top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Privacy in Statistical Databases [[electronic resource] ] : CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Luisa Franconi
Privacy in Statistical Databases [[electronic resource] ] : CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Luisa Franconi
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XI, 383 p.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Data encryption (Computer science)
Database management
Mathematical statistics
Computers and civilization
Computers
Law and legislation
Artificial intelligence
Cryptology
Database Management
Probability and Statistics in Computer Science
Computers and Society
Legal Aspects of Computing
Artificial Intelligence
ISBN 3-540-49332-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Methods for Tabular Protection -- A Method for Preserving Statistical Distributions Subject to Controlled Tabular Adjustment -- Automatic Structure Detection in Constraints of Tabular Data -- A New Approach to Round Tabular Data -- Harmonizing Table Protection: Results of a Study -- Utility and Risk in Tabular Protection -- Effects of Rounding on the Quality and Confidentiality of Statistical Data -- Disclosure Analysis for Two-Way Contingency Tables -- Statistical Disclosure Control Methods Through a Risk-Utility Framework -- A Generalized Negative Binomial Smoothing Model for Sample Disclosure Risk Estimation -- Entry Uniqueness in Margined Tables -- Methods for Microdata Protection -- Combinations of SDC Methods for Microdata Protection -- A Fixed Structure Learning Automaton Micro-aggregation Technique for Secure Statistical Databases -- Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation -- Using the Jackknife Method to Produce Safe Plots of Microdata -- Combining Blanking and Noise Addition as a Data Disclosure Limitation Method -- Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric Data -- Adjusting Survey Weights When Altering Identifying Design Variables Via Synthetic Data -- Utility and Risk in Microdata Protection -- Risk, Utility and PRAM -- Distance Based Re-identification for Time Series, Analysis of Distances -- Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk -- Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk Assessment -- Improving Individual Risk Estimators -- Protocols for Private Computation -- Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases -- Privacy-Preserving Data Set Union -- “Secure” Log-Linear and Logistic Regression Analysis of Distributed Databases -- Case Studies -- Measuring the Impact of Data Protection Techniques on Data Utility: Evidence from the Survey of Consumer Finances -- Protecting the Confidentiality of Survey Tabular Data by Adding Noise to the Underlying Microdata: Application to the Commodity Flow Survey -- Italian Household Expenditure Survey: A Proposal for Data Dissemination -- Software -- The ARGUS Software in CENEX -- Software Development for SDC in R -- On Secure e-Health Systems -- IPUMS-International High Precision Population Census Microdata Samples: Balancing the Privacy-Quality Tradeoff by Means of Restricted Access Extracts.
Record Nr. UNISA-996466064403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Privacy in Statistical Databases : CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Luisa Franconi
Privacy in Statistical Databases : CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Luisa Franconi
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XI, 383 p.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Data encryption (Computer science)
Database management
Mathematical statistics
Computers and civilization
Computers
Law and legislation
Artificial intelligence
Cryptology
Database Management
Probability and Statistics in Computer Science
Computers and Society
Legal Aspects of Computing
Artificial Intelligence
ISBN 3-540-49332-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Methods for Tabular Protection -- A Method for Preserving Statistical Distributions Subject to Controlled Tabular Adjustment -- Automatic Structure Detection in Constraints of Tabular Data -- A New Approach to Round Tabular Data -- Harmonizing Table Protection: Results of a Study -- Utility and Risk in Tabular Protection -- Effects of Rounding on the Quality and Confidentiality of Statistical Data -- Disclosure Analysis for Two-Way Contingency Tables -- Statistical Disclosure Control Methods Through a Risk-Utility Framework -- A Generalized Negative Binomial Smoothing Model for Sample Disclosure Risk Estimation -- Entry Uniqueness in Margined Tables -- Methods for Microdata Protection -- Combinations of SDC Methods for Microdata Protection -- A Fixed Structure Learning Automaton Micro-aggregation Technique for Secure Statistical Databases -- Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation -- Using the Jackknife Method to Produce