Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Tabular Data Protection | |
Using a Mathematical Programming Modeling Language for Optimal CTA | p. 1 |
A Data Quality and Data Confidentiality Assessment of Complementary Cell Suppression | p. 13 |
Pre-processing Optimisation Applied to the Classical Integer Programming Model for Statistical Disclosure Control | p. 24 |
How to Make the [toe]-ARGUS Modular Method Applicable to Linked Tables | p. 37 |
Bayesian Assessment of Rounding-Based Disclosure Control | p. 50 |
Cell Bounds in Two-Way Contingency Tables Based on Conditional Frequencies | p. 64 |
Invariant Post-tabular Protection of Census Frequency Counts | p. 77 |
Microdata Protection: Methods and Case Studies | |
A Practical Approach to Balancing Data Confidentiality and Research Needs: The NHIS Linked Mortality Files | p. 90 |
From t-Closeness to PRAM and Noise Addition Via Information Theory | p. 100 |
Robustification of Microdata Masking Methods and the Comparison with Existing Methods | p. 113 |
A Preliminary Investigation of the Impact of Gaussian Versus t-Copula or Data Perturbation | p. 127 |
Anonymisation of Panel Enterprise Microdata - Survey of a German Project | p. 139 |
Microdata Protection: Disclosure Risk Assessment | |
Towards a More Realistic Disclosure Risk Assessment | p. 152 |
Assessing Disclosure Risk for Record Linkage | p. 166 |
Robust Statistics Meets SDC: New Disclosure Risk Measures for Continuous Microdata Masking | p. 177 |
Parallelizing Record Linkage for Disclosure Risk Assessment | p. 190 |
Extensions of the Re-identification Risk Measures Based on Log-Linear Models | p. 203 |
Use of Auxiliary Information in Risk Estimation | p. 213 |
Accounting for Intruder Uncertainty Due to Sampling When Estimating Identification Disclosure Risks in Partially Synthetic Data | p. 227 |
How Protective Are Synthetic Data? | p. 239 |
On-Line Databases and Remote Access | |
Auditing Categorical SUM, MAX and MIN Queries | p. 247 |
Reasoning under Uncertainty in On-Line Auditing | p. 257 |
A Remote Analysis Server - What Does Regression Output Look Like? | p. 270 |
Privacy-Preserving Data Mining and Private Information Retrieval | |
Accuracy in Privacy-Preserving Data Mining Using the Paradigm Cryptographic Elections | p. 284 |
A Privacy-Preserving Framework for Integrating Person-Specific Databases | p. 298 |
Peer-to-Peer Private Information Retrieval | p. 315 |
Legal Issues | |
Legal, Political and Methodological Issues in Confidentiality in the European Statistical System | p. 324 |
Author Index | p. 335 |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.