注冊(cè) | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁(yè)出版圖書科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)信息安全2006 CENEX-SDC 項(xiàng)目國(guó)際會(huì)議/會(huì)議錄:統(tǒng)計(jì)數(shù)據(jù)庫(kù)中的隱私

2006 CENEX-SDC 項(xiàng)目國(guó)際會(huì)議/會(huì)議錄:統(tǒng)計(jì)數(shù)據(jù)庫(kù)中的隱私

2006 CENEX-SDC 項(xiàng)目國(guó)際會(huì)議/會(huì)議錄:統(tǒng)計(jì)數(shù)據(jù)庫(kù)中的隱私

定 價(jià):¥587.60

作 者: Josep Domingo-Ferrer 著
出版社: 湖南文藝出版社
叢編項(xiàng):
標(biāo) 簽: 暫缺

購(gòu)買這本書可以去


ISBN: 9783540493303 出版時(shí)間: 2006-12-01 包裝: 平裝
開本: 頁(yè)數(shù): 字?jǐn)?shù):  

內(nèi)容簡(jiǎn)介

  This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2006, held in December 2006 in Rome, Italy as the main conference of the CENEX-SDC (CENtre of EXcellence for Statistical Disclosure Control) project.The 31 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on methods for tabular protection, utility and risk in tabular protection, methods for microdata protection, utility and risk in microdata protection, protocols for private computation, case studies, and software.

作者簡(jiǎn)介

暫缺《2006 CENEX-SDC 項(xiàng)目國(guó)際會(huì)議/會(huì)議錄:統(tǒng)計(jì)數(shù)據(jù)庫(kù)中的隱私》作者簡(jiǎn)介

圖書目錄

Methods for Tabular Protection
A Method for Preserving Statistical Distributions Subject to Controlled Tabular Adjustment
Automatic Structure Detection in Constraints of Tabular Data
A New Approach to Round Tabular Data
Harmonizing Table Protection: Results of a Study
Utility and Risk in Tabular Protection
Effects of Rounding on the Quality and Confidentiality of Statistical Data
Disclosure Analysis for Two-Way Contingency Tables
Statistical Disclosure Control Methods Through a Risk-Utility Framework
A Generalized Negative Binomial Smoothing Model for Sample Disclosure Risk Estimation
Entry Uniqueness in Margined Tables
Methods for Microdata Protection
Combinations of SDC Methods for Microdata Protection
A Fixed Structure Learning Automaton Micro-aggregation Technique for Secure Statistical Databases
Optimal Multivariate 2-Microaggregation for Microdata Protection A 2-Approximation
Using the Jackknife Method to Produce Safe Plots of Microdata
Combining Blanking and Noise Addition as a Data Disclosure Limitation Method
Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric Data
Adjusting Survey Weights When Altering Identifying Design Variables Via Synthetic Data
Utility and Risk in Microdata Protection
Risk, Utility and PRAM
Distance Based Re-identification for Time Series, Analysis of Distances
Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk
Using Mahalanobis Distance-Based Assessment
Record Linkage for Disclosure Risk
Improving Individual Risk Estimators
Protocols for Private
Case Studies
Software
Author Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)