M. Bishop, B. Bhumiratana, Rick Crawford, K. Levitt
{"title":"如何清理数据?","authors":"M. Bishop, B. Bhumiratana, Rick Crawford, K. Levitt","doi":"10.1109/ENABL.2004.36","DOIUrl":null,"url":null,"abstract":"Balancing the needs of a data analyst with the privacy needs of a data provider is a key issue when data is sanitized. We treat both the requirements of the analyst and the privacy expectations as policies, and compose the two policies to detect conflicts. The result can be applied to an intermediate data representation to sanitize the relevant pans of the data. We conclude that this method has promise, but more work is needed to determine its effectiveness and limits.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"66 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"34","resultStr":"{\"title\":\"How to sanitize data?\",\"authors\":\"M. Bishop, B. Bhumiratana, Rick Crawford, K. Levitt\",\"doi\":\"10.1109/ENABL.2004.36\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Balancing the needs of a data analyst with the privacy needs of a data provider is a key issue when data is sanitized. We treat both the requirements of the analyst and the privacy expectations as policies, and compose the two policies to detect conflicts. The result can be applied to an intermediate data representation to sanitize the relevant pans of the data. We conclude that this method has promise, but more work is needed to determine its effectiveness and limits.\",\"PeriodicalId\":391459,\"journal\":{\"name\":\"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises\",\"volume\":\"66 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"34\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ENABL.2004.36\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ENABL.2004.36","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Balancing the needs of a data analyst with the privacy needs of a data provider is a key issue when data is sanitized. We treat both the requirements of the analyst and the privacy expectations as policies, and compose the two policies to detect conflicts. The result can be applied to an intermediate data representation to sanitize the relevant pans of the data. We conclude that this method has promise, but more work is needed to determine its effectiveness and limits.