Journal: J. Priv. Confidentiality

Volume 2, Issue 2

0 -- 0Stephen E. Fienberg. In This Issue
0 -- 0Martin M. Merener. Polynomial-time Attack on Output Perturbation Sanitizers for Real-valued Databases
0 -- 0Satkartar K. Kinney, Jerome P. Reiter, James O. Berger. Model Selection when multiple imputation is used to protect confidentiality in public use data
0 -- 0Anne-Sophie Charest. How Can We Analyze Differentially-Private Synthetic Datasets?
0 -- 0Yehuda Lindell. Anonymous Authentication

Volume 2, Issue 1

0 -- 0James Waldo, Herbert S. Lin, Lawrence H. Cox. Thinking About Privacy: Chapter 1 of "Engaging Privacy and Information Technology in a Digital Age"
0 -- 0Stephen E. Fienberg. Editorial: In This Issue
0 -- 0Natalie Shlomo. Releasing Microdata: Disclosure Risk Estimation, Data Masking and Assessing Utility
0 -- 0William J. Perry, Charles M. Vest. Protecting Individual Privacy in the Struggle Against Terrorists—A Framework for Program Assessment: Executive Summary
0 -- 0James Waldo, Herbert S. Lin, Lynette I. Millett. Engaging Privacy and Information Technology in a Digital Age: Executive Summary
0 -- 0Shubha U. Nabar, Nina Mishra. Releasing Private Contingency Tables
0 -- 0Cynthia Dwork, Moni Naor. On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy
0 -- 0Bruce Schneier. Schneier on Security: Privacy and Control
0 -- 0William J. Perry, Charles M. Vest. The Science and Technology of Privacy Protection: Appendix L of "Protecting Individual Privacy in the Struggle Against Terrorists"