LEADER 05905nam 22007695 450 001 9910483063403321 005 20200701091623.0 010 $a3-319-11257-0 024 7 $a10.1007/978-3-319-11257-2 035 $a(CKB)3710000000249763 035 $a(SSID)ssj0001354252 035 $a(PQKBManifestationID)11777055 035 $a(PQKBTitleCode)TC0001354252 035 $a(PQKBWorkID)11322660 035 $a(PQKB)10785675 035 $a(DE-He213)978-3-319-11257-2 035 $a(MiAaPQ)EBC6307214 035 $a(MiAaPQ)EBC5579613 035 $a(Au-PeEL)EBL5579613 035 $a(OCoLC)891181120 035 $a(PPN)181351854 035 $a(EXLCZ)993710000000249763 100 $a20140910d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPrivacy in Statistical Databases $eUNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings /$fedited by Josep Domingo-Ferrer 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XII, 367 p. 68 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v8744 300 $aIncludes index. 311 $a3-319-11256-2 327 $aTabular Data Protection -- Enabling Statistical Analysis of Suppressed Tabular Data -- Assessing the Information Loss of Controlled Adjustment Methods in Two-Way Tables -- Further Developments with Perturbation Techniques to Protect Tabular Data -- Comparison of Different Sensitivity Rules for Tabular Data and Presenting a New Rule ? The Interval Rule -- Pre-tabular Perturbation with Controlled Tabular Adjustment: Some Considerations -- Measuring Disclosure Risk with Entropy in Population Based Frequency Tables -- A CTA Model Based on the Huber Function -- Microdata Masking Density Approximant Based on Noise Multiplied Data -- Reverse Mapping to Preserve the Marginal Distributions of Attributes in Masked Microdata -- JPEG-Based Microdata Protection -- Protection Using Privacy Models -- Improving the Utility of Differential Privacy via Univariate Microaggregation -- Differentially Private Exponential Random Graphs -- km-Anonymity for Continuous Data Using Dynamic Hierarchies -- Differentially-Private Logistic Regression for Detecting Multiple-SNP Association in GWAS Databases -- Synthetic Data -- Disclosure Risk Evaluation for Fully Synthetic Categorical Data -- v-Dispersed Synthetic Data Based on a Mixture Model with Constraints -- Nonparametric Generation of Synthetic Data for Small Geographic Areas -- Using Partially Synthetic Data to Replace Suppression in the Business Dynamics Statistics: Early Results -- Synthetic Longitudinal Business Databases for International Comparisons -- Record Linkage -- A Comparison of Blocking Methods for Record Linkage -- Probabilistic Record Linkage for Disclosure Risk Assessment -- Hierarchical Linkage Clustering with Distributions of Distances for Large-Scale Record Linkage -- Remote Access -- Comparison of Two Remote Access Systems Recently Developed and Implemented in Australia -- Privacy-Preserving Protocols -- Towards Secure and Practical Location Privacy through Private Equality Testing -- Case Studies -- Controlled Shuffling, Statistical Confidentiality and Microdata Utility: A Successful Experiment with a 10% Household Sample of the 2011 Population Census of Ireland for the IPUMS-International Database -- Balancing Confidentiality and Usability: Protecting Sensitive Data in the Case of Inward Foreign AffiliaTes Statistics (FATS) -- Applicability of Confidentiality Methods to Personal and Business Data. 330 $aThis book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2014, held in Ibiza, Spain in September 2014 under the sponsorship of the UNESCO chair in Data Privacy. The 27 revised full papers presented were carefully reviewed and selected from 41 submissions. The scope of the conference is on following topics: tabular data protection, microdata masking, protection using privacy models, synthetic data, record linkage, remote access, privacy-preserving protocols, and case studies. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v8744 606 $aApplication software 606 $aDatabase management 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aComputer Appl. in Administrative Data Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/I2301X 606 $aDatabase Management$3https://scigraph.springernature.com/ontologies/product-market-codes/I18024 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aApplication software. 615 0$aDatabase management. 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 14$aComputer Appl. in Administrative Data Processing. 615 24$aDatabase Management. 615 24$aSystems and Data Security. 615 24$aCryptology. 615 24$aComputers and Society. 676 $a005.8 702 $aDomingo-Ferrer$b Josep$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483063403321 996 $aPrivacy in Statistical Databases$92916060 997 $aUNINA