نتایج جستجو برای: microaggregation

تعداد نتایج: 185  

2008
Matthias Schmid Hans Schneeweiss

Microaggregation by individual ranking (IR) is an important technique for masking confidential data. While being a successful method for controlling the disclosure risk of observations, IR is also known for its favorable property of having a relatively small effect on the results of statistical analyses. In this paper we conduct a detailed theoretical analysis on the estimation of arbitrary mom...

2008
Agusti Solanas Roberto Di Pietro

Optimally micro-aggregating a multivariate data set is known to be NP-hard, thus, heuristic approaches are used to cope with this privacy preserving problem. Unfortunately, algorithms in the literature are computationally costly, and this prevents using them on large data sets. We propose a partitioning algorithm to micro-aggregate uniform very large data sets with cost O(n). We provide the mat...

2017

We introduce in this paper a method to anonymize document vector spaces. These vector spaces can be used to analyze confidential documents without disclosing private information. The method is inspired in microaggregation, a popular technique used in statistical disclosure control. URL http://doi.acm.org/10.1145/2480362.2480543 [9] Source URL: https://www.iiia.csic.es/en/node/54488 Links [1] ht...

2017

In this paper we give an overview on the application of aggregation operators in data privacy. Applications include data protection methods, as microaggregation, as well as measures to evaluate in what extent data is perturbated information loss measures and satisfy privacy requirements disclosure risk measures. URL http://www.springerlink.com/content/c543r3105nll5721/ [8] Source URL: https://w...

2007
Jordi Nin Javier Herranz Vicenç Torra

Nowadays, the need for privacy motivates the use of methods that permit us to protect a microdata file both minimizing the disclosure risk and preserving the statistical utility. Nevertheless, research is usually focused on how data utility is preserved, and much less research effort is dedicated to the study of the tools that an intruder might use to compromise the privacy of the data or, in o...

Journal: :Computational Statistics & Data Analysis 2009
George Kokolakis Dimitris Fouskakis

One of the techniques of data holders for the protection of confidentiality of continuous data is that of micro-aggregation. Rather than releasing raw data (individual records), micro-aggregation releases the averages of small groups and thus reduces the risk of identity disclosure. At the same time the method implies loss of information and often distorts the data. Thus, the choice of groups i...

2010
Victor Muntés Mulero David Dominguez

Acknowledgements Foremost, I would like to thank my daily supervisors Victor Muntés and Jordi Nin for their support and guidance during the development of this project. Without their help, this thesis would have not been possible. Also my gratitude to Josep LluÍs Larriba for giving me the opportunity to develop the project at the DAMA-UPC research group. I would also want to thank the people fr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید