Exploració per autor "Torra i Reventós, Vicenç"
Ara es mostren els items 3-16 de 16
-
Blocking anonymized data
Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2007)
Text en actes de congrés
Accés obertNowadays, privacy is an important issue, for this reason many researchers are working in the development of new data protection methods. The aim of these methods is to minimize the disclosure risk (DR) preserving the data ... -
Classifying data from protected statistical datasets
Herranz Sotoca, Javier; Matwin, Stan; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2010-06-09)
Article
Accés obertStatistical Disclosure Control (SDC) is an active research area in the recent years. The goal is to transform an original dataset X into a protected one X0, such that X0 does not reveal any relation between confidential ... -
Computing reputation for collaborative private networks
Nin Guerrero, Jordi; Carminati, Barbara; Ferrari, Elena; Torra i Reventós, Vicenç (IEEE Computer Society Publications, 2009)
Text en actes de congrés
Accés obertThe use of collaborative network services is increasing, therefore, the protection of the resources and relations shared by network participants is becoming crucial. One of the main issues in such networks is the evaluation ... -
Distributed privacy-preserving methods for statistical disclosure control
Herranz Sotoca, Javier; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2010)
Article
Accés restringit per política de l'editorialStatistical disclosure control (SDC) methods aim to protect privacy of the confidential information included in some databases, for example by perturbing the non-confidential parts of the original databases. Such methods ... -
Dynamic reputation-based trust computation in private networks
Nin Guerrero, Jordi; Carminati, Barbara; Ferrari, Elena; Torra i Reventós, Vicenç (2009)
Report de recerca
Accés obertThe use of collaborative networks services in general, and web based social networks (WBSN) services in particular, is today increasing and, therefore, the protection of the resources shared by network participants is ... -
Fuzzy measures and integrals in re-identification problems
Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2006)
Text en actes de congrés
Accés obertIn this paper we give an overview of our approach of using aggregation operators, and more specifically, fuzzy integrals for solving re-identification problems. We show that the use of Choquet integrals are suitable for ... -
How to group attributes in multivariate microaggregation
Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008-04-01)
Article
Accés restringit per política de l'editorialMicroaggregation is one of the most employed microdata protection methods. It builds clusters of at least k original records, and then replaces these records with the centroid of the cluster. When the number of attributes ... -
Modeling projections in microaggregation
Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2008)
Text en actes de congrés
Accés obertMicroaggregation is a method used by statistical agencies to limit the disclosure of sensitive microdata. It has been proven that microaggregation is an NP-hard problem when more than one variable is microaggregated at the ... -
On method-specific record linkage for risk assessment
Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2007)
Text en actes de congrés
Accés obertNowadays, the need for privacy motivates the use of methods that permit us to protect a microdata file both minimizing the disclosure risk and preserving the statistical utility. Nevertheless, research is usually focused ... -
On the disclosure risk of multivariate microaggregation
Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (Elsevier Science Ltd., 2008-07-22)
Article
Accés restringit per política de l'editorialThe aim of data protection methods is to protect a microdata file both minimizing the disclosure risk and preserving the data utility. Microaggregation is one of the most popular such methods among statistical agencies. ... -
On the use of aggregation operators for location privacy
Valls, Aïda; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2009)
Text en actes de congrés
Accés restringit per política de l'editorialNowadays, the management of sequential and temporal data is an increasing need in many data mining processes. Therefore, the development of new privacy preserving data mining techniques for sequential data is a crucial ... -
Record linkage for database integration using fuzzy integrals
Nin Guerrero, Jordi; Torra i Reventós, Vicenç (Wiley InterScience, 2008-06-01)
Article
Accés restringit per política de l'editorialGiven two-data databases, record linkage algorithms try to establish which records of these files contain information on the same individual. Standard record linkage algorithms assume that both files are described using ... -
Towards the evaluation of time series protection methods
Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2009-02-04)
Article
Accés restringit per política de l'editorialThe goal of statistical disclosure control (SDC) is to modify statistical data so that it can be published without releasing confidential information that may be linked to specific respondents. The challenge for SDC is to ... -
Towards the use of OWA operators for record linkage
Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2005)
Text en actes de congrés
Accés obertRecord linkage is used to establish links between those records that while belonging to two different files correspond to the same individual. Classical approaches assume that the two files contain some common variables, ...