Safe Plots of Microdata -- Combining Blanking and Noise Addition as a Data Disclosure Limitation Method -- Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric Data -- Adjusting Survey Weights When Altering Identifying Design Variables Via Synthetic Data -- Utility and Risk in Microdata Protection -- Risk, Utility and PRAM -- Distance Based Re-identification for Time Series, Analysis of Distances -- Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk -- Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk Assessment -- Improving Individual Risk Estimators -- Protocols for Private Computation -- Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases -- Privacy-Preserving Data Set Union -- “Secure” Log-Linear and Logistic Regression Analysis of Distributed Databases -- Case Studies -- Measuring the Impact of Data Protection Techniques on Data Utility: Evidence from the Survey of Consumer Finances -- Protecting the Confidentiality of Survey Tabular Data by Adding Noise to the Underlying Microdata: Application to the Commodity Flow Survey -- Italian Household Expenditure Survey: A Proposal for Data Dissemination -- Software -- The ARGUS Software in CENEX -- Software Development for SDC in R -- On Secure e-Health Systems -- IPUMS-International High Precision Population Census Microdata Samples: Balancing the Privacy-Quality Tradeoff by Means of Restricted Access Extracts.
Record Nr. UNINA-9910484004503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy in Statistical Databases [[electronic resource] ] : CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004, Proceedings / / edited by Josep Domingo-Ferrer, Vicenc Torra
Privacy in Statistical Databases [[electronic resource] ] : CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004, Proceedings / / edited by Josep Domingo-Ferrer, Vicenc Torra
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (X, 374 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data structures (Computer science)
Data encryption (Computer science)
Database management
Mathematical statistics
Computers and civilization
Computers
Law and legislation
Data Structures and Information Theory
Cryptology
Database Management
Probability and Statistics in Computer Science
Computers and Society
Legal Aspects of Computing
ISBN 1-280-30771-4
9786610307715
3-540-25955-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foundations of Tabular Protection -- Survey on Methods for Tabular Data Protection in ARGUS -- Data Swapping: Variations on a Theme by Dalenius and Reiss -- Bounds for Cell Entries in Two-Way Tables Given Conditional Relative Frequencies -- Methods for Tabular Protection -- A New Tool for Applying Controlled Rounding to a Statistical Table in Microsoft Excel -- Getting the Best Results in Controlled Rounding with the Least Effort -- Computational Experiments with Minimum-Distance Controlled Perturbation Methods -- Balancing Quality and Confidentiality for Multivariate Tabular Data -- Reducing the Set of Tables ? -ARGUS Considers in a Hierarchical Setting -- Approaches to Identify the Amount of Publishable Information in Business Surveys through Waivers -- Maximum Utility-Minimum Information Loss Table Server Design for Statistical Disclosure Control of Tabular Data -- A Fast Network Flows Heuristic for Cell Suppression in Positive Tables -- Masking for Microdata Protection -- On the Security of Noise Addition for Privacy in Statistical Databases -- Microaggregation for Categorical Variables: A Median Based Approach -- Evaluating Fuzzy Clustering Algorithms for Microdata Protection -- To Blank or Not to Blank? A Comparison of the Effects of Disclosure Limitation Methods on Nonlinear Regression Estimates -- Outlier Protection in Continuous Microdata Masking -- Risk in Microdata Protection -- Re-identification Methods for Masked Microdata -- Masking and Re-identification Methods for Public-Use Microdata: Overview and Research Problems -- A Bayesian Hierarchical Model Approach to Risk Estimation in Statistical Disclosure Limitation -- Individual Risk Estimation in ?-Argus: A Review -- Analysis of Re-identification Risk Based on Log-Linear Models -- Synthetic Data -- New Approaches to Confidentiality Protection: Synthetic Data, Remote Access and Research Data Centers -- Multiply-Imputing Confidential Characteristics and File Links in Longitudinal Linked Data -- Fast Generation of Accurate Synthetic Microdata -- Software and Case Studies -- Trade-Off between Disclosure Risk and Information Loss Using Multivariate Microaggregation: A Case Study on Business Data -- The ARGUS Software in the CASC-Project -- Different Grades of Statistical Disclosure Control Correlated with German Statistics Law -- Developing Adoptable Disclosure Protection Techniques: Lessons Learned from a U.S. Experience -- Privacy Preserving and Data Mining in an On-Line Statistical Database of Additive Type.
