Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics

G D'Acquisto, J Domingo-Ferrer, P Kikiras… - arXiv preprint arXiv …, 2015 - arxiv.org
The extensive collection and processing of personal information in big data analytics has
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …

[HTML][HTML] Data analytics in a privacy-concerned world

J Wieringa, PK Kannan, X Ma, T Reutterer… - Journal of Business …, 2021 - Elsevier
Data is considered the new oil of the economy, but privacy concerns limit their use, leading
to a widespread sense that data analytics and privacy are contradictory. Yet such a view is …

[图书][B] Data quality and record linkage techniques

TN Herzog, FJ Scheuren, WE Winkler - 2007 - Springer
This book helps practitioners gain a deeper understanding, at an applied level, of the issues
involved in improving data quality through editing, imputation, and record linkage. The first …

Transforming data to satisfy privacy constraints

VS Iyengar - Proceedings of the eighth ACM SIGKDD international …, 2002 - dl.acm.org
Data on individuals and entities are being collected widely. These data can contain
information that explicitly identifies the individual (eg, social security number). Data can also …

[图书][B] Statistical disclosure control

A Hundepool, J Domingo-Ferrer, L Franconi… - 2012 - books.google.com
A reference to answer all your statistical confidentiality questions. This handbook provides
technical guidance on statistical disclosure control and on how to approach the problem of …

Linking sensitive data

P Christen, T Ranbaduge, R Schnell - Methods and techniques for …, 2020 - Springer
Sensitive personal data are created in many application domains, and there is now an
increasing demand to share, integrate, and link such data within and across organisations in …

[HTML][HTML] Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation

J Domingo-Ferrer, V Torra - Data Mining and Knowledge Discovery, 2005 - Springer
Abstract k-Anonymity is a useful concept to solve the tension between data utility and
respondent privacy in individual data (microdata) protection. However, the generalization …

[HTML][HTML] Enhancing data utility in differential privacy via microaggregation-based -anonymity

J Soria-Comas, J Domingo-Ferrer, D Sánchez… - The VLDB Journal, 2014 - Springer
It is not uncommon in the data anonymization literature to oppose the “old” k k-anonymity
model to the “new” differential privacy model, which offers more robust privacy guarantees …

Masking and re-identification methods for public-use microdata: Overview and research problems

WE Winkler - International Workshop on Privacy in Statistical …, 2004 - Springer
This paper provides an overview of methods of masking microdata so that the data can be
placed in public-use files. It divides the methods according to whether they have been …

Releasing multiply imputed, synthetic public use microdata: an illustration and empirical study

JP Reiter - Journal of the Royal Statistical Society Series A …, 2005 - academic.oup.com
The paper presents an illustration and empirical study of releasing multiply imputed, fully
synthetic public use microdata. Simulations based on data from the US Current Population …