Perturbation Methods for Protecting Numerical Data: Evolution and Evaluation

نویسندگان

  • Krish Muralidhar
  • Rathindra Sarathy
چکیده

There is a significant need among government agencies and other organizations for tools and techniques that facilitate analysis, dissemination, and sharing of data without compromising privacy and/or confidentiality. Data perturbation techniques are a set of statistical disclosure limitation techniques that try to preserve confidentiality of sensitive numeric data, while retaining the validity of the protected data for analysis. This paper details the evolution of data perturbation techniques, discusses the statistical basis for each technique and compares their effectiveness in terms or protecting the data from statistical disclosure (data security) while retaining analytical validity (data utility).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi soliton solutions, bilinear Backlund transformation and Lax pair of nonlinear evolution equation in (2+1)-dimension

As an application of Hirota bilinear method, perturbation expansion truncated at different levels is used to obtain exact soliton solutions to (2+1)-dimensional nonlinear evolution equation in much simpler way in comparison to other existing methods. We have derived bilinear form of nonlinear evolution equation and using this bilinear form, bilinear Backlund transformations and construction of ...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

Nonresonant Excitation of the Forced Duffing Equation

We investigate the hard nonresonant excitation of the forced Duffing equation with a positive damping parameter E. Using the symbolic manipulation system MACSYMA, a computer algebra system. we derive the two term perturbation expansion by the method of multiple time scales. The resulting approximate solution is valid for small values of the coefficient e As the damping parameter e increases, th...

متن کامل

Unconditionally Stable Difference Scheme for the Numerical Solution of Nonlinear Rosenau-KdV Equation

In this paper we investigate a nonlinear evolution model described by the Rosenau-KdV equation. We propose a three-level average implicit finite difference scheme for its numerical solutions and prove that this scheme is stable and convergent in the order of O(τ2 + h2). Furthermore we show the existence and uniqueness of numerical solutions. Comparing the numerical results with other methods in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006