Privacy in Statistical Databases [[electronic resource] ] : CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Luisa Franconi |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XI, 383 p.) |
Disciplina | 005.8 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Data encryption (Computer science)
Database management Mathematical statistics Computers and civilization Computers Law and legislation Artificial intelligence Cryptology Database Management Probability and Statistics in Computer Science Computers and Society Legal Aspects of Computing Artificial Intelligence |
ISBN | 3-540-49332-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Methods for Tabular Protection -- A Method for Preserving Statistical Distributions Subject to Controlled Tabular Adjustment -- Automatic Structure Detection in Constraints of Tabular Data -- A New Approach to Round Tabular Data -- Harmonizing Table Protection: Results of a Study -- Utility and Risk in Tabular Protection -- Effects of Rounding on the Quality and Confidentiality of Statistical Data -- Disclosure Analysis for Two-Way Contingency Tables -- Statistical Disclosure Control Methods Through a Risk-Utility Framework -- A Generalized Negative Binomial Smoothing Model for Sample Disclosure Risk Estimation -- Entry Uniqueness in Margined Tables -- Methods for Microdata Protection -- Combinations of SDC Methods for Microdata Protection -- A Fixed Structure Learning Automaton Micro-aggregation Technique for Secure Statistical Databases -- Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation -- Using the Jackknife Method to Produce Safe Plots of Microdata -- Combining Blanking and Noise Addition as a Data Disclosure Limitation Method -- Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric Data -- Adjusting Survey Weights When Altering Identifying Design Variables Via Synthetic Data -- Utility and Risk in Microdata Protection -- Risk, Utility and PRAM -- Distance Based Re-identification for Time Series, Analysis of Distances -- Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk -- Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk Assessment -- Improving Individual Risk Estimators -- Protocols for Private Computation -- Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases -- Privacy-Preserving Data Set Union -- “Secure” Log-Linear and Logistic Regression Analysis of Distributed Databases -- Case Studies -- Measuring the Impact of Data Protection Techniques on Data Utility: Evidence from the Survey of Consumer Finances -- Protecting the Confidentiality of Survey Tabular Data by Adding Noise to the Underlying Microdata: Application to the Commodity Flow Survey -- Italian Household Expenditure Survey: A Proposal for Data Dissemination -- Software -- The ARGUS Software in CENEX -- Software Development for SDC in R -- On Secure e-Health Systems -- IPUMS-International High Precision Population Census Microdata Samples: Balancing the Privacy-Quality Tradeoff by Means of Restricted Access Extracts. |
Record Nr. | UNISA-996466064403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Privacy in Statistical Databases : CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Luisa Franconi |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XI, 383 p.) |
Disciplina | 005.8 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Data encryption (Computer science)
Database management Mathematical statistics Computers and civilization Computers Law and legislation Artificial intelligence Cryptology Database Management Probability and Statistics in Computer Science Computers and Society Legal Aspects of Computing Artificial Intelligence |
ISBN | 3-540-49332-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Methods for Tabular Protection -- A Method for Preserving Statistical Distributions Subject to Controlled Tabular Adjustment -- Automatic Structure Detection in Constraints of Tabular Data -- A New Approach to Round Tabular Data -- Harmonizing Table Protection: Results of a Study -- Utility and Risk in Tabular Protection -- Effects of Rounding on the Quality and Confidentiality of Statistical Data -- Disclosure Analysis for Two-Way Contingency Tables -- Statistical Disclosure Control Methods Through a Risk-Utility Framework -- A Generalized Negative Binomial Smoothing Model for Sample Disclosure Risk Estimation -- Entry Uniqueness in Margined Tables -- Methods for Microdata Protection -- Combinations of SDC Methods for Microdata Protection -- A Fixed Structure Learning Automaton Micro-aggregation Technique for Secure Statistical Databases -- Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation -- Using the Jackknife Method to Produce Safe Plots of Microdata -- Combining Blanking and Noise Addition as a Data Disclosure Limitation Method -- Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric Data -- Adjusting Survey Weights When Altering Identifying Design Variables Via Synthetic Data -- Utility and Risk in Microdata Protection -- Risk, Utility and PRAM -- Distance Based Re-identification for Time Series, Analysis of Distances -- Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk -- Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk Assessment -- Improving Individual Risk Estimators -- Protocols for Private Computation -- Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases -- Privacy-Preserving Data Set Union -- “Secure” Log-Linear and Logistic Regression Analysis of Distributed Databases -- Case Studies -- Measuring the Impact of Data Protection Techniques on Data Utility: Evidence from the Survey of Consumer Finances -- Protecting the Confidentiality of Survey Tabular Data by Adding Noise to the Underlying Microdata: Application to the Commodity Flow Survey -- Italian Household Expenditure Survey: A Proposal for Data Dissemination -- Software -- The ARGUS Software in CENEX -- Software Development for SDC in R -- On Secure e-Health Systems -- IPUMS-International High Precision Population Census Microdata Samples: Balancing the Privacy-Quality Tradeoff by Means of Restricted Access Extracts. |
