ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
18
views
15
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,402
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Privacy in Statistical Databases
Anonymization Methods for Taxonomic Microdata
other
Author(s):
Josep Domingo-Ferrer
,
Krish Muralidhar
,
Guillem Rufian-Torrell
Publication date
(Print):
2012
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Taxonomic intelligence
Most cited references
15
Record
: found
Abstract
: not found
Article
: not found
Practical data-oriented microaggregation for statistical disclosure control
J.M. Mateo-Sanz
,
J. Domingo-Ferrer
(2002)
0
comments
Cited
50
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation
Josep Domingo-Ferrer
,
Vicenç Torra
(2005)
0
comments
Cited
48
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Elements of Statistical Disclosure Control
Leon Willenborg
,
Ton de Waal
(2001)
0
comments
Cited
47
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2012
Pages
: 90-102
DOI:
10.1007/978-3-642-33627-0_8
SO-VID:
c16c7c04-6835-454d-b046-304d4ccb3f64
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
p% Should Dominate
pp. 11
A Computational Evaluation of Optimization Solvers for CTA
pp. 22
Flexible Rounding Based on Consistent Post-tabular Stochastic Noise
pp. 35
Comparing L 1 and L 2 Distances for CTA
pp. 47
An Investigation of Model-Based Microdata Masking for Magnitude Tabular Data Release
pp. 63
Testing of IHSN C++ Code and Inclusion of New Methods into sdcMicro
pp. 78
Clustering-Based Categorical Data Protection
pp. 90
Anonymization Methods for Taxonomic Microdata
pp. 103
Hybrid Microdata via Model-Based Clustering
pp. 116
Logistic Regression with Variables Subject to Post Randomization Method
pp. 131
Valid Statistical Inference on Automatically Matched Files
pp. 143
n-Cycle Swapping for the American Community Survey
pp. 165
Generating Useful Test Data for Complex Linked Employer-Employee Datasets
pp. 179
When Excessive Perturbation Goes Wrong and Why IPUMS-International Relies Instead on Sampling, Suppression, Swapping, and Other Minimally Harmful Methods to Protect Privacy of Census Microdata
pp. 188
Achieving Comparability of Earnings
pp. 200
Designing Multiple Releases from the Small and Medium Enterprises Survey
pp. 216
A Proposed Solution to the Archiving and Curation of Confidential Scientific Inputs
pp. 226
Confidentialising Maps of Mixed Point and Diffuse Spatial Data
pp. 241
Security of Random Output Perturbation for Statistical Databases
pp. 257
Empirical Evaluation of Statistical Inference from Differentially-Private Contingency Tables
pp. 286
European Data Access Comes True
pp. 295
A Bayesian Approach for On-Line Sum/Count/Max/Min Auditing on Boolean Data
pp. 308
Document Sanitization: Measuring Search Engine Information Loss and Risk of Disclosure for the Wikileaks cables
pp. 322
Enhancing the Efficiency in Privacy Preserving Learning of Decision Trees in Partitioned Databases
pp. 336
On Computational Anonymity
pp. 348
”Better Than Nothing” Privacy with Bloom Filters: To What Extent?
Similar content
2,402
An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services
Authors:
J. Andrew Onesimu
,
J Karthikeyan
,
Yuichi Sei
Conditional anonymous remote healthcare data sharing over blockchain
Authors:
Anonymizing and Sharing Medical Text Records
Authors:
Xiao-Bai Li
,
Jialun Qin
See all similar