Filters








8,222 Hits in 3.9 sec

The Security of Confidential Numerical Data in Databases

Rathindra Sarathy, Krishnamurty Muralidhar
<span title="">2002</span> <i title="Institute for Operations Research and the Management Sciences (INFORMS)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xizcxbcgljavtpkmqtalzqfcde" style="color: black;">Information systems research</a> </i> &nbsp;
The application of the methodology is illustrated using a simulated database.  ...  When access to individual values of confidential numerical data in the database is prevented, disclosure may occur when a snooper uses linear models to predict individual values of confidential attributes  ...  The use of linear models to compromise confidential numerical information in databases was illustrated by Palley and Simonoff (1987) .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1287/isre.13.4.389.74">doi:10.1287/isre.13.4.389.74</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mwepqnbedve6niipl2mpmrpdau">fatcat:mwepqnbedve6niipl2mpmrpdau</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809062753/http://wweb.uta.edu/management/Dr.Casper/Fall10/BSAD6314/BSAD%206314-Student%20Articles/Cononical%20Articles/Al-Laymoun-canonical%20correlation.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7d/4e/7d4eab06ad3571e119f01c870577ea99db4338dc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1287/isre.13.4.389.74"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

An internal control perspective on the market value consequences of IT operational risk events

Michel Benaroch, Anna Chernobai, James Goldstein
<span title="">2012</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wfh6ild5kbbxxby6ijhuuigapu" style="color: black;">International Journal of Accounting Information Systems</a> </i> &nbsp;
We find that investors penalize firms most strongly for experiencing events that compromise the availability of IT systems, consistent with our prediction that these events more negatively impact the reliability  ...  We specifically test the impact of contextual factors on the degree of this effect, including the events' target (confidentiality, integrity, or availability of IT assets), the source of disclosure (regulatory  ...  ., a member of the Fitch Group, for providing operational risk events data. 15 We identified only three studies that controlled for event magnitude.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.accinf.2012.03.001">doi:10.1016/j.accinf.2012.03.001</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ogcdjnslhndgbkmit4o5n4ry5u">fatcat:ogcdjnslhndgbkmit4o5n4ry5u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120901073038/http://myweb.whitman.syr.edu:80/annac/Papers/bcg-ijais.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1b/e2/1be256bed4bba0bea3634f63afc5f32c48de2282.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.accinf.2012.03.001"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Verification of De-Identification Techniques for Personal Information Using Tree-Based Methods with Shapley Values

Junhak Lee, Jinwoo Jeong, Sungji Jung, Jihoon Moon, Seungmin Rho
<span title="2022-01-31">2022</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xuwogpw7hnaoljkcejqtymrqsa" style="color: black;">Journal of Personalized Medicine</a> </i> &nbsp;
However, the tools for verifying whether the de-identification methodology is correctly applied to ensure data confidentiality and usability are insufficient.  ...  This paper proposes a verification of de-identification techniques for personal healthcare information by considering data confidentiality and usability.  ...  Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/jpm12020190">doi:10.3390/jpm12020190</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/35207676">pmid:35207676</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC8877642/">pmcid:PMC8877642</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rw4eez4r5ra4dba2rlmxpn77qu">fatcat:rw4eez4r5ra4dba2rlmxpn77qu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220504043938/https://mdpi-res.com/d_attachment/jpm/jpm-12-00190/article_deploy/jpm-12-00190-v2.pdf?version=1644497942" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a6/23/a62391542853fa8adbdcfea09fde1fd8f476aa8a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/jpm12020190"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8877642" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

The Science and Technology of Privacy Protection: Appendix L of "Protecting Individual Privacy in the Struggle Against Terrorists"

William J. Perry, Charles M. Vest
<span title="2010-09-01">2010</span> <i title="Journal of Privacy and Confidentiality"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dbqj7mggfnb2fh43gmrj7mv52u" style="color: black;">Journal of Privacy and Confidentiality</a> </i> &nbsp;
Fienberg, "Conflicts between the needs for access to statistical information and demands for confidentiality," Journal of Official Statistics 10(2):115-132, 1994; Federal Committee on Statistical Methodology  ...  square error of estimation for the mean or a regression coefficient).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.29012/jpc.v2i1.583">doi:10.29012/jpc.v2i1.583</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gxtl2uxe4nezjhkgbokqoqm3du">fatcat:gxtl2uxe4nezjhkgbokqoqm3du</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721180457/https://journalprivacyconfidentiality.org/index.php/jpc/article/download/583/566" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b9/7e/b97e6e5ef0253a01148bd081afa7e0b41075aed1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.29012/jpc.v2i1.583"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Secure Regression on Distributed Databases

