Ara es mostren els items 1-20 de 41

  • A cryptographic solution for private distributed simple meeting scheduling 

    Herranz Sotoca, Javier; Matwin, Stan; Meseguer González, Pedro; Nin Guerrero, Jordi (IOS Press, 2009)
    Text en actes de congrés
    Accés obert
    Meeting scheduling is a suitable application for distributed computation motivated by its privacy requirements. Previous work on this problem have considered some cryptographic and conceptually clear approach to solve a ...
  • Analysis of the univariate microaggregation disclosure risk 

    Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2009-08-07)
    Article
    Accés restringit per política de l'editorial
    Microaggregation is a protection method used by statistical agencies to limit the disclosure risk of confidential information. Formally, microaggregation assigns each original datum to a small cluster and then replaces ...
  • Anonymizing data via polynomial regression 

    Nin Guerrero, Jordi; Pont Tuset, Jordi; Medrano Gracia, Pau; Larriba Pey, Josep; Muntés Mulero, Víctor (2007)
    Text en actes de congrés
    Accés obert
    The amount of confidential information accessible through the Internet is growing continuously. In this scenario, the improvement of anonymizing methods becomes crucial to avoid revealing sensible information of individuals. ...
  • Attribute selection in multivariate microaggregation 

    Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of the cluster. When the number of attributes ...
  • Beyond multivariate microaggregation for large record anonymization 

    Nin Guerrero, Jordi (2014)
    Article
    Accés obert
    Microaggregation is one of the most commonly employed microdata protection methods. The basic idea of microaggregation is to anonymize data by aggregating original records into small groups of at least k elements and, ...
  • Blocking anonymized data 

    Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2007)
    Text en actes de congrés
    Accés obert
    Nowadays, privacy is an important issue, for this reason many researchers are working in the development of new data protection methods. The aim of these methods is to minimize the disclosure risk (DR) preserving the data ...
  • Classifying data from protected statistical datasets 

    Herranz Sotoca, Javier; Matwin, Stan; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2010-06-09)
    Article
    Accés obert
    Statistical Disclosure Control (SDC) is an active research area in the recent years. The goal is to transform an original dataset X into a protected one X0, such that X0 does not reveal any relation between confidential ...
  • Computing reputation for collaborative private networks 

    Nin Guerrero, Jordi; Carminati, Barbara; Ferrari, Elena; Torra i Reventós, Vicenç (IEEE Computer Society Publications, 2009)
    Text en actes de congrés
    Accés obert
    The use of collaborative network services is increasing, therefore, the protection of the resources and relations shared by network participants is becoming crucial. One of the main issues in such networks is the evaluation ...
  • Contributions to record linkage for disclosure risk assessment 

    Nin Guerrero, Jordi (Consejo Superior de Investigaciones Científicas (CSIC), 2009-10-15)
    Llibre
    Accés restringit per política de l'editorial
    This book is about reidentification methods, and, more especifically, about record linkage. This study is motivated on the need to assess in an accurate way the risk of disclosure within the fields of privacy preserving ...
  • DEX: High-performance exploration on large graphs for information retrieval 

    Martínez Bazán, Norbert; Muntés Mulero, Víctor; Gómez Villamor, Sergio; Nin Guerrero, Jordi; Sánchez Martínez, Mario; Larriba Pey, Josep (2007)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    Link and graph analysis tools are important devices to boost the richness of information retrieval systems. Internet and the existing social networking portals are just a couple of situations where the use of these tools ...
  • Digital watermarking techniques and security issues in the information and communication society 

    Nin Guerrero, Jordi; Ricciardi, Sergio (CRC Press and IEEE Press, 2013)
    Text en actes de congrés
    Accés obert
    Digital watermarking is the process of embedding information into a noise-tolerant digital signal such as image or audio data. Such information is embedded in a way difficult to be removed in order to easily identify ...
  • Distributed privacy-preserving methods for statistical disclosure control 

    Herranz Sotoca, Javier; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2010)
    Article
    Accés restringit per política de l'editorial
    Statistical disclosure control (SDC) methods aim to protect privacy of the confidential information included in some databases, for example by perturbing the non-confidential parts of the original databases. Such methods ...
  • Dynamic reputation-based trust computation in private networks 

    Nin Guerrero, Jordi; Carminati, Barbara; Ferrari, Elena; Torra i Reventós, Vicenç (2009)
    Report de recerca
    Accés obert
    The use of collaborative networks services in general, and web based social networks (WBSN) services in particular, is today increasing and, therefore, the protection of the resources shared by network participants is ...
  • Energy-efficiency and security issues in the Cisco Nexus virtual distributed switching 

    Peterson, Benjamin; Ricciardi, Sergio; Nin Guerrero, Jordi (Institute of Electrical and Electronics Engineers (IEEE), 2012)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    Virtualization technologies have brought with them the promise of increased security and energy saving. Such was the case with the Cisco Nexus virtual switching environment. However, possible security issues of this ...
  • Fuzzy measures and integrals in re-identification problems 

    Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2006)
    Text en actes de congrés
    Accés obert
    In this paper we give an overview of our approach of using aggregation operators, and more specifically, fuzzy integrals for solving re-identification problems. We show that the use of Choquet integrals are suitable for ...
  • How to group attributes in multivariate microaggregation 

    Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008-04-01)
    Article
    Accés restringit per política de l'editorial
    Microaggregation is one of the most employed microdata protection methods. It builds clusters of at least k original records, and then replaces these records with the centroid of the cluster. When the number of attributes ...
  • Improving microaggregation for complex record anonymization 

    Pont Tuset, Jordi; Nin Guerrero, Jordi; Medrano Gracia, Pau; Larriba Pey, Josep; Muntés Mulero, Víctor (Springer Verlag, 2008)
    Text en actes de congrés
    Accés restringit per política de l'editorial
    Microaggregation is one of the most commonly employed microdata protection methods. This method builds clusters of at least k original records and replaces the records in each cluster with the centroid of the cluster. ...
  • Increasing polynomial regression complexity for data anonymization 

    Nin Guerrero, Jordi; Pont Tuset, Jordi; Medrano Gracia, Pau; Larriba Pey, Josep; Muntés Mulero, Víctor (IEEE Computer Society, 2007)
    Text en actes de congrés
    Accés obert
    Pervasive computing and the increasing networking needs usually demand from publishing data without revealing sensible information. Among several data protection methods proposed in the literature, those based on linear ...
  • Kd-trees and the real disclosure risks of large statistical databases 

    Herranz Sotoca, Javier; Nin Guerrero, Jordi; Solé Simó, Marc (Elsevier, 2011)
    Article
    Accés restringit per política de l'editorial
    In data privacy, record linkage can be used as an estimator of the disclosure risk of protected data. To model the worst case scenario one normally attempts to link records from the original data to the protected data. ...
  • Modeling projections in microaggregation 

    Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2008)
    Text en actes de congrés
    Accés obert
    Microaggregation is a method used by statistical agencies to limit the disclosure of sensitive microdata. It has been proven that microaggregation is an NP-hard problem when more than one variable is microaggregated at the ...