Record Nr. UNISA-996466234503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Privacy in Statistical Databases : CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004, Proceedings / / edited by Josep Domingo-Ferrer, Vicenc Torra
Privacy in Statistical Databases : CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004, Proceedings / / edited by Josep Domingo-Ferrer, Vicenc Torra
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (X, 374 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data structures (Computer science)
Data encryption (Computer science)
Database management
Mathematical statistics
Computers and civilization
Computers
Law and legislation
Data Structures and Information Theory
Cryptology
Database Management
Probability and Statistics in Computer Science
Computers and Society
Legal Aspects of Computing
ISBN 1-280-30771-4
9786610307715
3-540-25955-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foundations of Tabular Protection -- Survey on Methods for Tabular Data Protection in ARGUS -- Data Swapping: Variations on a Theme by Dalenius and Reiss -- Bounds for Cell Entries in Two-Way Tables Given Conditional Relative Frequencies -- Methods for Tabular Protection -- A New Tool for Applying Controlled Rounding to a Statistical Table in Microsoft Excel -- Getting the Best Results in Controlled Rounding with the Least Effort -- Computational Experiments with Minimum-Distance Controlled Perturbation Methods -- Balancing Quality and Confidentiality for Multivariate Tabular Data -- Reducing the Set of Tables ? -ARGUS Considers in a Hierarchical Setting -- Approaches to Identify the Amount of Publishable Information in Business Surveys through Waivers -- Maximum Utility-Minimum Information Loss Table Server Design for Statistical Disclosure Control of Tabular Data -- A Fast Network Flows Heuristic for Cell Suppression in Positive Tables -- Masking for Microdata Protection -- On the Security of Noise Addition for Privacy in Statistical Databases -- Microaggregation for Categorical Variables: A Median Based Approach -- Evaluating Fuzzy Clustering Algorithms for Microdata Protection -- To Blank or Not to Blank? A Comparison of the Effects of Disclosure Limitation Methods on Nonlinear Regression Estimates -- Outlier Protection in Continuous Microdata Masking -- Risk in Microdata Protection -- Re-identification Methods for Masked Microdata -- Masking and Re-identification Methods for Public-Use Microdata: Overview and Research Problems -- A Bayesian Hierarchical Model Approach to Risk Estimation in Statistical Disclosure Limitation -- Individual Risk Estimation in ?-Argus: A Review -- Analysis of Re-identification Risk Based on Log-Linear Models -- Synthetic Data -- New Approaches to Confidentiality Protection: Synthetic Data, Remote Access and Research Data Centers -- Multiply-Imputing Confidential Characteristics and File Links in Longitudinal Linked Data -- Fast Generation of Accurate Synthetic Microdata -- Software and Case Studies -- Trade-Off between Disclosure Risk and Information Loss Using Multivariate Microaggregation: A Case Study on Business Data -- The ARGUS Software in the CASC-Project -- Different Grades of Statistical Disclosure Control Correlated with German Statistics Law -- Developing Adoptable Disclosure Protection Techniques: Lessons Learned from a U.S. Experience -- Privacy Preserving and Data Mining in an On-Line Statistical Database of Additive Type.