Alan F Karr, Xiaodong Lin, Ashish P Sanil, Jerome P Reiter
<span title="">2005</span> <i title="Informa UK Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uuo44cjltzg2flanabrks3a5fi" style="color: black;">Journal of Computational And Graphical Statistics</a> </i> &nbsp;
We present several methods for performing linear regression on the union of distributed databases that preserve, to varying degrees, confidentiality of those databases.  ...  Other global statistics associated with the regression that can be calculated locally, some of which are useful for diagnostic purposes, are described in §5.1.  ...  Acknowledgements This research was supported by NSF grant IIS-0131884 to the National Institute of Statistical Sciences.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1198/106186005x47714">doi:10.1198/106186005x47714</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vuvrn6ukqveelfdyw4qybcb7ye">fatcat:vuvrn6ukqveelfdyw4qybcb7ye</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706084828/https://www.niss.org/sites/default/files/technicalreports/tr141.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/da/c8/dac89c80a262871108f2b0970bfcbccc2404afce.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1198/106186005x47714"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Data Swapping: Variations on a Theme by Dalenius and Reiss [chapter]

Stephen E. Fienberg, Julie McIntyre
<span title="">2004</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Data swapping, a term introduced in 1978 by Dalenius and Reiss for a new method of statistical disclosure protection in confidential data bases, has taken on new meanings and been linked to new statistical  ...  of as rooted in the original concept.  ...  Acknowledgments The preparation of this paper was supported in part by National Science Foundation Grant No.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-25955-8_2">doi:10.1007/978-3-540-25955-8_2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/43qk3zcaanazlibr3gxbsoykpm">fatcat:43qk3zcaanazlibr3gxbsoykpm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160418110443/http://www.stat.cmu.edu:80/~fienberg/DLPapers/Fienberg-McIntyre-LNCS-2004.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d1/87/d187dd845e20af19e984e991fd6309ce5b965b89.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-25955-8_2"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

The economic cost of publicly announced information security breaches: empirical evidence from the stock market*

Katherine Campbell, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou
<span title="2003-07-01">2003</span> <i title="IOS Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/spxf4rshtfhgvoxv3apocfge6m" style="color: black;">Journal of Computer Security</a> </i> &nbsp;
This study examines the economic effect of information security breaches reported in newspapers on publicly traded US corporations.  ...  confidential information.  ...  The standard methodology uses Ordinary Least Squares (OLS) to estimate regression parameters.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jcs-2003-11308">doi:10.3233/jcs-2003-11308</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gujg5w5htbbldh7hoc3bfuqmtq">fatcat:gujg5w5htbbldh7hoc3bfuqmtq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20161118160100/http://iris.nyit.edu/~kkhoo/Spring2008/Topics/Topic10/EconCostSecurityBreaches2003.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/44/bb/44bbffcb013753851e24d8fd19fa787e19be094f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jcs-2003-11308"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

"Secure" Log-Linear and Logistic Regression Analysis of Distributed Databases [chapter]

Stephen E. Fienberg, William J. Fulp, Aleksandra B. Slavkovic, Tracey A. Wrobel
<span title="">2006</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This paper discusses various techniques which can be used to perform statistical analysis for categorical data, especially in the form of log-linear analysis and logistic regression over partitioned databases  ...  The machine learning community has focused on confidentiality problems associated with statistical analyses that "integrate" data stored in multiple, distributed databases where there are barriers to simply  ...  ACKNOWLEDGMENTS The research reported here was supported in part by NSF grants EIA9876619 and IIS0131884 to the National Institute of Statistical Sciences, by NSF Grant SES-0532407 to the Department of  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11930242_24">doi:10.1007/11930242_24</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/h7bg4zaeajf3hiutbzce5mv64y">fatcat:h7bg4zaeajf3hiutbzce5mv64y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170830043328/http://sites.stat.psu.edu/~abs12/Research/Papers/secure_loglin.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/17/29/172959580743aead11f4e05fdd1bda975247a227.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11930242_24"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Statistical Data Privacy: A Song of Privacy and Utility [article]

