Session 12: Confidentiality Protection
- Assigned Readings and Materials
- RDC Researcher's Handbook (2010 Edition), especially Chapter 3
- LEHD Disclosure Avoidance Guidelines (2009 version) (Table)
- Census 2000 Special Tabulation Rules
- American Community Survey Special Tabulation Rules (2004)
- Machanavajjhala, A., D. Kifer, J. Abowd, J. Gehrke, and L. Vilhuber "Privacy: From Theory to Practice on the Map" (ICDE 2008)
- Confidentiality Protection in the Census Bureau's Quarterly Workforce Indicators (2005)
- Evans, T., Zayatz, L., and Slanta, J. (1998). “Using Noise for Disclosure Limitation of Establishment Tabular Data,” Journal of Official Statistics, Vol. 14, (December): 537-51.
- Evfimievski, A., J. Gehrke, and R. Srikant. “Limiting privacy breaches in privacy-preserving data mining,” PODS 2003.
- Dalenius, T. “Towards a methodology for statistical disclosure control,” Statistik Tidskrift (Statistical Review) (1977): 429-44.
- Chawla, S., C. Dwork F. McSherry, A. Smith, and H. Wee, “Towards privacy in public databases,” in Proceedings of the 2nd Theory of Cryptography Conference (2005).
- Abowd, J. and L. Vilhuber, “How Protective are Synthetic Data,” in J. Domingo-Ferrer and Y. Saygun, eds., Privacy in Statistical Databases, 2008” (Berlin: Springer-Verlag, 2008), pp. 239-246.
- Dwork, C “Differential Privacy,” 33rd International Colloquium on Automata, Languages, and Programming—ICALP (2006): Part II, 1-12.
- Assigned Tasks
- Background Materials