Abstract is missing.
- p% Should DominatePeter-Paul de Wolf, Anco Hundepool. 1-10 [doi]
- A Computational Evaluation of Optimization Solvers for CTAJordi Castro. 11-21 [doi]
- Flexible Rounding Based on Consistent Post-tabular Stochastic NoiseSarah Giessing. 22-34 [doi]
- Comparing L 1 and L 2 Distances for CTAJordi Castro. 35-46 [doi]
- An Investigation of Model-Based Microdata Masking for Magnitude Tabular Data ReleaseMario Trottini, Krishnamurty Muralidhar, Rathindra Sarathy. 47-62 [doi]
- Testing of IHSN C++ Code and Inclusion of New Methods into sdcMicroAlexander Kowarik, Matthias Templ, Bernhard Meindl, Francois Fonteneau, Bernd Prantner. 63-77 [doi]
- Clustering-Based Categorical Data ProtectionJordi Marés, Vicenç Torra. 78-89 [doi]
- Anonymization Methods for Taxonomic MicrodataJosep Domingo-Ferrer, Krish Muralidhar, Guillem Rufian-Torrell. 90-102 [doi]
- Hybrid Microdata via Model-Based ClusteringAnna Oganian, Josep Domingo-Ferrer. 103-115 [doi]
- Logistic Regression with Variables Subject to Post Randomization MethodYong Ming Jeffrey Woo, Aleksandra B. Slavkovic. 116-130 [doi]
- Valid Statistical Inference on Automatically Matched FilesRob Hall, Stephen E. Fienberg. 131-142 [doi]
- n-Cycle Swapping for the American Community SurveyMichael DePersio, Marlow Lemons, Kaleli A. Ramanayake, Julie Tsay, Laura Zayatz. 143-164 [doi]
- Generating Useful Test Data for Complex Linked Employer-Employee DatasetsMatthias Dorner, Jörg Drechsler, Peter Jacobebbinghaus. 165-178 [doi]
- When Excessive Perturbation Goes Wrong and Why IPUMS-International Relies Instead on Sampling, Suppression, Swapping, and Other Minimally Harmful Methods to Protect Privacy of Census MicrodataLara Cleveland, Robert McCaa, Steven Ruggles, Matthew Sobek. 179-187 [doi]
- Achieving Comparability of EarningsLuisa Franconi, Daniela Ichim. 188-199 [doi]
- Designing Multiple Releases from the Small and Medium Enterprises SurveyFlavio Foschi, Maria Cristina Casciano, Luisa Franconi, Daniela Ichim. 200-215 [doi]
- A Proposed Solution to the Archiving and Curation of Confidential Scientific InputsJohn M. Abowd, Lars Vilhuber, William C. Block. 216-225 [doi]
- Confidentialising Maps of Mixed Point and Diffuse Spatial DataChristine M. O'Keefe. 226-240 [doi]
- Security of Random Output Perturbation for Statistical DatabasesDaniel Z. Zanger. 241-256 [doi]
- Empirical Evaluation of Statistical Inference from Differentially-Private Contingency TablesAnne-Sophie Charest. 257-272 [doi]
- Differentially Private Graphical Degree Sequences and Synthetic GraphsVishesh Karwa, Aleksandra B. Slavkovic. 273-285 [doi]
- European Data Access Comes True - Decentralised and Remote Access to Confidential Data in the ESS (ESSnet DARA)Maurice Brandt. 286-294 [doi]
- A Bayesian Approach for On-Line Sum/Count/Max/Min Auditing on Boolean DataBice Cavallo, Gerardo Canfora. 295-307 [doi]
- Document Sanitization: Measuring Search Engine Information Loss and Risk of Disclosure for the Wikileaks cablesDavid F. Nettleton, Daniel Abril. 308-321 [doi]
- Enhancing the Efficiency in Privacy Preserving Learning of Decision Trees in Partitioned DatabasesPeter Lory. 322-335 [doi]
- On Computational AnonymityKlara Stokes. 336-347 [doi]
- "Better Than Nothing" Privacy with Bloom Filters: To What Extent?Giuseppe Bianchi, Lorenzo Bracciale, Pierpaolo Loreti. 348-363 [doi]