LEADER 01723cam2-2200457---450 001 990000571920203316 005 20200316142816.0 035 $a0057192 035 $aUSA010057192 035 $a(ALEPH)000057192USA01 035 $a0057192 100 $a20010718d1995----km-y0itay0103----ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $a<> tempi del rinnovamento$v1$fa cura di Serge Vanvolsem, Franco Musarra, Bart van den Bossche 210 $aRoma$cBulzoni$aLeuven$cLeuven university press$dc1995 215 $a770 p.$d21 cm 225 2 $aLeuven university$v5 410 $12001$aLeuven university$v5 461 1$10010057190$12001$aAtti del Convegno internazionale Rinnovamento del codice narrativo in Italia dal 1945 al 1992$eLeuven, Louvain-la Neuve, Namur, Bruxelles, 3-8 maggio 1993 606 0 $aNarrativa italiana$z1945-1990$xAtti di congressi$2BNCF 676 $a853.91409 702 1$aVANVOLSEM,$bSerge 702 1$aMUSARRA,$bFranco 702 1$aBOSSCHE, Bart : van den 710 12$aConvegno internazionale Rinnovamento del codice narrativo in Italia dal 1945 al 1992 <1993 ; Lovanio etc.>$0546720 801 0$aIT$bsalbc$gISBD 912 $a990000571920203316 951 $aVI.3.A. 1093/1a(V C 1569/1)$b132674 LM$cV C 951 $aVI.3.A. 1093/1(V C 1569/1 BIS)$b149548 LM$cV C 959 $aBK 969 $aUMA 979 $aPATTY$b90$c20010718$lUSA01$h1225 979 $aPATTY$b90$c20010718$lUSA01$h1230 979 $c20020403$lUSA01$h1706 979 $aPATRY$b90$c20040406$lUSA01$h1640 979 $aCOPAT2$b90$c20060111$lUSA01$h1654 979 $aCOPAT3$b90$c20060307$lUSA01$h0855 996 $aTempi del rinnovamento$9884327 997 $aUNISA LEADER 07034nam 22007935 450 001 996466064403316 005 20200630004927.0 010 $a3-540-49332-8 024 7 $a10.1007/11930242 035 $a(CKB)1000000000283970 035 $a(SSID)ssj0000319555 035 $a(PQKBManifestationID)11937735 035 $a(PQKBTitleCode)TC0000319555 035 $a(PQKBWorkID)10339055 035 $a(PQKB)11134358 035 $a(DE-He213)978-3-540-49332-7 035 $a(MiAaPQ)EBC3068446 035 $a(PPN)123139708 035 $a(EXLCZ)991000000000283970 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPrivacy in Statistical Databases$b[electronic resource] $eCENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings /$fedited by Josep Domingo-Ferrer, Luisa Franconi 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XI, 383 p.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v4302 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-49330-1 320 $aIncludes bibliographical references and index. 327 $aMethods for Tabular Protection -- A Method for Preserving Statistical Distributions Subject to Controlled Tabular Adjustment -- Automatic Structure Detection in Constraints of Tabular Data -- A New Approach to Round Tabular Data -- Harmonizing Table Protection: Results of a Study -- Utility and Risk in Tabular Protection -- Effects of Rounding on the Quality and Confidentiality of Statistical Data -- Disclosure Analysis for Two-Way Contingency Tables -- Statistical Disclosure Control Methods Through a Risk-Utility Framework -- A Generalized Negative Binomial Smoothing Model for Sample Disclosure Risk Estimation -- Entry Uniqueness in Margined Tables -- Methods for Microdata Protection -- Combinations of SDC Methods for Microdata Protection -- A Fixed Structure Learning Automaton Micro-aggregation Technique for Secure Statistical Databases -- Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation -- Using the Jackknife Method to Produce Safe Plots of Microdata -- Combining Blanking and Noise Addition as a Data Disclosure Limitation Method -- Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric Data -- Adjusting Survey Weights When Altering Identifying Design Variables Via Synthetic Data -- Utility and Risk in Microdata Protection -- Risk, Utility and PRAM -- Distance Based Re-identification for Time Series, Analysis of Distances -- Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk -- Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk Assessment -- Improving Individual Risk Estimators -- Protocols for Private Computation -- Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases -- Privacy-Preserving Data Set Union -- ?Secure? Log-Linear and Logistic Regression Analysis of Distributed Databases -- Case Studies -- Measuring the Impact of Data Protection Techniques on Data Utility: Evidence from the Survey of Consumer Finances -- Protecting the Confidentiality of Survey Tabular Data by Adding Noise to the Underlying Microdata: Application to the Commodity Flow Survey -- Italian Household Expenditure Survey: A Proposal for Data Dissemination -- Software -- The ARGUS Software in CENEX -- Software Development for SDC in R -- On Secure e-Health Systems -- IPUMS-International High Precision Population Census Microdata Samples: Balancing the Privacy-Quality Tradeoff by Means of Restricted Access Extracts. 330 $aPrivacy in statistical databases is a discipline whose purpose is to provide - lutions to the con?ict between the increasing social, political and economical demand of accurate information, and the legal and ethical obligation to protect the privacy of the individuals and enterprises to which statistical data refer. - yond law and ethics, there are also practical reasons for statistical agencies and data collectors to invest in this topic: if individual and corporate respondents feel their privacyguaranteed,they arelikelyto providemoreaccurateresponses. There are at least two traditions in statistical database privacy: one stems from o?cial statistics, where the discipline is also known as statistical disclosure control (SDC), and the other originates from computer science and database technology.Bothstartedinthe1970s,butthe1980sandtheearly1990ssawlittle privacy activity on the computer science side. The Internet era has strengthened the interest of both statisticians and computer scientists in this area. Along with the traditional topics of tabular and microdata protection, some research lines have revived and/or appeared, such as privacy in queryable databases and protocols for private data computation. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v4302 606 $aData encryption (Computer science) 606 $aDatabase management 606 $aMathematical statistics 606 $aComputers and civilization 606 $aComputers 606 $aLaw and legislation 606 $aArtificial intelligence 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aDatabase Management$3https://scigraph.springernature.com/ontologies/product-market-codes/I18024 606 $aProbability and Statistics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17036 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aData encryption (Computer science). 615 0$aDatabase management. 615 0$aMathematical statistics. 615 0$aComputers and civilization. 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aArtificial intelligence. 615 14$aCryptology. 615 24$aDatabase Management. 615 24$aProbability and Statistics in Computer Science. 615 24$aComputers and Society. 615 24$aLegal Aspects of Computing. 615 24$aArtificial Intelligence. 676 $a005.8 702 $aDomingo-Ferrer$b Josep$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFranconi$b Luisa$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996466064403316 996 $aPrivacy in Statistical Databases$9772125 997 $aUNISA