Slides from Privacy & Confidentiality Committee sponsored webinar presented on February 1, 2018. Link to recording Description: For statistical agencies, the Big Bang event in disclosure avoidance occurred in 2003 when Irit Dinur and Kobbi Nissim, two well-known cryptographers, turned their attention to properties of safe systems for data publication from confidential sources. And the paradigm-shifting message was a very strong result showing that most of the confidentiality protection systems used by statistical agencies around the world, collectively known as statistical disclosure limitation, were not designed to defend against a database reconstruction attack. Such an attack recreates increasingly accurate record-level images of the c...
Slides from Privacy & Confidentiality Committee sponsored webinar presented on December 17, 2014. D...
Public concern about personal privacy has recently focused on issues of Internet data security and p...
A complete archive of the data and programs used in this paper is available via http://doi.org/10.52...
The opinions expressed in this talk are the my own and not necessarily those of the U.S. Census Bure...
Presented at the Simons Institute Workshop "Data Privacy: From Foundations to Applications." Progra...
With the growing amount of data collected every day, data confidentiality is increasingly at risk. M...
Slides from Privacy & Confidentiality Committee sponsored webinar presented on February 10, 2017. L...
The federal statistical system is experiencing competing pressures for change. On the one hand, for ...
The purpose of this document is to provide scholars with a comprehensive list of readings relevant t...
The federal statistical system is experiencing competing pressures for change. On the one hand, for ...
The dual problems of respecting citizen privacy and protecting the confidentiality of their data hav...
Privacy in statistical databases is a discipline whose purpose is to provide solutions to the tensi...
133 pagesWith vast databases at their disposal, private tech companies can compete with public stati...
Slides from Privacy & Confidentiality Committee sponsored webinar presented on February 6, 2019. Li...
Protection of privacy in databases has become of increasing importance. While a number of techniques...
Slides from Privacy & Confidentiality Committee sponsored webinar presented on December 17, 2014. D...
Public concern about personal privacy has recently focused on issues of Internet data security and p...
A complete archive of the data and programs used in this paper is available via http://doi.org/10.52...
The opinions expressed in this talk are the my own and not necessarily those of the U.S. Census Bure...
Presented at the Simons Institute Workshop "Data Privacy: From Foundations to Applications." Progra...
With the growing amount of data collected every day, data confidentiality is increasingly at risk. M...
Slides from Privacy & Confidentiality Committee sponsored webinar presented on February 10, 2017. L...
The federal statistical system is experiencing competing pressures for change. On the one hand, for ...
The purpose of this document is to provide scholars with a comprehensive list of readings relevant t...
The federal statistical system is experiencing competing pressures for change. On the one hand, for ...
The dual problems of respecting citizen privacy and protecting the confidentiality of their data hav...
Privacy in statistical databases is a discipline whose purpose is to provide solutions to the tensi...
133 pagesWith vast databases at their disposal, private tech companies can compete with public stati...
Slides from Privacy & Confidentiality Committee sponsored webinar presented on February 6, 2019. Li...
Protection of privacy in databases has become of increasing importance. While a number of techniques...
Slides from Privacy & Confidentiality Committee sponsored webinar presented on December 17, 2014. D...
Public concern about personal privacy has recently focused on issues of Internet data security and p...
A complete archive of the data and programs used in this paper is available via http://doi.org/10.52...