Ara es mostren els items 1-20 de 42

    • A cryptographic solution for private distributed simple meeting scheduling 

      Herranz Sotoca, Javier; Matwin, Stan; Meseguer González, Pedro; Nin Guerrero, Jordi (IOS Press, 2009)
      Text en actes de congrés
      Accés obert
      Meeting scheduling is a suitable application for distributed computation motivated by its privacy requirements. Previous work on this problem have considered some cryptographic and conceptually clear approach to solve a ...
    • Analysis of the univariate microaggregation disclosure risk 

      Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2009-08-07)
      Article
      Accés restringit per política de l'editorial
      Microaggregation is a protection method used by statistical agencies to limit the disclosure risk of confidential information. Formally, microaggregation assigns each original datum to a small cluster and then replaces ...
    • Anonymizing data via polynomial regression 

      Nin Guerrero, Jordi; Pont Tuset, Jordi; Medrano Gracia, Pau; Larriba Pey, Josep; Muntés Mulero, Víctor (2007)
      Text en actes de congrés
      Accés obert
      The amount of confidential information accessible through the Internet is growing continuously. In this scenario, the improvement of anonymizing methods becomes crucial to avoid revealing sensible information of individuals. ...
    • Attribute selection in multivariate microaggregation 

      Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of the cluster. When the number of attributes ...
    • Beyond multivariate microaggregation for large record anonymization 

      Nin Guerrero, Jordi (2014)
      Article
      Accés obert
      Microaggregation is one of the most commonly employed microdata protection methods. The basic idea of microaggregation is to anonymize data by aggregating original records into small groups of at least k elements and, ...
    • Blocking anonymized data 

      Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2007)
      Text en actes de congrés
      Accés obert
      Nowadays, privacy is an important issue, for this reason many researchers are working in the development of new data protection methods. The aim of these methods is to minimize the disclosure risk (DR) preserving the data ...
    • Classifying data from protected statistical datasets 

      Herranz Sotoca, Javier; Matwin, Stan; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2010-06-09)
      Article
      Accés obert
      Statistical Disclosure Control (SDC) is an active research area in the recent years. The goal is to transform an original dataset X into a protected one X0, such that X0 does not reveal any relation between confidential ...
    • Computing reputation for collaborative private networks 

      Nin Guerrero, Jordi; Carminati, Barbara; Ferrari, Elena; Torra i Reventós, Vicenç (IEEE Computer Society Publications, 2009)
      Text en actes de congrés
      Accés obert
      The use of collaborative network services is increasing, therefore, the protection of the resources and relations shared by network participants is becoming crucial. One of the main issues in such networks is the evaluation ...
    • Contributions to record linkage for disclosure risk assessment 

      Nin Guerrero, Jordi (Consejo Superior de Investigaciones Científicas (CSIC), 2009-10-15)
      Llibre
      Accés restringit per política de l'editorial
      This book is about reidentification methods, and, more especifically, about record linkage. This study is motivated on the need to assess in an accurate way the risk of disclosure within the fields of privacy preserving ...
    • DEX: High-performance exploration on large graphs for information retrieval 

      Martínez Bazán, Norbert; Muntés Mulero, Víctor; Gómez Villamor, Sergio; Nin Guerrero, Jordi; Sánchez Martínez, Mario; Larriba Pey, Josep (2007)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Link and graph analysis tools are important devices to boost the richness of information retrieval systems. Internet and the existing social networking portals are just a couple of situations where the use of these tools ...
    • Digital watermarking techniques and security issues in the information and communication society 

      Nin Guerrero, Jordi; Ricciardi, Sergio (CRC Press and IEEE Press, 2013)
      Text en actes de congrés
      Accés obert
      Digital watermarking is the process of embedding information into a noise-tolerant digital signal such as image or audio data. Such information is embedded in a way difficult to be removed in order to easily identify ...
    • Distributed privacy-preserving methods for statistical disclosure control 

      Herranz Sotoca, Javier; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2010)
      Article
      Accés restringit per política de l'editorial
      Statistical disclosure control (SDC) methods aim to protect privacy of the confidential information included in some databases, for example by perturbing the non-confidential parts of the original databases. Such methods ...
    • Dynamic reputation-based trust computation in private networks 

      Nin Guerrero, Jordi; Carminati, Barbara; Ferrari, Elena; Torra i Reventós, Vicenç (2009)
      Report de recerca
      Accés obert
      The use of collaborative networks services in general, and web based social networks (WBSN) services in particular, is today increasing and, therefore, the protection of the resources shared by network participants is ...
    • Energy-efficiency and security issues in the Cisco Nexus virtual distributed switching 

      Peterson, Benjamin; Ricciardi, Sergio; Nin Guerrero, Jordi (Institute of Electrical and Electronics Engineers (IEEE), 2012)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Virtualization technologies have brought with them the promise of increased security and energy saving. Such was the case with the Cisco Nexus virtual switching environment. However, possible security issues of this ...
    • Fuzzy measures and integrals in re-identification problems 

      Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2006)
      Text en actes de congrés
      Accés obert
      In this paper we give an overview of our approach of using aggregation operators, and more specifically, fuzzy integrals for solving re-identification problems. We show that the use of Choquet integrals are suitable for ...
    • How to group attributes in multivariate microaggregation 

      Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008-04-01)
      Article
      Accés restringit per política de l'editorial
      Microaggregation is one of the most employed microdata protection methods. It builds clusters of at least k original records, and then replaces these records with the centroid of the cluster. When the number of attributes ...
    • Human pose completion in partial body camera shots 

      Tous Liesa, Rubén; Nin Guerrero, Jordi; Igual Muñoz, Laura (2023-07-28)
      Article
      Accés restringit per política de l'editorial
      Many actual images contain partial body camera shots, in which a significant part of the body is not visible. This issue is especially prevalent in film images, where less than 10% are full-body shots. Most 2D human pose ...
    • Improving microaggregation for complex record anonymization 

      Pont Tuset, Jordi; Nin Guerrero, Jordi; Medrano Gracia, Pau; Larriba Pey, Josep; Muntés Mulero, Víctor (Springer Verlag, 2008)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Microaggregation is one of the most commonly employed microdata protection methods. This method builds clusters of at least k original records and replaces the records in each cluster with the centroid of the cluster. ...
    • Increasing polynomial regression complexity for data anonymization 

      Nin Guerrero, Jordi; Pont Tuset, Jordi; Medrano Gracia, Pau; Larriba Pey, Josep; Muntés Mulero, Víctor (IEEE Computer Society, 2007)
      Text en actes de congrés
      Accés obert
      Pervasive computing and the increasing networking needs usually demand from publishing data without revealing sensible information. Among several data protection methods proposed in the literature, those based on linear ...
    • Kd-trees and the real disclosure risks of large statistical databases 

      Herranz Sotoca, Javier; Nin Guerrero, Jordi; Solé Simó, Marc (Elsevier, 2011)
      Article
      Accés restringit per política de l'editorial
      In data privacy, record linkage can be used as an estimator of the disclosure risk of protected data. To model the worst case scenario one normally attempts to link records from the original data to the protected data. ...