16,769 Hits in 4.5 sec

Applying Data Privacy Techniques on Tabular Data in Uganda [article]

Kato Mivule, Claude Turner
2011 arXiv   pre-print
A growing number of entities in the private sector, academia, and government, have deployed the Internet as a medium to transact in data, routinely posting statistical and non statistical data online and  ...  thereby making many in Africa increasingly dependent on the Internet for data transactions.  ...  cell, thus the cell suppression problem(CSP), which is considered an NP-Hard problem.  ... 
arXiv:1107.3784v1 fatcat:gq6yyseffzgi5jcxniadne527i

Mathematical techniques for the protection of patient's privacy in medical databases

Marcin Przybyłko
2011 Mathematica Applicanda  
While creating a central database of patients, the CSIOZ wishes to provide statistical information for selected institutions.  ...  derived from the Polish name of the institution concerned. 96 Math. tech. for the protection of patient's privacy in medical databases ESGI77  ...  This methodology should cover the majority of problems with security architecture.  ... 
doi:10.14708/ma.v39i1.54 fatcat:4le3bz6olnashdx6n6rfmbc2rq

Inference Attacks and Control on Database Structures

Muhamed Turkanovic, Tatjana Welzer Druzovec, Marko Hölbl
2015 TEM Journal  
This paper focuses on the inference problem on different database structures. It presents possible treats on privacy with relation to the inference, and control methods for mitigating these treats.  ...  Today's databases store information with sensitivity levels that range from public to highly sensitive, hence ensuring confidentiality can be highly important, but also requires costly control.  ...  The best known nonperturbative method is the Cell-Suppression method (CS), whereby cells which are identified as sensitive by the so-called sensitive rule, are simply suppressed.  ... 
doaj:53a50dce017a48249590cef7834197e5 fatcat:lb6u2kpqcbhxncjwvxnj4kgrrq

Page 562 of The Journal of the Operational Research Society Vol. 59, Issue 4 [page]

2008 The Journal of the Operational Research Society  
Network models for complementary cell suppression. J Am Statist Assoc 90: 1453-1462. Domingo-Ferrer J and Torra V (eds) (2004). Privacy in Statistical Databases.  ...  Models and algorithms for optimizing cell suppression in tabular data with linear constraints. J Am Statist Assoc 95: 916-928. Fischetti M and Salazar JJ (2003).  ... 

Advances in Inference Control in Statistical Databases: An Overview [chapter]

Josep Domingo-Ferrer
2002 Lecture Notes in Computer Science  
Inference control in statistical databases is a discipline with several other names, such as statistical disclosure control, statistical disclosure limitation, or statistical database protection.  ...  Massive production of computerized statistics by government agencies combined with an increasing social importance of individual privacy has led to a renewed interest in this topic.  ...  Their ideas were invaluable to write this overview, but I bear full responsibility for any inaccuracy, omission, or mistake that may remain.  ... 
doi:10.1007/3-540-47804-3_1 fatcat:3wfmojfvpvbylb7gsznkb33rry

An Evaluation of Two New Inference Control Methods

Y.H. Chin, Weng-Ling Peng
1987 IEEE Transactions on Software Engineering  
In general the control methods based on restriction have higher preparation cost and better security, and the control methods based on perturbation have faster response time for a query, but more information  ...  The factors of the evaluation function consist of: 1) preparation cost for the control method, 2) query complexity, and 3) security level under various attacks.  ...  Buehrer and the referees for their comments on earlier versions of the paper.  ... 
doi:10.1109/tse.1987.233143 fatcat:mw2fl5gi5ncf7kz6bptspul5he

Understanding database reconstruction attacks on public data

Simson Garfinkel, John M. Abowd, Christian Martindale
2019 Communications of the ACM  
Published statistical tables are vulnerable to DRAs (database reconstruction attacks), in which the underlying microdata is recovered merely by finding a set of microdata that is consistent with the published  ...  statistical tabulations.  ...  The first is to publish less statistical data-this is the approach taken by legacy disclosure-avoidance techniques (cell suppression, top-coding, and generalization).  ... 
doi:10.1145/3287287 fatcat:c3dtl2aixfeuxnik6qp473yc7u

Confidentiality and Disclosure Limitation [chapter]

Stephen E. Fienberg
2005 Encyclopedia of Social Measurement  
Confidentiality protection for linked administrative data is a combination of access modalities and statistical disclosure limitation.  ...  Abstract Confidentiality protection for linked administrative data is a combination of access modalities and statistical disclosure limitation.  ...  The converse is true for cells with three individuals.  ... 
doi:10.1016/b0-12-369398-5/00053-0 fatcat:hpccyuacgneotgfw3utvingauq

