OPI: Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012. Proceedings

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
|

OPI: Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012. Proceedings

Glen Newton
 Volume 7556: Privacy in Statistical Databases
 by Josep Domingo-Ferrer, Ilenia Tinnirello
 is now available on the SpringerLink web site at
 http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XINe.3wfE.bW89MQ%5f%5fDLCGFSc0

 By clicking on the URLs below you can access the abstracts for each
 article. If your browser does not support direct URL access, please
 copy and paste the selected URL to your web browser.


 =================================================================
 Your Book Can Live Forever!

 Did you publish a book before 2005? Contact us to make it available again
 in print and online!

 http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XINi.3wfE.bW89MQ%5f%5fDLPOFTA0

 http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XINm.3wfE.bW89MQ%5f%5fDLcWFTE0
 =================================================================


 TABLE OF CONTENTS:



               p% Should Dominate

 Author(s): Peter-Paul de Wolf, Anco Hundepool
 Page: 1 - 10
 DOI: 10.1007/978-3-642-33627-0_1
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XINq.3wfE.bW89MQ%5f%5fDMJeFTI0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 A Computational Evaluation of Optimization Solvers for CTA

 Author(s): Jordi Castro
 Page: 11 - 21
 DOI: 10.1007/978-3-642-33627-0_2
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XINw.3wfE.bW89MQ%5f%5fDMdaFTO0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Flexible Rounding Based on Consistent Post-tabular Stochastic Noise

 Author(s): Sarah Giessing
 Page: 22 - 34
 DOI: 10.1007/978-3-642-33627-0_3
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XINy.3wfE.bW89MQ%5f%5fDNEOFTQ0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Comparing L
               1 and L
               2 Distances for CTA

 Author(s): Jordi Castro
 Page: 35 - 46
 DOI: 10.1007/978-3-642-33627-0_4
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIO0.3wfE.bW89MQ%5f%5fDFWAFRI0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 An Investigation of Model-Based Microdata Masking for Magnitude
Tabular Data Release

 Author(s): Mario Trottini, Krish Muralidhar, Rathindra Sarathy
 Page: 47 - 62
 DOI: 10.1007/978-3-642-33627-0_5
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIO6.3wfE.bW89MQ%5f%5fDGJcFRO0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Testing of IHSN C++ Code and Inclusion of New Methods into sdcMicro

 Author(s): Alexander Kowarik, Matthias Templ, Bernhard Meindl,
Francois Fonteneau, Bernd Prantner
 Page: 63 - 77
 DOI: 10.1007/978-3-642-33627-0_6
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIO8.3wfE.bW89MQ%5f%5fDGQQFRQ0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Clustering-Based Categorical Data Protection

 Author(s): Jordi Marés, Vicenç Torra
 Page: 78 - 89
 DOI: 10.1007/978-3-642-33627-0_7
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOE.3wfE.bW89MQ%5f%5fDHbSFRd0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Anonymization Methods for Taxonomic Microdata

 Author(s): Josep Domingo-Ferrer, Krish Muralidhar, Guillem Rufian-Torrell
 Page: 90 - 102
 DOI: 10.1007/978-3-642-33627-0_8
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOG.3wfE.bW89MQ%5f%5fDICGFRf0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Hybrid Microdata via Model-Based Clustering

 Author(s): Anna Oganian, Josep Domingo-Ferrer
 Page: 103 - 115
 DOI: 10.1007/978-3-642-33627-0_9
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOM.3wfE.bW89MQ%5f%5fDIWCFSF0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Logistic Regression with Variables Subject to Post Randomization Method

 Author(s): Yong Ming Jeffrey Woo, Aleksandra B. Slavković
 Page: 116 - 130
 DOI: 10.1007/978-3-642-33627-0_10
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOS.3wfE.bW89MQ%5f%5fDJJeFSL0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Valid Statistical Inference on Automatically Matched Files

 Author(s): Rob Hall, Stephen Fienberg
 Page: 131 - 142
 DOI: 10.1007/978-3-642-33627-0_11
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOW.3wfE.bW89MQ%5f%5fDJXGFSP0

 - - - - - - - - - - - - - - - - - - - - - - - - -



               n-Cycle Swapping for the American Community Survey

 Author(s): Michael DePersio, Marlow Lemons, Kaleli A. Ramanayake,
Julie Tsay, Laura Zayatz
 Page: 143 - 164
 DOI: 10.1007/978-3-642-33627-0_12
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOY.3wfE.bW89MQ%5f%5fDJdaFSR0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Generating Useful Test Data for Complex Linked Employer-Employee Datasets

