default search action
Journal of Privacy and Confidentiality, Volume 2
Volume 2, Number 1, 2010
Editorial
- Stephen E. Fienberg:
Editorial: In This Issue.
Articles
- Bruce Schneier:
Schneier on Security: Privacy and Control. - James Waldo, Herbert S. Lin, Lynette I. Millett:
Engaging Privacy and Information Technology in a Digital Age: Executive Summary. - James Waldo, Herbert S. Lin, Lawrence H. Cox:
Thinking About Privacy: Chapter 1 of "Engaging Privacy and Information Technology in a Digital Age". - William J. Perry, Charles M. Vest:
Protecting Individual Privacy in the Struggle Against Terrorists—A Framework for Program Assessment: Executive Summary. - William J. Perry, Charles M. Vest:
The Science and Technology of Privacy Protection: Appendix L of "Protecting Individual Privacy in the Struggle Against Terrorists". - Natalie Shlomo:
Releasing Microdata: Disclosure Risk Estimation, Data Masking and Assessing Utility. - Cynthia Dwork, Moni Naor:
On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy. - Shubha U. Nabar, Nina Mishra:
Releasing Private Contingency Tables.
Volume 2, Number 2, 2011
Editorial
- Stephen E. Fienberg:
In This Issue.
Articles
- Satkartar K. Kinney, Jerome P. Reiter, James O. Berger:
Model Selection when multiple imputation is used to protect confidentiality in public use data. - Anne-Sophie Charest:
How Can We Analyze Differentially-Private Synthetic Datasets? - Yehuda Lindell:
Anonymous Authentication. - Martin M. Merener:
Polynomial-time Attack on Output Perturbation Sanitizers for Real-valued Databases.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.