Australasia's Biggest Online Store

We won't be beaten by anyone. Guaranteed

Privacy in Statistical Databases

Product Details

Table of Contents

Methods for Tabular Protection.- A Method for Preserving Statistical Distributions Subject to Controlled Tabular Adjustment.- Automatic Structure Detection in Constraints of Tabular Data.- A New Approach to Round Tabular Data.- Harmonizing Table Protection: Results of a Study.- Utility and Risk in Tabular Protection.- Effects of Rounding on the Quality and Confidentiality of Statistical Data.- Disclosure Analysis for Two-Way Contingency Tables.- Statistical Disclosure Control Methods Through a Risk-Utility Framework.- A Generalized Negative Binomial Smoothing Model for Sample Disclosure Risk Estimation.- Entry Uniqueness in Margined Tables.- Methods for Microdata Protection.- Combinations of SDC Methods for Microdata Protection.- A Fixed Structure Learning Automaton Micro-aggregation Technique for Secure Statistical Databases.- Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation.- Using the Jackknife Method to Produce Safe Plots of Microdata.- Combining Blanking and Noise Addition as a Data Disclosure Limitation Method.- Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric Data.- Adjusting Survey Weights When Altering Identifying Design Variables Via Synthetic Data.- Utility and Risk in Microdata Protection.- Risk, Utility and PRAM.- Distance Based Re-identification for Time Series, Analysis of Distances.- Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk.- Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk Assessment.- Improving Individual Risk Estimators.- Protocols for Private Computation.- Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases.- Privacy-Preserving Data Set Union.- "Secure" Log-Linear and Logistic Regression Analysis of Distributed Databases.- Case Studies.- Measuring the Impact of Data Protection Techniques on Data Utility: Evidence from the Survey of Consumer Finances.- Protecting the Confidentiality of Survey Tabular Data by Adding Noise to the Underlying Microdata: Application to the Commodity Flow Survey.- Italian Household Expenditure Survey: A Proposal for Data Dissemination.- Software.- The ARGUS Software in CENEX.- Software Development for SDC in R.- On Secure e-Health Systems.- IPUMS-International High Precision Population Census Microdata Samples: Balancing the Privacy-Quality Tradeoff by Means of Restricted Access Extracts.

Ask a Question About this Product More...
Write your question below:
People also searched for
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Privacy in Statistical Databases: CENEX-SDC Project International Conference, PSD 2006 Rome, Italy, December 13-15, 2006 Proceedings (Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI) on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by, Inc.
Back to top