Browsing by Author "Nin Guerrero, Jordi"
Now showing items 1-20 of 41
-
A cryptographic solution for private distributed simple meeting scheduling
Herranz Sotoca, Javier; Matwin, Stan; Meseguer González, Pedro; Nin Guerrero, Jordi (IOS Press, 2009)
Conference report
Open AccessMeeting scheduling is a suitable application for distributed computation motivated by its privacy requirements. Previous work on this problem have considered some cryptographic and conceptually clear approach to solve a ... -
Analysis of the univariate microaggregation disclosure risk
Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2009-08-07)
Article
Restricted access - publisher's policyMicroaggregation is a protection method used by statistical agencies to limit the disclosure risk of confidential information. Formally, microaggregation assigns each original datum to a small cluster and then replaces ... -
Anonymizing data via polynomial regression
Nin Guerrero, Jordi; Pont Tuset, Jordi; Medrano Gracia, Pau; Larriba Pey, Josep; Muntés Mulero, Víctor (2007)
Conference report
Open AccessThe amount of confidential information accessible through the Internet is growing continuously. In this scenario, the improvement of anonymizing methods becomes crucial to avoid revealing sensible information of individuals. ... -
Attribute selection in multivariate microaggregation
Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008)
Conference report
Restricted access - publisher's policyMicroaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of the cluster. When the number of attributes ... -
Beyond multivariate microaggregation for large record anonymization
Nin Guerrero, Jordi (2014)
Article
Open AccessMicroaggregation is one of the most commonly employed microdata protection methods. The basic idea of microaggregation is to anonymize data by aggregating original records into small groups of at least k elements and, ... -
Blocking anonymized data
Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2007)
Conference report
Open AccessNowadays, privacy is an important issue, for this reason many researchers are working in the development of new data protection methods. The aim of these methods is to minimize the disclosure risk (DR) preserving the data ... -
Classifying data from protected statistical datasets
Herranz Sotoca, Javier; Matwin, Stan; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2010-06-09)
Article
Open AccessStatistical Disclosure Control (SDC) is an active research area in the recent years. The goal is to transform an original dataset X into a protected one X0, such that X0 does not reveal any relation between confidential ... -
Computing reputation for collaborative private networks
Nin Guerrero, Jordi; Carminati, Barbara; Ferrari, Elena; Torra i Reventós, Vicenç (IEEE Computer Society Publications, 2009)
Conference report
Open AccessThe use of collaborative network services is increasing, therefore, the protection of the resources and relations shared by network participants is becoming crucial. One of the main issues in such networks is the evaluation ... -
Contributions to record linkage for disclosure risk assessment
Nin Guerrero, Jordi (Consejo Superior de Investigaciones Científicas (CSIC), 2009-10-15)
Book
Restricted access - publisher's policyThis book is about reidentification methods, and, more especifically, about record linkage. This study is motivated on the need to assess in an accurate way the risk of disclosure within the fields of privacy preserving ... -
DEX: High-performance exploration on large graphs for information retrieval
Martínez Bazán, Norbert; Muntés Mulero, Víctor; Gómez Villamor, Sergio; Nin Guerrero, Jordi; Sánchez Martínez, Mario; Larriba Pey, Josep (2007)
Conference report
Restricted access - publisher's policyLink and graph analysis tools are important devices to boost the richness of information retrieval systems. Internet and the existing social networking portals are just a couple of situations where the use of these tools ... -
Digital watermarking techniques and security issues in the information and communication society
Nin Guerrero, Jordi; Ricciardi, Sergio (CRC Press and IEEE Press, 2013)
Conference report
Open AccessDigital watermarking is the process of embedding information into a noise-tolerant digital signal such as image or audio data. Such information is embedded in a way difficult to be removed in order to easily identify ... -
Distributed privacy-preserving methods for statistical disclosure control
Herranz Sotoca, Javier; Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2010)
Article
Restricted access - publisher's policyStatistical disclosure control (SDC) methods aim to protect privacy of the confidential information included in some databases, for example by perturbing the non-confidential parts of the original databases. Such methods ... -
Dynamic reputation-based trust computation in private networks
Nin Guerrero, Jordi; Carminati, Barbara; Ferrari, Elena; Torra i Reventós, Vicenç (2009)
Research report
Open AccessThe use of collaborative networks services in general, and web based social networks (WBSN) services in particular, is today increasing and, therefore, the protection of the resources shared by network participants is ... -
Energy-efficiency and security issues in the Cisco Nexus virtual distributed switching
Peterson, Benjamin; Ricciardi, Sergio; Nin Guerrero, Jordi (Institute of Electrical and Electronics Engineers (IEEE), 2012)
Conference report
Restricted access - publisher's policyVirtualization technologies have brought with them the promise of increased security and energy saving. Such was the case with the Cisco Nexus virtual switching environment. However, possible security issues of this ... -
Fuzzy measures and integrals in re-identification problems
Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2006)
Conference report
Open AccessIn this paper we give an overview of our approach of using aggregation operators, and more specifically, fuzzy integrals for solving re-identification problems. We show that the use of Choquet integrals are suitable for ... -
How to group attributes in multivariate microaggregation
Nin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç (2008-04-01)
Article
Restricted access - publisher's policyMicroaggregation is one of the most employed microdata protection methods. It builds clusters of at least k original records, and then replaces these records with the centroid of the cluster. When the number of attributes ... -
Improving microaggregation for complex record anonymization
Pont Tuset, Jordi; Nin Guerrero, Jordi; Medrano Gracia, Pau; Larriba Pey, Josep; Muntés Mulero, Víctor (Springer Verlag, 2008)
Conference report
Restricted access - publisher's policyMicroaggregation is one of the most commonly employed microdata protection methods. This method builds clusters of at least k original records and replaces the records in each cluster with the centroid of the cluster. ... -
Increasing polynomial regression complexity for data anonymization
Nin Guerrero, Jordi; Pont Tuset, Jordi; Medrano Gracia, Pau; Larriba Pey, Josep; Muntés Mulero, Víctor (IEEE Computer Society, 2007)
Conference report
Open AccessPervasive computing and the increasing networking needs usually demand from publishing data without revealing sensible information. Among several data protection methods proposed in the literature, those based on linear ... -
Kd-trees and the real disclosure risks of large statistical databases
Herranz Sotoca, Javier; Nin Guerrero, Jordi; Solé Simó, Marc (Elsevier, 2011)
Article
Restricted access - publisher's policyIn data privacy, record linkage can be used as an estimator of the disclosure risk of protected data. To model the worst case scenario one normally attempts to link records from the original data to the protected data. ... -
Modeling projections in microaggregation
Nin Guerrero, Jordi; Torra i Reventós, Vicenç (2008)
Conference report
Open AccessMicroaggregation is a method used by statistical agencies to limit the disclosure of sensitive microdata. It has been proven that microaggregation is an NP-hard problem when more than one variable is microaggregated at the ...