New Approaches to Confidentiality Protection
نویسندگان
چکیده
This document reports the results of research and analysis undertaken by the U.S. Census Bureau staff. It has undergone a Census Bureau review more limited in scope than that given to official Census Bureau publications. [This document is released to inform interested parties of ongoing research and to encourage discussion of work in progress.] and the Alfred P. Sloan Foundation. The views expressed herein are attributable only to the author(s) and do not represent the views of the U.S. Census Bureau, its program sponsors or data providers. Some or all of the data used in this paper are confidential data from the LEHD Program. The U.S. Census Bureau is preparing to support external researchers' use of these data; please contact U. Much of the paper is drawn from joint work and discussions with John Haltiwanger and Martha Stinson. We thank Fredrik Andersson and Simon Woodcock for helpful comments. All errors are our own.
منابع مشابه
New Approaches to Confidentiality Protection: Synthetic Data, Remote Access and Research Data Centers
Much of the paper is drawn from joint work and discussions with John Haltiwanger and Martha Stinson. We thank Fredrik Andersson and Simon Woodcock for helpful comments. All errors are our own.
متن کاملطراحی الگوی اصول محرمانگی اطلاعات پرونده سلامت الکترونیک برای ایران - 1386
Introduction: Today increasing growing of health information is results in applying of new technologies for suite manages and utilization of information technologies such as electronic health record. A growing capacity of information technologies in collection, storage and transmission of information has added a great deal of concerns since electronic records can be accessed by numerous consume...
متن کاملFine-Grained and Scalable Message Protection in Sensitive Organizations
Today electronic messaging services are indispensable to individuals and organizations. If a message contains sensitive information, the integrity and confidentiality of the contents created by individual users should be maintained in an effective manner. Therefore, there is an urgent need for new mechanisms to support the requirement. In this paper we focus on the message protection in the org...
متن کاملPrivacy-Preserving Data Sharing for Genome-Wide Association Studies
Traditional statistical methods for confidentiality protection of statistical databases do not scale well to deal with GWAS (genome-wide association studies) databases especially in terms of guarantees regarding protection from linkage to external information. The more recent concept of differential privacy, introduced by the cryptographic community, is an approach which provides a rigorous def...
متن کاملHigh Speed Memory Centric Protection on Software Execution Using One-Time-Pad Prediction
This paper presents a new security model for protecting software confidentiality. Different from the previous processcentric systems designed for the same purpose, the new model ties cryptographic properties and security attributes to memory instead of a user process. The advantages of such memory centric design over the previous process-centric design are two folds. First, it provides a better...
متن کاملData Protection; Identification and Authentication in Applications and Protocols
Information security has to respect three contradictory requests: protection of confidentiality, integrity and availability of information. The concept of building security of the information systems distinguishes many approaches. On the level of identification, authentication and authorization of users, users rights, authentication and authorization of users data, many systems of protocols and...
متن کامل