Record Nr. UNINA-9910768467003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society / / Lorenzo Cavallaro, Johannes Kinder, Josep Domingo-Ferrer
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society / / Lorenzo Cavallaro, Johannes Kinder, Josep Domingo-Ferrer
Autore Cavallaro Lorenzo
Pubbl/distr/stampa New York : , : Association for Computing Machinery, , 2019
Descrizione fisica 1 online resource (221 pages)
Disciplina 005.8
Soggetto topico Computer security
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910412112403321
Cavallaro Lorenzo  
New York : , : Association for Computing Machinery, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Card Research and Advanced Applications [[electronic resource] ] : 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling
Smart Card Research and Advanced Applications [[electronic resource] ] : 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 360 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computers and civilization
Computer communication systems
Operating systems (Computers)
Cryptology
Management of Computing and Information Systems
Computers and Society
Computer Communication Networks
Operating Systems
ISBN 3-540-33312-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Smart Card Applications -- Design, Installation and Execution of a Security Agent for Mobile Stations -- Towards a Secure and Practical Multifunctional Smart Card -- Implementing Cryptography on TFT Technology for Secure Display Applications -- A Smart Card-Based Mental Poker System -- A Smart Card Solution for Access Control and Trust Management for Nomadic Users -- Smart Cards and Residential Gateways: Improving OSGi Services with Java Cards -- Zero Footprint Secure Internet Authentication Using Network Smart Card -- An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items -- Side Channel Attacks -- Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations -- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis -- Power Analysis to ECC Using Differential Power Between Multiplication and Squaring -- Smart Card Networking -- Designing Smartcards for Emerging Wireless Networks -- Smartcard Firewalls Revisited -- Multi-stage Packet Filtering in Network Smart Cards -- Cryptographic Protocols -- Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability -- SEA: A Scalable Encryption Algorithm for Small Embedded Applications -- Low-Cost Cryptography for Privacy in RFID Systems -- Optimal Use of Montgomery Multiplication on Smart Cards -- Off-Line Group Signatures with Smart Cards -- RFID Security -- Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags -- Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags -- MARP: Mobile Agent for RFID Privacy Protection -- Formal Methods -- Certifying Native Java Card API by Formal Refinement -- A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods -- Automatic Test Generation on a (U)SIM Smart Card.
Record Nr. UNISA-996466113903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Smart Card Research and Advanced Applications : 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling
Smart Card Research and Advanced Applications : 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 360 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computers and civilization
Computer communication systems
Operating systems (Computers)
Cryptology
Management of Computing and Information Systems
Computers and Society
Computer Communication Networks
Operating Systems
ISBN 3-540-33312-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Smart Card Applications -- Design, Installation and Execution of a Security Agent for Mobile Stations -- Towards a Secure and Practical Multifunctional Smart Card -- Implementing Cryptography on TFT Technology for Secure Display Applications -- A Smart Card-Based Mental Poker System -- A Smart Card Solution for Access Control and Trust Management for Nomadic Users -- Smart Cards and Residential Gateways: Improving OSGi Services with Java Cards -- Zero Footprint Secure Internet Authentication Using Network Smart Card -- An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items -- Side Channel Attacks -- Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations -- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis -- Power Analysis to ECC Using Differential Power Between Multiplication and Squaring -- Smart Card Networking -- Designing Smartcards for Emerging Wireless Networks -- Smartcard Firewalls Revisited -- Multi-stage Packet Filtering in Network Smart Cards -- Cryptographic Protocols -- Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability -- SEA: A Scalable Encryption Algorithm for Small Embedded Applications -- Low-Cost Cryptography for Privacy in RFID Systems -- Optimal Use of Montgomery Multiplication on Smart Cards -- Off-Line Group Signatures with Smart Cards -- RFID Security -- Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags -- Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags -- MARP: Mobile Agent for RFID Privacy Protection -- Formal Methods -- Certifying Native Java Card API by Formal Refinement -- A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods -- Automatic Test Generation on a (U)SIM Smart Card.
Record Nr. UNINA-9910483040603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui