Ara es mostren els items 3-16 de 16

    • Blocking anonymized data 

      Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2007)
      Text en actes de congrés
      Accés obert
      Nowadays, privacy is an important issue, for this reason many researchers are working in the development of new data protection methods. The aim of these methods is to minimize the disclosure risk (DR) preserving the data ...
    • Classifying data from protected statistical datasets 

      Herranz Sotoca, Javier; Matwin, Stan; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2010-06-09)
      Article
      Accés obert
      Statistical Disclosure Control (SDC) is an active research area in the recent years. The goal is to transform an original dataset X into a protected one X0, such that X0 does not reveal any relation between confidential ...
    • Computing reputation for collaborative private networks 

      Nin Guerrero, Jordi; Carminati, Barbara; Ferrari, Elena; Torra i Reventós, Vicenç (IEEE Computer Society Publications, 2009)
      Text en actes de congrés
      Accés obert
      The use of collaborative network services is increasing, therefore, the protection of the resources and relations shared by network participants is becoming crucial. One of the main issues in such networks is the evaluation ...
    • Distributed privacy-preserving methods for statistical disclosure control 

      Herranz Sotoca, Javier; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2010)
      Article
      Accés restringit per política de l'editorial
      Statistical disclosure control (SDC) methods aim to protect privacy of the confidential information included in some databases, for example by perturbing the non-confidential parts of the original databases. Such methods ...
    • Dynamic reputation-based trust computation in private networks 

      Nin Guerrero, Jordi; Carminati, Barbara; Ferrari, Elena; Torra i Reventós, Vicenç (2009)
      Report de recerca
      Accés obert
      The use of collaborative networks services in general, and web based social networks (WBSN) services in particular, is today increasing and, therefore, the protection of the resources shared by network participants is ...
    • Fuzzy measures and integrals in re-identification problems 

      Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2006)
      Text en actes de congrés
      Accés obert
      In this paper we give an overview of our approach of using aggregation operators, and more specifically, fuzzy integrals for solving re-identification problems. We show that the use of Choquet integrals are suitable for ...
    • How to group attributes in multivariate microaggregation 

      Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008-04-01)
      Article
      Accés restringit per política de l'editorial
      Microaggregation is one of the most employed microdata protection methods. It builds clusters of at least k original records, and then replaces these records with the centroid of the cluster. When the number of attributes ...
    • Modeling projections in microaggregation 

      Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2008)
      Text en actes de congrés
      Accés obert
      Microaggregation is a method used by statistical agencies to limit the disclosure of sensitive microdata. It has been proven that microaggregation is an NP-hard problem when more than one variable is microaggregated at the ...
    • On method-specific record linkage for risk assessment 

      Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2007)
      Text en actes de congrés
      Accés obert
      Nowadays, the need for privacy motivates the use of methods that permit us to protect a microdata file both minimizing the disclosure risk and preserving the statistical utility. Nevertheless, research is usually focused ...
    • On the disclosure risk of multivariate microaggregation 

      Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (Elsevier Science Ltd., 2008-07-22)
      Article
      Accés restringit per política de l'editorial
      The aim of data protection methods is to protect a microdata file both minimizing the disclosure risk and preserving the data utility. Microaggregation is one of the most popular such methods among statistical agencies. ...
    • On the use of aggregation operators for location privacy 

      Valls, Aïda; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2009)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Nowadays, the management of sequential and temporal data is an increasing need in many data mining processes. Therefore, the development of new privacy preserving data mining techniques for sequential data is a crucial ...
    • Record linkage for database integration using fuzzy integrals 

      Nin Guerrero, Jordi; Torra i Reventós, Vicenç (Wiley InterScience, 2008-06-01)
      Article
      Accés restringit per política de l'editorial
      Given two-data databases, record linkage algorithms try to establish which records of these files contain information on the same individual. Standard record linkage algorithms assume that both files are described using ...
    • Towards the evaluation of time series protection methods 

      Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2009-02-04)
      Article
      Accés restringit per política de l'editorial
      The goal of statistical disclosure control (SDC) is to modify statistical data so that it can be published without releasing confidential information that may be linked to specific respondents. The challenge for SDC is to ...
    • Towards the use of OWA operators for record linkage 

      Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2005)
      Text en actes de congrés
      Accés obert
      Record linkage is used to establish links between those records that while belonging to two different files correspond to the same individual. Classical approaches assume that the two files contain some common variables, ...