • 1 篇 information util...
  • 1 篇 rank swapping
  • 1 篇 ring signatures
  • 1 篇 data preprocessi...
  • 1 篇 data quality
  • 1 篇 disclosure risk
  • 1 篇 artificial neura...
  • 1 篇 economic price t...
  • 1 篇 time series priv...
  • 1 篇 privacy

机构

  • 1 篇 csic iiia spanis...
  • 1 篇 univ pretoria sa...
  • 1 篇 csic artificial ...
  • 1 篇 univ rovira & vi...
  • 1 篇 spanish natl res...
  • 1 篇 univ politecn ca...
  • 1 篇 spanish natl res...
  • 1 篇 spanish natl res...
  • 1 篇 univ politecn ca...
  • 1 篇 univ rovira & vi...
  • 1 篇 univ politecn ca...
  • 1 篇 univ politecn ca...

作者

  • 7 篇 nin jordi
  • 3 篇 muntes-mulero vi...
  • 3 篇 medrano-gracia p...
  • 3 篇 pont-tuset jordi
  • 3 篇 torra vicenc
  • 2 篇 domingo-ferrer j...
  • 2 篇 bras-amoros mari...
  • 2 篇 herranz javier
  • 1 篇 larriba-pey jose...
  • 1 篇 olivier martin s...
  • 1 篇 larriba-pey jose...
  • 1 篇 wu qianhong
  • 1 篇 manjon jesus
  • 1 篇 zielinski marek ...

语言

  • 10 篇 英文
检索条件"主题词=Privacy in Statistical Databases"
10 条 记 录,以下是1-10 订阅
排序:
Beyond Multivariate Microaggregation for Large Record Anonymization  2
Beyond Multivariate Microaggregation for Large Record Anonym...
收藏 引用
2nd International Workshop on Citizen Sensor Networks (CitiSens)
作者: Nin, Jordi Univ Politecn Catalunya BarcelonaTech BSC Barcelona Catalonia Spain
Microaggregation is one of the most commonly employed microdata protection methods. The basic idea of microaggregation is to anonymize data by aggregating original records into small groups of at least k elements and,... 详细信息
来源: 评论
On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation
收藏 引用
DATA & KNOWLEDGE ENGINEERING 2010年 第5期69卷 399-423页
作者: Zielinski, Marek P. Olivier, Martin S. Univ Pretoria SAP Reasearch ZA-0020 Pretoria South Africa
Ideally, when microdata is anonymised, we should maximize both the level of privacy and the level information utility of a released microdata set. However, since privacy and information utility are conflicting require... 详细信息
来源: 评论
User-private information retrieval based on a peer-to-peer community
收藏 引用
DATA & KNOWLEDGE ENGINEERING 2009年 第11期68卷 1237-1252页
作者: Domingo-Ferrer, Josep Bras-Amoros, Maria Wu, Qianhong Manjon, Jesus Univ Rovira & Virgili Dept Comp Engn & Math UNESCO Chair Data Privacy E-43007 Tarragona Catalonia Spain
Private information retrieval (PIR) is normally modeled as a game between two players: a user and a database. The user wants to retrieve some item from the database without the latter learning which item is retrieved.... 详细信息
来源: 评论
Towards the evaluation of time series protection methods
收藏 引用
INFORMATION SCIENCES 2009年 第11期179卷 1663-1677页
作者: Nin, Jordi Torra, Vicenc CSIC Artificial Intelligence Res Inst IIIA Bellaterra 08193 Catalonia Spain
The goal of statistical disclosure control (SDC) is to modify statistical data so I hat it can be published without releasing confidential information that may be linked to specific respondents. The challenge for SDC ... 详细信息
来源: 评论
On the disclosure risk of multivariate microaggregation
收藏 引用
DATA & KNOWLEDGE ENGINEERING 2008年 第3期67卷 399-412页
作者: Nin, Jordi Herranz, Javier Torra, Vicenc Spanish Natl Res Council CSIC Artificial Intelligence Res Inst IIIA Bellaterra 08193 Catalonia Spain
The aim of data protection methods is to protect a microdata file both minimizing the disclosure risk and preserving the data utility. Microaggregation is one of the most popular such methods among statistical agencie... 详细信息
来源: 评论
Rethinking rank swapping to decrease disclosure risk
收藏 引用
DATA & KNOWLEDGE ENGINEERING 2008年 第1期64卷 346-364页
作者: Nin, Jordi Herranz, Javier Torra, Vicenc Spanish Natl Res Council CSIC Artificial Intelligence Res Inst Bellaterra 08193 Catalonia Spain
Nowadays, the need for privacy motivates the use of methods that allow to protect a microdata file both minimizing the disclosure risk and preserving the data utility. A very popular microdata protection method is ran... 详细信息
来源: 评论
Peer-to-Peer Private Information Retrieval
收藏 引用
International Conference on privacy in statistical databases
作者: Domingo-Ferrer, Josep Bras-Amoros, Maria Univ Rovira & Virgili UNESCO Chair Data Privacy Dept Comp Engn & Math E-43007 Tarragona Spain
Private information retrieval (PIR) is normally modeled as a game between two players: a user and a database. The user wants to retrieve some item from the database without the latter learning which item. Most current... 详细信息
来源: 评论
ONN the use of neural networks for data privacy  1
收藏 引用
34th Conference on Current Trends in Theory and Practice of Computer Science
作者: Pont-Tuset, Jordi Medrano-Gracia, Pau Nin, Jordi Larriba-Pey, Josep-L. Muntes-Mulero, Victor Univ Politecn Cataluna Comp Architecture Dept DAMA UPC Campus Nord UPC ES-08034 Barcelona Spain CSIC IIIA Spanish Natl Res Council Artificial Intelligence Res Inst Bellaterra 08193 Spain
The need for data privacy motivates the development of new methods that allow to protect data minimizing. the disclosure risk without losing valuable statistical information. In this paper, we propose a new protection... 详细信息
来源: 评论
Improving Microaggregation for Complex Record Anonymization
Improving Microaggregation for Complex Record Anonymization
收藏 引用
5th International Conference on Modeling Decisions for Artificial Intelligence
作者: Pont-Tuset, Jordi Nin, Jordi Medrano-Gracia, Pau Larriba-Pey, Josep Ll. Muntes-Mulero, Victor Univ Politecn Cataluna DAMA Comp Architecture Dept Campus Nord UPCC Jordi Girona 1-3 ES-08034 Barcelona Catalonia Spain
Microaggregation is one of the most commonly employed microdata protection methods. This method builds clusters of at least k original records and replaces the records in each cluster with the centroid of the cluster.... 详细信息
来源: 评论
Ordered data set vectorization for linear regression on data privacy
Ordered data set vectorization for linear regression on data...
收藏 引用
4th International Conference on Modeling Decisions for Artificial Intelligence
作者: Medrano-Gracia, Pau Pont-Tuset, Jordi Nin, Jordi Muntes-Mulero, Victor Univ Politecn Cataluna Comp Architecture Dept DAMA UPC Campus Nord UPCC Jordi Girona 1-3 Barcelona 08034 Spain Spanish Natl Res Council CSIC Artificial Intelligence Res Inst Bellaterra Spain
Many situations demand from publishing data without revealing the confidential information in it. Among several data protection methods proposed in the literature, those based on linear regression are widely used for ... 详细信息
来源: 评论