Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics
G D'Acquisto, J Domingo-Ferrer, P Kikiras… - arXiv preprint arXiv …, 2015 - arxiv.org
The extensive collection and processing of personal information in big data analytics has
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …
[HTML][HTML] Data analytics in a privacy-concerned world
Data is considered the new oil of the economy, but privacy concerns limit their use, leading
to a widespread sense that data analytics and privacy are contradictory. Yet such a view is …
to a widespread sense that data analytics and privacy are contradictory. Yet such a view is …
[图书][B] Data quality and record linkage techniques
TN Herzog, FJ Scheuren, WE Winkler - 2007 - Springer
This book helps practitioners gain a deeper understanding, at an applied level, of the issues
involved in improving data quality through editing, imputation, and record linkage. The first …
involved in improving data quality through editing, imputation, and record linkage. The first …
Transforming data to satisfy privacy constraints
VS Iyengar - Proceedings of the eighth ACM SIGKDD international …, 2002 - dl.acm.org
Data on individuals and entities are being collected widely. These data can contain
information that explicitly identifies the individual (eg, social security number). Data can also …
information that explicitly identifies the individual (eg, social security number). Data can also …
[图书][B] Statistical disclosure control
A Hundepool, J Domingo-Ferrer, L Franconi… - 2012 - books.google.com
A reference to answer all your statistical confidentiality questions. This handbook provides
technical guidance on statistical disclosure control and on how to approach the problem of …
technical guidance on statistical disclosure control and on how to approach the problem of …
Linking sensitive data
Sensitive personal data are created in many application domains, and there is now an
increasing demand to share, integrate, and link such data within and across organisations in …
increasing demand to share, integrate, and link such data within and across organisations in …
[HTML][HTML] Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation
J Domingo-Ferrer, V Torra - Data Mining and Knowledge Discovery, 2005 - Springer
Abstract k-Anonymity is a useful concept to solve the tension between data utility and
respondent privacy in individual data (microdata) protection. However, the generalization …
respondent privacy in individual data (microdata) protection. However, the generalization …
[HTML][HTML] Enhancing data utility in differential privacy via microaggregation-based -anonymity
It is not uncommon in the data anonymization literature to oppose the “old” k k-anonymity
model to the “new” differential privacy model, which offers more robust privacy guarantees …
model to the “new” differential privacy model, which offers more robust privacy guarantees …
Masking and re-identification methods for public-use microdata: Overview and research problems
WE Winkler - International Workshop on Privacy in Statistical …, 2004 - Springer
This paper provides an overview of methods of masking microdata so that the data can be
placed in public-use files. It divides the methods according to whether they have been …
placed in public-use files. It divides the methods according to whether they have been …
Releasing multiply imputed, synthetic public use microdata: an illustration and empirical study
JP Reiter - Journal of the Royal Statistical Society Series A …, 2005 - academic.oup.com
The paper presents an illustration and empirical study of releasing multiply imputed, fully
synthetic public use microdata. Simulations based on data from the US Current Population …
synthetic public use microdata. Simulations based on data from the US Current Population …