dc.contributor |
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors |
dc.contributor.author |
Nin Guerrero, Jordi |
dc.date |
2009-10-15 |
dc.identifier.citation |
Nin, J. "Contributions to record linkage for disclosure risk assessment". Consejo Superior de Investigaciones Científicas (CSIC), 2009. ISBN 978-84-00-08848-4. |
dc.identifier.citation |
978-84-00-08848-4 |
dc.identifier.citation |
B.33299-2009 |
dc.identifier.uri |
http://hdl.handle.net/2117/12861 |
dc.language.iso |
eng |
dc.publisher |
Consejo Superior de Investigaciones Científicas (CSIC) |
dc.relation |
http://cataleg.upc.edu/record=b1365830~S1*cat |
dc.rights |
info:eu-repo/semantics/openAccess |
dc.subject |
Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica |
dc.subject |
Data protection |
dc.subject |
Data minig |
dc.subject |
Statistical disclosure control |
dc.subject |
Privacy preserving data mining |
dc.subject |
Protecció de dades |
dc.subject |
Mineria de dades |
dc.title |
Contributions to record linkage for disclosure risk assessment |
dc.type |
info:eu-repo/semantics/publishedVersion |
dc.type |
info:eu-repo/semantics/book |
dc.description.abstract |
This book is about reidentification methods, and, more especifically, about record linkage. This study is motivated on the need to assess in an accurate way the risk of disclosure within the fields of privacy preserving data mining (PPDM) and statistical disclosure control (SDC).
Data protection methods are constructed so that disclosure is avoided when data is published. Nevertheless, before data publication, risk should be assessed as accurately as possible. Record linkage is one of the approaches to compute this risk. It is, in fact, a computational approach for risk assessment based on some assumptions about the information an intruder has.
An important characteristic of record linkage methods is that they are flexible
enough to be used in a large number of different scenarios. For example, they can be either used for assessing risk of data protected adding some noise, or used for assessing risk when data has been generated synthetically. In this book, record linkage methods are discussed, and new approaches
are described. Specific methods are proposed. They are methods that take
advantage of the available information on the protection methods. The author later shows their effectiveness in comparison to standard ones. The book also shows how the analysis of the results of risk assessment via record linkage can be used to develop new methods for data protection. In short, new data protection methods are resiliant to some of the attacks of record linkage. |