A Review of Privacy Essentials for Confidential Mobile Data Transactions [article]

Kato Mivule, Claude Turner
2013 arXiv   pre-print
level of data privacy and security.  ...  The increasingly rapid use of mobile devices for data transaction around the world has consequently led to a new problem, and that is, how to engage in mobile data transactions while maintaining an acceptable  ...  Suppression: Suppression is a data privacy enforcing mechanism in which PII and sensitive data or values are deleted or removed at the cell level from the dataset.  ... 
arXiv:1309.3953v1 fatcat:gxgpugg5ojer7kqnbtup3u7bae

Disclosure Detection in Multivariate Categorical Databases: Auditing Confidentiality Protection Through Two New Matrix Operators

Sumit Dutta Chowdhury, George T. Duncan, Ramayya Krishnan, Stephen F. Roehrig, Sumitra Mukherjee
1999 Management science  
Practical databases accommodate users with heterogeneous needs for access. Each class of data user is accorded access to only certain views.  ...  Consistent with previous work for two-way tables, it presents a data-value-dependent method to obtain tight lower and upper bounds for confidential data values.  ...  The authors thank Mark Kamlet for his suggestions leading to §5. They also thank the referees and the associate editor for their insightful comments.  ... 
doi:10.1287/mnsc.45.12.1710 fatcat:cdqtztwb2rcc7nv2wvllleqbrm

First Issue Editorial

John M. Abowd, Kobbi Nissim, Chris J. Skinner
2009 Journal of Privacy and Confidentiality  
Statisticians, particularly those working within national statistical offices, have developed the field of statistical disclosure limitation.  ...  When the founders of this Journal -- Cynthia Dwork, Stephen Fienberg and Alan Karr -- made its initial call for papers, they and we identified many constituencies that participate in the scientific analysis  ...  The provision of general-purpose statistical data was placed in the public sector as a solution to the public goods problem.  ... 
doi:10.29012/jpc.v1i1.562 fatcat:mqacre33ujac7gvohhevbdjkbq

Exact and heuristic methods for cell suppression in multi-dimensional linked tables

S F Roehrig, R Padman, R Krishnan, G T Duncan
2011 Journal of the Operational Research Society  
This paper considers the problem of protecting an unpublished, sensitive table by suppressing cells in related, published tables.  ...  The increasing demand for information, coupled with the increasing capability of computer systems, has compelled information providers to reassess their procedures for preventing disclosure of confidential  ...  Application of Transportation Theory to Statistical Problems. JASA 80, 903-909. COX, L.H. 1980. Suppression Methodology and Statistical Disclosure Control. JASA 75, 377-385.  ... 
doi:10.1057/jors.2010.133 fatcat:h2j5frsuujhonifyoxf33naarm

Identifying Security Holes in OLAP Applications [chapter]

Jürgen Steger, Holger Günzel, Andreas Bauer
2002 IFIP International Federation for Information Processing  
Security concerns are more or less the same as those of other database systems but enriched especially with access and inference control in the multidimensional model.  ...  problems.  ...  INDICATORS FOR VISUALIZATION OF THE SECURITY HOLES An overview of possible restrictions in statistical and scientific database area is given in [5] .  ... 
doi:10.1007/0-306-47008-x_25 fatcat:hgw627kwb5aerejrkwoprl5ftm

On privacy-preserving access to distributed heterogeneous healthcare information

C. Boyens, R. Krishnan, R. Padman
2004 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the  
We illustrate our approach with a real world example and propose an "audit and aggregate" methodology  ...  Current proposals for securityconscious mediators do not address inferential disclosure resulting from record linkage.  ...  Statistical Disclosure Control ([4] , [5] , [6] , [23] ) deals with disclosure detection and limitation in statistical databases such as the census databases.  ... 
doi:10.1109/hicss.2004.1265352 dblp:conf/hicss/BoyensKP04 fatcat:msjhkz3cc5cbxpjllbbks7mhwa

A Generic Scaffold Housing the Innovative Modus Operandi for Selection of the Superlative Anonymisation Technique for Optimized Privacy Preserving Data Mining [chapter]

J. Indumathi
2012 Data Mining Applications in Engineering and Medicine  
.  Cell (CG): In this sub-type, generalization is executed on single cells; as a result a generalized table may contain, for a specific column, values at different generalization levels.  ...  Generalization & suppression Generalization Generalization consists of replacing with attribute values with semantically consistent but less precise values.  ... 
doi:10.5772/49982 fatcat:di63yjpsdbhwvg5vh2k6vny2ti
« Previous Showing results 1 — 15 out of 16,769 results