 Author(s): Matthias Dorner, Jörg Drechsler, Peter Jacobebbinghaus
 Page: 165 - 178
 DOI: 10.1007/978-3-642-33627-0_13
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOa.3wfE.bW89MQ%5f%5fDKYKFSZ0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 When Excessive Perturbation Goes Wrong and Why IPUMS-International
Relies Instead on Sampling, Suppression, Swapping, and Other Minimally
Harmful Methods to Protect Privacy of Census Microdata

 Author(s): Lara Cleveland, Robert McCaa, Steven Ruggles, Matthew Sobek
 Page: 179 - 187
 DOI: 10.1007/978-3-642-33627-0_14
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOc.3wfE.bW89MQ%5f%5fDKeeFSb0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Achieving Comparability of Earnings

 Author(s): Luisa Franconi, Daniela Ichim
 Page: 188 - 199
 DOI: 10.1007/978-3-642-33627-0_15
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOe.3wfE.bW89MQ%5f%5fDLFSFSd0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Designing Multiple Releases from the Small and Medium Enterprises Survey

 Author(s): Flavio Foschi, Maria Cristina Casciano, Luisa Franconi,
Daniela Ichim
 Page: 200 - 215
 DOI: 10.1007/978-3-642-33627-0_16
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOg.3wfE.bW89MQ%5f%5fDLMGFSf0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 A Proposed Solution to the Archiving and Curation of Confidential
Scientific Inputs

 Author(s): John M. Abowd, Lars Vilhuber, William Block
 Page: 216 - 225
 DOI: 10.1007/978-3-642-33627-0_17
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOi.3wfE.bW89MQ%5f%5fDLSaFTB0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Confidentialising Maps of Mixed Point and Diffuse Spatial Data

 Author(s): Christine M. O’Keefe
 Page: 226 - 240
 DOI: 10.1007/978-3-642-33627-0_18
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOk.3wfE.bW89MQ%5f%5fDLZOFTD0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Security of Random Output Perturbation for Statistical Databases

 Author(s): Daniel Z. Zanger
 Page: 241 - 256
 DOI: 10.1007/978-3-642-33627-0_19
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOm.3wfE.bW89MQ%5f%5fDMACFTF0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Empirical Evaluation of Statistical Inference from
Differentially-Private Contingency Tables

 Author(s): Anne-Sophie Charest
 Page: 257 - 272
 DOI: 10.1007/978-3-642-33627-0_20
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOo.3wfE.bW89MQ%5f%5fDMGWFTH0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Differentially Private Graphical Degree Sequences and Synthetic Graphs

 Author(s): Vishesh Karwa, Aleksandra B. Slavković
 Page: 273 - 285
 DOI: 10.1007/978-3-642-33627-0_21
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOq.3wfE.bW89MQ%5f%5fDMNKFTJ0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 European Data Access Comes True

 Author(s): Maurice Brandt
 Page: 286 - 294
 DOI: 10.1007/978-3-642-33627-0_22
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOs.3wfE.bW89MQ%5f%5fDMTeFTL0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 A Bayesian Approach for On-Line Sum/Count/Max/Min Auditing on Boolean Data

 Author(s): Bice Cavallo, Gerardo Canfora
 Page: 295 - 307
 DOI: 10.1007/978-3-642-33627-0_23
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOu.3wfE.bW89MQ%5f%5fDMaSFTN0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Document Sanitization: Measuring Search Engine Information Loss and
Risk of Disclosure for the Wikileaks cables

 Author(s): David F. Nettleton, Daniel Abril
 Page: 308 - 321
 DOI: 10.1007/978-3-642-33627-0_24
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOw.3wfE.bW89MQ%5f%5fDNBGFTP0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 Enhancing the Efficiency in Privacy Preserving Learning of Decision
Trees in Partitioned Databases

 Author(s): Peter Lory
 Page: 322 - 335
 DOI: 10.1007/978-3-642-33627-0_25
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIOy.3wfE.bW89MQ%5f%5fDNHaFTR0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 On Computational Anonymity

 Author(s): Klara Stokes
 Page: 336 - 347
 DOI: 10.1007/978-3-642-33627-0_26
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIO%5f.3wfE.bW89MQ%5f%5fDKRWFSX0

 - - - - - - - - - - - - - - - - - - - - - - - - -


 ”Better Than Nothing” Privacy with Bloom Filters: To What Extent?

 Author(s): Giuseppe Bianchi, Lorenzo Bracciale, Pierpaolo Loreti
 Page: 348 - 363
 DOI: 10.1007/978-3-642-33627-0_27
 URL: http://springer.r.delivery.net/r/r?2.1.Ee.2Tp.1jebYT.C3mLVq..T.XIP0.3wfE.bW89MQ%5f%5fDFZMFRJ0


--
-
http://zzzoot.blogspot.com/
-