Record Nr. | UNINA-9910484004503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy in Statistical Databases [[electronic resource] ] : CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004, Proceedings / / edited by Josep Domingo-Ferrer, Vicenc Torra |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (X, 374 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data structures (Computer science)
Data encryption (Computer science) Database management Mathematical statistics Computers and civilization Computers Law and legislation Data Structures and Information Theory Cryptology Database Management Probability and Statistics in Computer Science Computers and Society Legal Aspects of Computing |
ISBN |
1-280-30771-4
9786610307715 3-540-25955-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foundations of Tabular Protection -- Survey on Methods for Tabular Data Protection in ARGUS -- Data Swapping: Variations on a Theme by Dalenius and Reiss -- Bounds for Cell Entries in Two-Way Tables Given Conditional Relative Frequencies -- Methods for Tabular Protection -- A New Tool for Applying Controlled Rounding to a Statistical Table in Microsoft Excel -- Getting the Best Results in Controlled Rounding with the Least Effort -- Computational Experiments with Minimum-Distance Controlled Perturbation Methods -- Balancing Quality and Confidentiality for Multivariate Tabular Data -- Reducing the Set of Tables ? -ARGUS Considers in a Hierarchical Setting -- Approaches to Identify the Amount of Publishable Information in Business Surveys through Waivers -- Maximum Utility-Minimum Information Loss Table Server Design for Statistical Disclosure Control of Tabular Data -- A Fast Network Flows Heuristic for Cell Suppression in Positive Tables -- Masking for Microdata Protection -- On the Security of Noise Addition for Privacy in Statistical Databases -- Microaggregation for Categorical Variables: A Median Based Approach -- Evaluating Fuzzy Clustering Algorithms for Microdata Protection -- To Blank or Not to Blank? A Comparison of the Effects of Disclosure Limitation Methods on Nonlinear Regression Estimates -- Outlier Protection in Continuous Microdata Masking -- Risk in Microdata Protection -- Re-identification Methods for Masked Microdata -- Masking and Re-identification Methods for Public-Use Microdata: Overview and Research Problems -- A Bayesian Hierarchical Model Approach to Risk Estimation in Statistical Disclosure Limitation -- Individual Risk Estimation in ?-Argus: A Review -- Analysis of Re-identification Risk Based on Log-Linear Models -- Synthetic Data -- New Approaches to Confidentiality Protection: Synthetic Data, Remote Access and Research Data Centers -- Multiply-Imputing Confidential Characteristics and File Links in Longitudinal Linked Data -- Fast Generation of Accurate Synthetic Microdata -- Software and Case Studies -- Trade-Off between Disclosure Risk and Information Loss Using Multivariate Microaggregation: A Case Study on Business Data -- The ARGUS Software in the CASC-Project -- Different Grades of Statistical Disclosure Control Correlated with German Statistics Law -- Developing Adoptable Disclosure Protection Techniques: Lessons Learned from a U.S. Experience -- Privacy Preserving and Data Mining in an On-Line Statistical Database of Additive Type. |
Record Nr. | UNISA-996466234503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Privacy in Statistical Databases : CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004, Proceedings / / edited by Josep Domingo-Ferrer, Vicenc Torra |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (X, 374 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data structures (Computer science)
Data encryption (Computer science) Database management Mathematical statistics Computers and civilization Computers Law and legislation Data Structures and Information Theory Cryptology Database Management Probability and Statistics in Computer Science Computers and Society Legal Aspects of Computing |
ISBN |
1-280-30771-4
9786610307715 3-540-25955-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foundations of Tabular Protection -- Survey on Methods for Tabular Data Protection in ARGUS -- Data Swapping: Variations on a Theme by Dalenius and Reiss -- Bounds for Cell Entries in Two-Way Tables Given Conditional Relative Frequencies -- Methods for Tabular Protection -- A New Tool for Applying Controlled Rounding to a Statistical Table in Microsoft Excel -- Getting the Best Results in Controlled Rounding with the Least Effort -- Computational Experiments with Minimum-Distance Controlled Perturbation Methods -- Balancing Quality and Confidentiality for Multivariate Tabular Data -- Reducing the Set of Tables ? -ARGUS Considers in a Hierarchical Setting -- Approaches to Identify the Amount of Publishable Information in Business Surveys through Waivers -- Maximum Utility-Minimum Information Loss Table Server Design for Statistical Disclosure Control of Tabular Data -- A Fast Network Flows Heuristic for Cell Suppression in Positive Tables -- Masking for Microdata Protection -- On the Security of Noise Addition for Privacy in Statistical Databases -- Microaggregation for Categorical Variables: A Median Based Approach -- Evaluating Fuzzy Clustering Algorithms for Microdata Protection -- To Blank or Not to Blank? A Comparison of the Effects of Disclosure Limitation Methods on Nonlinear Regression Estimates -- Outlier Protection in Continuous Microdata Masking -- Risk in Microdata Protection -- Re-identification Methods for Masked Microdata -- Masking and Re-identification Methods for Public-Use Microdata: Overview and Research Problems -- A Bayesian Hierarchical Model Approach to Risk Estimation in Statistical Disclosure Limitation -- Individual Risk Estimation in ?-Argus: A Review -- Analysis of Re-identification Risk Based on Log-Linear Models -- Synthetic Data -- New Approaches to Confidentiality Protection: Synthetic Data, Remote Access and Research Data Centers -- Multiply-Imputing Confidential Characteristics and File Links in Longitudinal Linked Data -- Fast Generation of Accurate Synthetic Microdata -- Software and Case Studies -- Trade-Off between Disclosure Risk and Information Loss Using Multivariate Microaggregation: A Case Study on Business Data -- The ARGUS Software in the CASC-Project -- Different Grades of Statistical Disclosure Control Correlated with German Statistics Law -- Developing Adoptable Disclosure Protection Techniques: Lessons Learned from a U.S. Experience -- Privacy Preserving and Data Mining in an On-Line Statistical Database of Additive Type. |
Record Nr. | UNINA-9910768467003321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society / / Lorenzo Cavallaro, Johannes Kinder, Josep Domingo-Ferrer |
Autore | Cavallaro Lorenzo |
Pubbl/distr/stampa | New York : , : Association for Computing Machinery, , 2019 |
Descrizione fisica | 1 online resource (221 pages) |
Disciplina | 005.8 |
Soggetto topico | Computer security |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910412112403321 |
Cavallaro Lorenzo
![]() |
||
New York : , : Association for Computing Machinery, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Card Research and Advanced Applications [[electronic resource] ] : 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XII, 360 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Management information systems Computer science Computers and civilization Computer communication systems Operating systems (Computers) Cryptology Management of Computing and Information Systems Computers and Society Computer Communication Networks Operating Systems |
ISBN | 3-540-33312-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Smart Card Applications -- Design, Installation and Execution of a Security Agent for Mobile Stations -- Towards a Secure and Practical Multifunctional Smart Card -- Implementing Cryptography on TFT Technology for Secure Display Applications -- A Smart Card-Based Mental Poker System -- A Smart Card Solution for Access Control and Trust Management for Nomadic Users -- Smart Cards and Residential Gateways: Improving OSGi Services with Java Cards -- Zero Footprint Secure Internet Authentication Using Network Smart Card -- An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items -- Side Channel Attacks -- Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations -- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis -- Power Analysis to ECC Using Differential Power Between Multiplication and Squaring -- Smart Card Networking -- Designing Smartcards for Emerging Wireless Networks -- Smartcard Firewalls Revisited -- Multi-stage Packet Filtering in Network Smart Cards -- Cryptographic Protocols -- Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability -- SEA: A Scalable Encryption Algorithm for Small Embedded Applications -- Low-Cost Cryptography for Privacy in RFID Systems -- Optimal Use of Montgomery Multiplication on Smart Cards -- Off-Line Group Signatures with Smart Cards -- RFID Security -- Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags -- Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags -- MARP: Mobile Agent for RFID Privacy Protection -- Formal Methods -- Certifying Native Java Card API by Formal Refinement -- A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods -- Automatic Test Generation on a (U)SIM Smart Card. |
Record Nr. | UNISA-996466113903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Smart Card Research and Advanced Applications : 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings / / edited by Josep Domingo-Ferrer, Joachim Posegga, Daniel Schreckling |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XII, 360 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Management information systems Computer science Computers and civilization Computer communication systems Operating systems (Computers) Cryptology Management of Computing and Information Systems Computers and Society Computer Communication Networks Operating Systems |
ISBN | 3-540-33312-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Smart Card Applications -- Design, Installation and Execution of a Security Agent for Mobile Stations -- Towards a Secure and Practical Multifunctional Smart Card -- Implementing Cryptography on TFT Technology for Secure Display Applications -- A Smart Card-Based Mental Poker System -- A Smart Card Solution for Access Control and Trust Management for Nomadic Users -- Smart Cards and Residential Gateways: Improving OSGi Services with Java Cards -- Zero Footprint Secure Internet Authentication Using Network Smart Card -- An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items -- Side Channel Attacks -- Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations -- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis -- Power Analysis to ECC Using Differential Power Between Multiplication and Squaring -- Smart Card Networking -- Designing Smartcards for Emerging Wireless Networks -- Smartcard Firewalls Revisited -- Multi-stage Packet Filtering in Network Smart Cards -- Cryptographic Protocols -- Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability -- SEA: A Scalable Encryption Algorithm for Small Embedded Applications -- Low-Cost Cryptography for Privacy in RFID Systems -- Optimal Use of Montgomery Multiplication on Smart Cards -- Off-Line Group Signatures with Smart Cards -- RFID Security -- Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags -- Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags -- MARP: Mobile Agent for RFID Privacy Protection -- Formal Methods -- Certifying Native Java Card API by Formal Refinement -- A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods -- Automatic Test Generation on a (U)SIM Smart Card. |
Record Nr. | UNINA-9910483040603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|