{"title":"Rank-Based Record Linkage for Re-Identification Risk Assessment","authors":"K. Muralidhar, J. Domingo-Ferrer","doi":"10.1007/978-3-319-45381-1_17","DOIUrl":"https://doi.org/10.1007/978-3-319-45381-1_17","url":null,"abstract":"","PeriodicalId":91946,"journal":{"name":"Privacy in statistical databases. PSD (Conference : 2004- )","volume":"1 1","pages":"225-236"},"PeriodicalIF":0.0,"publicationDate":"2016-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80536468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anonymization in the Time of Big Data","authors":"J. Domingo-Ferrer, Jordi Soria-Comas","doi":"10.1007/978-3-319-45381-1_5","DOIUrl":"https://doi.org/10.1007/978-3-319-45381-1_5","url":null,"abstract":"","PeriodicalId":91946,"journal":{"name":"Privacy in statistical databases. PSD (Conference : 2004- )","volume":"11 1","pages":"57-68"},"PeriodicalIF":0.0,"publicationDate":"2016-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75092063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Precision Threshold and Noise: An Alternative Framework of Sensitivity Measures","authors":"Darren Gray","doi":"10.1007/978-3-319-45381-1_2","DOIUrl":"https://doi.org/10.1007/978-3-319-45381-1_2","url":null,"abstract":"","PeriodicalId":91946,"journal":{"name":"Privacy in statistical databases. PSD (Conference : 2004- )","volume":"69 1","pages":"15-27"},"PeriodicalIF":0.0,"publicationDate":"2016-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77452956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-Average KL-Privacy and Its Equivalence to Generalization for Max-Entropy Mechanisms","authors":"Yu-Xiang Wang, Jing Lei, S. Fienberg","doi":"10.1007/978-3-319-45381-1_10","DOIUrl":"https://doi.org/10.1007/978-3-319-45381-1_10","url":null,"abstract":"","PeriodicalId":91946,"journal":{"name":"Privacy in statistical databases. PSD (Conference : 2004- )","volume":"120 1","pages":"121-134"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87964224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Propensity score based conditional group swapping for disclosure limitation of strata-defining variables.","authors":"Anna Oganian, Goran Lesaja","doi":"10.1007/978-3-319-45381-1_6","DOIUrl":"10.1007/978-3-319-45381-1_6","url":null,"abstract":"<p><p>In this paper we propose a method for statistical disclosure limitation of categorical variables that we call Conditional Group Swapping. This approach is suitable for design and strata-defining variables, the cross-classification of which leads to the formation of important groups or subpopulations. These groups are considered important because from the point of view of data analysis it is desirable to preserve analytical characteristics within them. In general data swapping can be quite distorting ([12, 18, 15]), especially for the relationships between the variables not only within the subpopulations but for the overall data. To reduce the damage incurred by swapping, we propose to choose the records for swapping using conditional probabilities which depend on the characteristics of the exchanged records. In particular, our approach exploits the results of propensity scores methodology for the computation of swapping probabilities. The experimental results presented in the paper show good utility properties of the method.</p>","PeriodicalId":91946,"journal":{"name":"Privacy in statistical databases. PSD (Conference : 2004- )","volume":"6896 ","pages":"69-80"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7087407/pdf/nihms-1016632.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"37767307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Second Order Cone Formulation of Continuous CTA Model.","authors":"Goran Lesaja, Jordi Castro, Anna Oganian","doi":"10.1007/978-3-319-45381-1_4","DOIUrl":"10.1007/978-3-319-45381-1_4","url":null,"abstract":"<p><p>In this paper we consider a minimum distance Controlled Tabular Adjustment (CTA) model for statistical disclosure limitation (control) of tabular data. The goal of the CTA model is to find the closest safe table to some original tabular data set that contains sensitive information. The measure of closeness is usually measured using ℓ<sub>1</sub> or ℓ<sub>2</sub> norm; with each measure having its advantages and disadvantages. Recently, in [4] a regularization of the ℓ<sub>1</sub>-CTA using Pseudo-Huber function was introduced in an attempt to combine positive characteristics of both ℓ<sub>1</sub>-CTA and ℓ<sub>2</sub>-CTA. All three models can be solved using appropriate versions of Interior-Point Methods (IPM). It is known that IPM in general works better on well structured problems such as conic optimization problems, thus, reformulation of these CTA models as conic optimization problem may be advantageous. We present reformulation of Pseudo-Huber-CTA, and ℓ<sub>1</sub>-CTA as Second-Order Cone (SOC) optimization problems and test the validity of the approach on the small example of two-dimensional tabular data set.</p>","PeriodicalId":91946,"journal":{"name":"Privacy in statistical databases. PSD (Conference : 2004- )","volume":"1 1","pages":"41-53"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6863437/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83269650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applicability of Confidentiality Methods to Personal and Business Data","authors":"C. O'Keefe, N. Shlomo","doi":"10.1007/978-3-319-11257-2_27","DOIUrl":"https://doi.org/10.1007/978-3-319-11257-2_27","url":null,"abstract":"","PeriodicalId":91946,"journal":{"name":"Privacy in statistical databases. PSD (Conference : 2004- )","volume":"16 1","pages":"350-363"},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81663571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. McCaa, K. Muralidhar, R. Sarathy, Michael Comerford, Albert Esteve-Palos
{"title":"Controlled Shuffling, Statistical Confidentiality and Microdata Utility: A Successful Experiment with a 10% Household Sample of the 2011 Population Census of Ireland for the IPUMS-International Database","authors":"R. McCaa, K. Muralidhar, R. Sarathy, Michael Comerford, Albert Esteve-Palos","doi":"10.1007/978-3-319-11257-2_25","DOIUrl":"https://doi.org/10.1007/978-3-319-11257-2_25","url":null,"abstract":"","PeriodicalId":91946,"journal":{"name":"Privacy in statistical databases. PSD (Conference : 2004- )","volume":"4 1","pages":"326-337"},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86059822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}