失眠症 发表于 2025-3-25 03:32:04

Assessing Privacy and Risksrovide, as well as the risks of a potential successful reidentification of sensitive information in any encoded or encrypted database used by such an application. In this chapter we discuss how to measure privacy and risks in the context of conducting privacy-preserving linking of sensitive database

刚开始 发表于 2025-3-25 10:20:59

http://reply.papertrans.cn/59/5868/586782/586782_22.png

infringe 发表于 2025-3-25 15:41:36

Encoding and Comparing Sensitive Valuesdeveloped a variety of techniques to link sensitive databases in a privacy-preserving way. Many of these techniques have so far not been used in practical applications for a variety of reasons that range from security weaknesses or limitations in linkage capabilities to prohibitive computational req

EVEN 发表于 2025-3-25 18:55:08

http://reply.papertrans.cn/59/5868/586782/586782_24.png

opalescence 发表于 2025-3-25 23:55:37

http://reply.papertrans.cn/59/5868/586782/586782_25.png

主讲人 发表于 2025-3-26 04:02:00

Computational Efficiencys blocking, indexing, and filtering have been developed and are being used to make linkage techniques more scalable. In this chapter we describe a variety of such techniques, as well as methods for linking large sensitive databases on modern parallel computing platforms and distributed environments.

商谈 发表于 2025-3-26 04:52:56

http://reply.papertrans.cn/59/5868/586782/586782_27.png

Brain-Imaging 发表于 2025-3-26 09:57:36

http://reply.papertrans.cn/59/5868/586782/586782_28.png

音乐戏剧 发表于 2025-3-26 14:04:06

Real-world Applicationsreserving techniques. These examples come from different countries, where different privacy frameworks and legislation exist that either make the use of such approaches necessary, or where organisations are using privacypreserving linkage approaches to make their linkages more secure.

Allergic 发表于 2025-3-26 17:04:47

Future Research Challenges and Directions open research questions that require further investigations. These include the development of frameworks that allow comparative empirical evaluations, the preparation of benchmark data collections, how to link sensitive databases in a cloud data service, how to properly assess the quality and compl
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Linking Sensitive Data; Methods and Techniqu Peter Christen,Thilina Ranbaduge,Rainer Schnell Book 2020 Springer Nature Switzerland AG 2020