A New Multiple-bootstrap-datasets Presentation Method for Confidentiality Protection

نویسندگان

  • Yan Li
  • Paul D. Williams
چکیده

Government agencies routinely release various public use microdata files (PUMF) at the respondent level such that outside researchers can perform various statistical analyses according to their own needs and verify results published by government agencies. There are mainly two equally critical but conflicting goals when releasing PUMF: maximizing the “openness” of its operation and preserving the confidentiality of the survey respondents. “Without adequate access to data, decision making is poorly based, and without adequate assurance of confidentiality, voluntary reporting is likely lessened.” (Duncan and Lambert, 1986)

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Univariate Microaggregation for Integer Values

Privacy issues during data publishing is an increasing concern of involved entities. The problem is addressed in the field of statistical disclosure control with the aim of producing protected datasets that are also useful for interested end users such as government agencies and research communities. The problem of producing useful protected datasets is addressed in multiple computational priva...

متن کامل

Fast and stable bootstrap methods for robust estimates

The standard error and sampling distribution of robust estimates can, in principle, be estimated using the bootstrap. However, two problems arise when we want to use bootstrap with robust estimates on moderately large data sets: the bootstrap estimates may be unrealiable because the proportion of outliers in many bootstrap samples could be higher than that in the original data set, and the high...

متن کامل

ارائه یک روش فازی-تکاملی برای تشخیص خطاهای نرم‌افزار

Software defects detection is one of the most important challenges of software development and it is the most prohibitive process in software development. The early detection of fault-prone modules helps software project managers to allocate the limited cost, time, and effort of developers for testing the defect-prone modules more intensively.  In this paper, according to the importance of soft...

متن کامل

A Method for Protecting Access Pattern in Outsourced Data

Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...

متن کامل

طراحی الگوی اصول محرمانگی اطلاعات پرونده سلامت الکترونیک برای ایران - 1386

Introduction: Today increasing growing of health information is results in applying of new technologies for suite manages and utilization of information technologies such as electronic health record. A growing capacity of information technologies in collection, storage and transmission of information has added a great deal of concerns since electronic records can be accessed by numerous consume...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005