نتایج جستجو برای: microaggregation
تعداد نتایج: 185 فیلتر نتایج به سال:
Microaggregation by individual ranking (IR) is an important technique for masking confidential data. While being a successful method for controlling the disclosure risk of observations, IR is also known for its favorable property of having a relatively small effect on the results of statistical analyses. In this paper we conduct a detailed theoretical analysis on the estimation of arbitrary mom...
Optimally micro-aggregating a multivariate data set is known to be NP-hard, thus, heuristic approaches are used to cope with this privacy preserving problem. Unfortunately, algorithms in the literature are computationally costly, and this prevents using them on large data sets. We propose a partitioning algorithm to micro-aggregate uniform very large data sets with cost O(n). We provide the mat...
We introduce in this paper a method to anonymize document vector spaces. These vector spaces can be used to analyze confidential documents without disclosing private information. The method is inspired in microaggregation, a popular technique used in statistical disclosure control. URL http://doi.acm.org/10.1145/2480362.2480543 [9] Source URL: https://www.iiia.csic.es/en/node/54488 Links [1] ht...
In this paper we give an overview on the application of aggregation operators in data privacy. Applications include data protection methods, as microaggregation, as well as measures to evaluate in what extent data is perturbated information loss measures and satisfy privacy requirements disclosure risk measures. URL http://www.springerlink.com/content/c543r3105nll5721/ [8] Source URL: https://w...
Nowadays, the need for privacy motivates the use of methods that permit us to protect a microdata file both minimizing the disclosure risk and preserving the statistical utility. Nevertheless, research is usually focused on how data utility is preserved, and much less research effort is dedicated to the study of the tools that an intruder might use to compromise the privacy of the data or, in o...
One of the techniques of data holders for the protection of confidentiality of continuous data is that of micro-aggregation. Rather than releasing raw data (individual records), micro-aggregation releases the averages of small groups and thus reduces the risk of identity disclosure. At the same time the method implies loss of information and often distorts the data. Thus, the choice of groups i...
Acknowledgements Foremost, I would like to thank my daily supervisors Victor Muntés and Jordi Nin for their support and guidance during the development of this project. Without their help, this thesis would have not been possible. Also my gratitude to Josep LluÍs Larriba for giving me the opportunity to develop the project at the DAMA-UPC research group. I would also want to thank the people fr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید