000 | 04827nam a22003855i 4500 | ||
---|---|---|---|
001 | 296877 | ||
003 | MX-SnUAN | ||
005 | 20160429155351.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2006 gw | o |||| 0|eng d | ||
020 |
_a9783540493327 _99783540493327 |
||
024 | 7 |
_a10.1007/11930242 _2doi |
|
035 | _avtls000349806 | ||
039 | 9 |
_a201509030740 _bVLOAD _c201404121251 _dVLOAD _c201404091028 _dVLOAD _y201402071211 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQA76.9.D3 | |
100 | 1 |
_aDomingo-Ferrer, Josep. _eeditor. _9330218 |
|
245 | 1 | 0 |
_aPrivacy in Statistical Databases : _bCENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006. Proceedings / _cedited by Josep Domingo-Ferrer, Luisa Franconi. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2006. |
|
300 |
_axI, 383 páginas Also available online. _brecurso en línea. |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v4302 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aMethods for Tabular Protection -- A Method for Preserving Statistical Distributions Subject to Controlled Tabular Adjustment -- Automatic Structure Detection in Constraints of Tabular Data -- A New Approach to Round Tabular Data -- Harmonizing Table Protection: Results of a Study -- Utility and Risk in Tabular Protection -- Effects of Rounding on the Quality and Confidentiality of Statistical Data -- Disclosure Analysis for Two-Way Contingency Tables -- Statistical Disclosure Control Methods Through a Risk-Utility Framework -- A Generalized Negative Binomial Smoothing Model for Sample Disclosure Risk Estimation -- Entry Uniqueness in Margined Tables -- Methods for Microdata Protection -- Combinations of SDC Methods for Microdata Protection -- A Fixed Structure Learning Automaton Micro-aggregation Technique for Secure Statistical Databases -- Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation -- Using the Jackknife Method to Produce Safe Plots of Microdata -- Combining Blanking and Noise Addition as a Data Disclosure Limitation Method -- Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric Data -- Adjusting Survey Weights When Altering Identifying Design Variables Via Synthetic Data -- Utility and Risk in Microdata Protection -- Risk, Utility and PRAM -- Distance Based Re-identification for Time Series, Analysis of Distances -- Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk -- Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk Assessment -- Improving Individual Risk Estimators -- Protocols for Private Computation -- Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases -- Privacy-Preserving Data Set Union -- “Secure” Log-Linear and Logistic Regression Analysis of Distributed Databases -- Case Studies -- Measuring the Impact of Data Protection Techniques on Data Utility: Evidence from the Survey of Consumer Finances -- Protecting the Confidentiality of Survey Tabular Data by Adding Noise to the Underlying Microdata: Application to the Commodity Flow Survey -- Italian Household Expenditure Survey: A Proposal for Data Dissemination -- Software -- The ARGUS Software in CENEX -- Software Development for SDC in R -- On Secure e-Health Systems -- IPUMS-International High Precision Population Census Microdata Samples: Balancing the Privacy-Quality Tradeoff by Means of Restricted Access Extracts. | |
520 | _aThis book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2006, held in December 2006 in Rome, Italy as the main conference of the CENEX-SDC (CENtre of EXcellence for Statistical Disclosure Control) project. The 31 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on methods for tabular protection, utility and risk in tabular protection, methods for microdata protection, utility and risk in microdata protection, protocols for private computation, case studies, and software. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aFranconi, Luisa. _eeditor. _9332256 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783540493303 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/11930242 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c296877 _d296877 |