Listing 1 - 10 of 37 | << page >> |
Sort by
|
Choose an application
Inference control in statistical databases, also known as statistical disclosure limitation or statistical confidentiality, is about finding tradeoffs to the tension between the increasing societal need for accurate statistical data and the legal and ethical obligation to protect privacy of individuals and enterprises which are the source of data for producing statistics. Techniques used by intruders to make inferences compromising privacy increasingly draw on data mining, record linkage, knowledge discovery, and data analysis and thus statistical inference control becomes an integral part of computer science. This coherent state-of-the-art survey presents some of the most recent work in the field. The papers presented together with an introduction are organized in topical sections on tabular data protection, microdata protection, and software and user case studies.
Computer Science --- Engineering & Applied Sciences --- Database security. --- Statistics --- Statistical analysis --- Statistical data --- Statistical methods --- Statistical science --- Data base security --- Databases --- Security measures --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Mathematical statistics. --- Database management. --- Artificial intelligence. --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Probability and Statistics in Computer Science. --- Database Management. --- Computers and Society. --- Artificial Intelligence (incl. Robotics). --- Mathematics --- Econometrics --- Computer security --- Cryptology. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Inference. --- Ampliative induction --- Induction, Ampliative --- Inference (Logic) --- Reasoning --- Civilization and computers --- Civilization --- Statistical inference --- Statistics, Mathematical --- Probabilities --- Sampling (Statistics) --- Data encryption (Computer science)
Choose an application
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2014, held in Ibiza, Spain in September 2014 under the sponsorship of the UNESCO chair in Data Privacy. The 27 revised full papers presented were carefully reviewed and selected from 41 submissions. The scope of the conference is on following topics: tabular data protection, microdata masking, protection using privacy models, synthetic data, record linkage, remote access, privacy-preserving protocols, and case studies.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Database management. --- Application software. --- Computers and civilization. --- Computer Science. --- Computer Appl. in Administrative Data Processing. --- Database Management. --- Systems and Data Security. --- Data Encryption. --- Computers and Society. --- Information systems. --- Cryptology. --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Database security --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Statistical science --- Operational research. Game theory --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- stochastische analyse --- informatica --- maatschappij --- statistiek --- database management --- informatietechnologie --- KI (kunstmatige intelligentie) --- robots
Choose an application
Statistical science --- Operational research. Game theory --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- stochastische analyse --- informatica --- maatschappij --- statistiek --- database management --- informatietechnologie --- KI (kunstmatige intelligentie) --- robots --- AI (artificiële intelligentie)
Choose an application
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2014, held in Ibiza, Spain in September 2014 under the sponsorship of the UNESCO chair in Data Privacy. The 27 revised full papers presented were carefully reviewed and selected from 41 submissions. The scope of the conference is on following topics: tabular data protection, microdata masking, protection using privacy models, synthetic data, record linkage, remote access, privacy-preserving protocols, and case studies.
Office management --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- DES (data encryption standard) --- computers --- informatica --- maatschappij --- bedrijfsadministratie --- informatiesystemen --- database management --- computerbeveiliging --- computerkunde
Choose an application
This book explores the theoretical foundations of co-utility as well as its application to a number of areas, including distributed reputation management, anonymous keyword search, collaborative data anonymization, digital oblivion, peer-to-peer (P2P) content distribution, ridesharing for sustainable mobility, environmental economy, business model design and the collaborative economy. It evolved from presentations at the 1st Co-Utility Workshop, "held in Tarragona, Spain, on March 10–11, 2016." How can we guarantee that a global society without a common legal framework operates smoothly? If generosity, honesty and helpfulness do not arise spontaneously, one approach would be to design transactions so that helping others remains the best rational option. This is precisely the goal of co-utility, which can be defined in game-theoretic terms as any interaction between peers in which the best option for a player to maximize her or his utility is to make sure the other players also enjoy a fair share of utility (for example, functionality, security or privacy). Therefore, a protocol or mechanism designed using the co-utility principle ensures that helping others is the best rational option, even if players are selfish.
Computational intelligence. --- Intelligence, Computational --- Engineering. --- Game theory. --- Computational Intelligence. --- Game Theory. --- Games, Theory of --- Theory of games --- Mathematical models --- Mathematics --- Construction --- Industrial arts --- Technology --- Artificial intelligence --- Soft computing
Choose an application
Chapter "SwapMob: Swapping Trajectories for Mobility Anonymization" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Data mining. --- Information storage and retrieva. --- Computer science. --- Computer security. --- Artificial intelligence. --- Data Mining and Knowledge Discovery. --- Information Storage and Retrieval. --- Computers and Society. --- Systems and Data Security. --- Probability and Statistics in Computer Science. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Protection --- Security measures --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Information storage and retrieval. --- Computers and civilization. --- Mathematical statistics. --- Mathematics --- Statistical inference --- Statistics, Mathematical --- Statistics --- Probabilities --- Sampling (Statistics) --- Civilization and computers --- Civilization --- Statistical methods
Choose an application
The Chapter “Explaining recurrent machine learning models: integral privacy revisited” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Data mining. --- Information storage and retrieval. --- Computers and civilization. --- Computer security. --- Artificial intelligence. --- Data Mining and Knowledge Discovery. --- Information Storage and Retrieval. --- Computers and Society. --- Systems and Data Security. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Civilization and computers --- Civilization --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Protection --- Security measures --- Database security --- Statistics --- Databases --- Statistical analysis --- Statistical data --- Statistical methods --- Statistical science --- Mathematics --- Econometrics
Choose an application
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2022, held in Paris, France, during September 21-23, 2022.The 25 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections as follows: Privacy models; tabular data; disclosure risk assessment and record linkage; privacy-preserving protocols; unstructured and mobility data; synthetic data; machine learning and privacy; and case studies.
Data protection --- Database security --- Bases de dades --- Seguretat informàtica --- Protecció de dades --- Estadística
Choose an application
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2022, held in Paris, France, during September 21-23, 2022.The 25 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections as follows: Privacy models; tabular data; disclosure risk assessment and record linkage; privacy-preserving protocols; unstructured and mobility data; synthetic data; machine learning and privacy; and case studies.
Listing 1 - 10 of 37 | << page >> |
Sort by
|