Aleksandra Slavkovic, Jeremy Seeman
<span title="2022-05-06">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
To quantify trade-offs between increasing demand for open data sharing and concerns about sensitive information disclosure, statistical data privacy (SDP) methodology analyzes data release mechanisms which  ...  In this review, we discuss the statistical foundations common to both SDC and DP, highlight major developments in SDP, and present exciting open research problems in private inference.  ...  The authors are not aware of any affiliations, memberships, funding, or financial holdings that might be perceived as affecting the objectivity of this review.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2205.03336v1">arXiv:2205.03336v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r5dz3jb52rh7ji22r3a4erhdd4">fatcat:r5dz3jb52rh7ji22r3a4erhdd4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220510050700/https://arxiv.org/pdf/2205.03336v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fb/28/fb2852b6b09b81f9e72ea41490159fffa6b49643.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2205.03336v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Privacy and Confidentiality in an e-Commerce World: Data Mining, Data Warehousing, Matching and Disclosure Limitation

Stephen E. Fienberg
<span title="">2006</span> <i title="Institute of Mathematical Statistics"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/d3twmsnkvjdlhnnpijld3rlsum" style="color: black;">Statistical Science</a> </i> &nbsp;
Following the events of September 11, 2001, there has been heightened attention in the United States and elsewhere to the use of multiple government and private databases for the identification of possible  ...  We present an overview of some proposals that have surfaced for the search of multiple databases which supposedly do not compromise possible pledges of confidentiality to the individuals whose data are  ...  I thank the referees for comments that improved the content of the paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1214/088342306000000240">doi:10.1214/088342306000000240</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hb3kzvlcwrgxnnnbszjccng2vi">fatcat:hb3kzvlcwrgxnnnbszjccng2vi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922010259/http://stat.cmu.edu/~fienberg/Ecommerce-StatSci-2006.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3b/c8/3bc822a36ef07a6bae29098a7279f8720750d857.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1214/088342306000000240"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A modified random perturbation method for database security

Patrick Tendick, Norman Matloff
<span title="1994-03-01">1994</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ahla23r2jva2bp2hlkt5rtbx4y" style="color: black;">ACM Transactions on Database Systems</a> </i> &nbsp;
Method The random data perturbation (RDP) method of preserving the privacy of individual records in a statistical database is discussed.  ...  A modified version of RDP is presented, in the form of a query adjustment procedure and specialized perturbation structure which will produce unbiased results.  ...  Database Syst. 9, 4, 672-679.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/174638.174641">doi:10.1145/174638.174641</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7pty4jycyrelrdykajcsmorrva">fatcat:7pty4jycyrelrdykajcsmorrva</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813063118/http://www.dabi.temple.edu/~vucetic/cis616spring2005/papers/P1%20p47-tendick.pdf?origin=publication_detail" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/15/85/15852bb1e8c30ff6817a0be0559b2e2af172a428.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/174638.174641"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Third-party induced cyber incidents—much ado about nothing?

Michel Benaroch
<span title="2021-01-01">2021</span> <i title="Oxford University Press (OUP)"> Journal of Cybersecurity </i> &nbsp;
Third-party induced cyber incidents are not growing in prevalence any faster than other incidents, but they do compromise greater volumes of confidential data per incident.  ...  Moreover, we do not know who pays more of the price for experiencing these incidents—the client firm and/or the third-party provider firm.  ...  As seen in Table 6 , a t-test of the difference of means of log number of compromised records for the two subsamples is statistically significant, indicating that third-party induced incidents compromise  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/cybsec/tyab020">doi:10.1093/cybsec/tyab020</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5brcjukytrbrfhz24qnxmindgy">fatcat:5brcjukytrbrfhz24qnxmindgy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210921223726/https://watermark.silverchair.com/tyab020.pdf?token=AQECAHi208BE49Ooan9kkhW_Ercy7Dm3ZL_9Cf3qfKAc485ysgAAAtswggLXBgkqhkiG9w0BBwagggLIMIICxAIBADCCAr0GCSqGSIb3DQEHATAeBglghkgBZQMEAS4wEQQM2jlltle-VQsrfH2KAgEQgIICjphf_D_F7AqAzyQRnWCZVnyYUbSl5WLiIjeKbanQPYA48ndTTF2waN6NYBaoWkrqcEvWEwFuyjvscTLwFJ6yVusAg7ytFTeT2aN22n01u-ow7YKZ3TLKeDRzEJK5_8OmL7WCl8pbI7bKLDkBUiUlWsmqgtQMEmJsyK4YQcR0ewl8BwQ9Tc-1wv1qczDI3cL-88sfYeU-oerLdrbZ6W-kl9feWHNJxo4_e6VJzHZvrz3PmPfIaaZLaCb2s3coZspQHLR0X_P4NMxwKU0o_c0I-mVHWaIHGht4tBA3AOj51PGcnAYJJ3QKaf8zIRwEu_vCYSDLo0gruTCegwE050PJGR81l2aL7cI2AqgtAQAt68dQZHDy9B7kaU6P-kMIvgLGcJJHfc84D2F5g6DrErVi2nw6LsT3owA9YAWCBEi5NluSFexZwGtAdth8_0sDt08sImXoNw8um6DljV9cuDcFVUo2ynT7TS4mNs07ugw2SgGODLVtkcjeVtnLDudqJKGhoQBsMF7ZaVSgRtaXF5EZlJelFx-HkeAH23xuK6vzFFVn7yyUhVP4r_PoZPKU3-sXyaIPGsLuEfSQvsZeMHbFbIqOIyrFACNE_AqBeHOEozW3W9dHhj8KbncIonrNISmPDojtbGA62PgGIkHM6Oqy1DiVv3dtwyBxccRcl7_TCGMODePvbMoY7bNiIJv_e5vJipPEV_Jt5desmvUTI5cpT3uWjGmyXSLXNhcOdmfwD5ZAQwLINUFsTRAKc_kDF_tnqzKBeQMA2c0hrfOK4BZCIykeSnqj2SFn4Z8CtSu3Mt1RmczCEYoGHovNfKL6eRTTQg8DgYanf8IAkBNFAK-IvQrmjJe7GRSHg3Rx45ekng" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/df/a1/dfa1bc6a304e3e844060ec0ac622cae430daf260.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/cybsec/tyab020"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> oup.com </button> </a>

