Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2014, held in Ibiza, Spain in September 2014 under the sponsorship of the UNESCO chair in Data Privacy. The 27 revised full papers presented were carefully reviewed and selected from 41 submissions. The scope of the conference is on following topics: tabular data protection, microdata masking, protection using privacy models, synthetic data, record linkage, remote access, privacy-preserving protocols, and case studies.
Content Level »Research
Keywords »data anonymization and sanitization - database and storage security - database privacy - database protection - human and societal aspects of security and privacy - information accountability and usage control - privacy protections - pseudonymity, anonymity and untraceability - security and privacy - security services - statistical databases
Tabular Data Protection.- Enabling Statistical Analysis of Suppressed Tabular Data.- Assessing the Information Loss of Controlled Adjustment Methods in Two-Way Tables.- Further Developments with Perturbation Techniques to Protect Tabular Data.- Comparison of Different Sensitivity Rules for Tabular Data and Presenting a New Rule – The Interval Rule.- Pre-tabular Perturbation with Controlled Tabular Adjustment: Some Considerations.- Measuring Disclosure Risk with Entropy in Population Based Frequency Tables.- A CTA Model Based on the Huber Function.- Microdata Masking Density Approximant Based on Noise Multiplied Data.- Reverse Mapping to Preserve the Marginal Distributions of Attributes in Masked Microdata .- JPEG-Based Microdata Protection.- Protection Using Privacy Models.- Improving the Utility of Differential Privacy via Univariate Microaggregation.- Differentially Private Exponential Random Graphs.- km-Anonymity for Continuous Data Using Dynamic Hierarchies.- Differentially-Private Logistic Regression for Detecting Multiple-SNP Association in GWAS Databases.- Synthetic Data.- Disclosure Risk Evaluation for Fully Synthetic Categorical Data.- v-Dispersed Synthetic Data Based on a Mixture Model with Constraints.- Nonparametric Generation of Synthetic Data for Small Geographic Areas.- Using Partially Synthetic Data to Replace Suppression in the Business Dynamics Statistics: Early Results.- Synthetic Longitudinal Business Databases for International Comparisons .- Record Linkage.- A Comparison of Blocking Methods for Record Linkage.- Probabilistic Record Linkage for Disclosure Risk Assessment.- Hierarchical Linkage Clustering with Distributions of Distances for Large-Scale Record Linkage.- Remote Access.- Comparison of Two Remote Access Systems Recently Developed and Implemented in Australia.- Privacy-Preserving Protocols.- Towards Secure and Practical Location Privacy through Private Equality Testing.- Case Studies.- Controlled Shuffling, Statistical Confidentiality and Microdata Utility: A Successful Experiment with a 10% Household Sample of the 2011 Population Census of Ireland for the IPUMS-International Database.- Balancing Confidentiality and Usability: Protecting Sensitive Data in the Case of Inward Foreign AffiliaTes Statistics (FATS).- Applicability of Confidentiality Methods to Personal and Business Data.