Drive More Effective Data-Based Innovations: Enhancing the Utility of Secure Databases

Yi Qian, Hui Xie
<span title="">2015</span> <i title="Institute for Operations Research and the Management Sciences (INFORMS)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zncv5noo7jgodckylffhkp26cq" style="color: black;">Management science</a> </i> &nbsp;
Since MORE nests the commonly used generalized linear models as special cases, a much wider range of statistical analyses can be conducted using the secure databases with results similar to those using  ...  Since MORE nests the commonly used generalized linear models as special cases, a much wider range of statistical analyses can be conducted using the secure databases with results similar to those using  ...  A nonlinear relationship could also arise in a nonlinear regression model, as for the case of confidential variable X 3 .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1287/mnsc.2014.2026">doi:10.1287/mnsc.2014.2026</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mzdpv2r4r5a4tdlpn6aj6az6wy">fatcat:mzdpv2r4r5a4tdlpn6aj6az6wy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180601231027/http://www.nber.org/papers/w19586.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f1/eb/f1ebfcb91e2fb8127313171c998019caab6672a3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1287/mnsc.2014.2026"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

On the connections between statistical disclosure control for microdata and some artificial intelligence tools

J Domingo-Ferrer
<span title="">2003</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ozlq63ehnjeqxf6cuxxn27cqra" style="color: black;">Information Sciences</a> </i> &nbsp;
Statistical disclosure control (SDC) and artificial intelligence (AI) use similar tools for different purposes. This work describes the common elements of both areas to increase their synergy.  ...  This paper explores those methodological connections with the aim of stimulating interaction between both fields. In particular, data mining turns out to be a common interest of both fields.  ...  Acknowledgements This work is partially supported by the European Commission through project ''CASC'' (IST-2000-25069) and by the Spanish MCyT and the FEDER fund through project ''STREAMOBILE'' (TIC2001  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s0020-0255(03)00064-1">doi:10.1016/s0020-0255(03)00064-1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dhvd6wclajbrdms5knujx42ggi">fatcat:dhvd6wclajbrdms5knujx42ggi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20091213081814/http://vneumann.etse.urv.es/webCrises/publications/isijcr/is151.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/35/8d/358df63ca9e2765d15e9605516d060773280bb4a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s0020-0255(03)00064-1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Applying Data Synthesis for Longitudinal Business Data across Three Countries [article]

M. Jahangir Alam and Benoit Dostie and Jörg Drechsler and Lars Vilhuber
<span title="2020-07-25">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this article, we document an experiment to create analytically valid synthetic data, using the exact same model and methods previously employed for the United States, for data from two different countries  ...  We assess utility and protection, and provide an assessment of the feasibility of extending such an approach in a cost-effective way to other data.  ...  Acknowledgements The opinions expressed here are those of the authors, and do not reflect the opinions of any of the statistical agencies involved.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2008.02246v1">arXiv:2008.02246v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/sinogfng5jenxljzylu7rapmda">fatcat:sinogfng5jenxljzylu7rapmda</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200812205400/https://arxiv.org/pdf/2008.02246v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2008.02246v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 8,222 results