Please use this identifier to cite or link to this item:
https://doi.org/10.21256/zhaw-26691
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Templ, Matthias | - |
dc.contributor.author | Sariyar, Murat | - |
dc.date.accessioned | 2023-01-23T10:07:10Z | - |
dc.date.available | 2023-01-23T10:07:10Z | - |
dc.date.issued | 2022 | - |
dc.identifier.issn | 1615-5262 | de_CH |
dc.identifier.issn | 1615-5270 | de_CH |
dc.identifier.uri | https://digitalcollection.zhaw.ch/handle/11475/26691 | - |
dc.description | Erworben im Rahmen der Schweizer Nationallizenzen (http://www.nationallizenzen.ch) | de_CH |
dc.description.abstract | In view of the various methodological developments regarding the protection of sensitive data, especially with respect to privacy-preserving computation and federated learning, a conceptual categorization and comparison between various methods stemming from different fields is often desired. More concretely, it is important to provide guidance for the practice, which lacks an overview over suitable approaches for certain scenarios, whether it is differential privacy for interactive queries, k-anonymity methods and synthetic data generation for data publishing, or secure federated analysis for multiparty computation without sharing the data itself. Here, we provide an overview based on central criteria describing a context for privacy-preserving data handling, which allows informed decisions in view of the many alternatives. Besides guiding the practice, this categorization of concepts and methods is destined as a step towards a comprehensive ontology for anonymization. We emphasize throughout the paper that there is no panacea and that context matters. | de_CH |
dc.language.iso | en | de_CH |
dc.publisher | Springer | de_CH |
dc.relation.ispartof | International Journal of Information Security | de_CH |
dc.rights | http://creativecommons.org/licenses/by/4.0/ | de_CH |
dc.subject | Anonymization | de_CH |
dc.subject | Privacy-preserving computation | de_CH |
dc.subject | Federated learning | de_CH |
dc.subject | Synthetic data | de_CH |
dc.subject.ddc | 005: Computerprogrammierung, Programme und Daten | de_CH |
dc.title | A systematic overview on methods to protect sensitive data provided for various analyses | de_CH |
dc.type | Beitrag in wissenschaftlicher Zeitschrift | de_CH |
dcterms.type | Text | de_CH |
zhaw.departement | School of Engineering | de_CH |
zhaw.organisationalunit | Institut für Datenanalyse und Prozessdesign (IDP) | de_CH |
dc.identifier.doi | 10.1007/s10207-022-00607-5 | de_CH |
dc.identifier.doi | 10.21256/zhaw-26691 | - |
zhaw.funding.eu | No | de_CH |
zhaw.issue | 6 | de_CH |
zhaw.originated.zhaw | Yes | de_CH |
zhaw.pages.end | 1246 | de_CH |
zhaw.pages.start | 1233 | de_CH |
zhaw.publication.status | publishedVersion | de_CH |
zhaw.volume | 21 | de_CH |
zhaw.publication.review | Peer review (Publikation) | de_CH |
zhaw.author.additional | No | de_CH |
zhaw.display.portrait | Yes | de_CH |
Appears in collections: | Publikationen School of Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2022_Templ-Sariyar_Methods-to-protect-sensitive-data-provided-for-various-analyses_IntJInfSecur.pdf | 268.79 kB | Adobe PDF | View/Open |
Show simple item record
Templ, M., & Sariyar, M. (2022). A systematic overview on methods to protect sensitive data provided for various analyses. International Journal of Information Security, 21(6), 1233–1246. https://doi.org/10.1007/s10207-022-00607-5
Templ, M. and Sariyar, M. (2022) ‘A systematic overview on methods to protect sensitive data provided for various analyses’, International Journal of Information Security, 21(6), pp. 1233–1246. Available at: https://doi.org/10.1007/s10207-022-00607-5.
M. Templ and M. Sariyar, “A systematic overview on methods to protect sensitive data provided for various analyses,” International Journal of Information Security, vol. 21, no. 6, pp. 1233–1246, 2022, doi: 10.1007/s10207-022-00607-5.
TEMPL, Matthias und Murat SARIYAR, 2022. A systematic overview on methods to protect sensitive data provided for various analyses. International Journal of Information Security. 2022. Bd. 21, Nr. 6, S. 1233–1246. DOI 10.1007/s10207-022-00607-5
Templ, Matthias, and Murat Sariyar. 2022. “A Systematic Overview on Methods to Protect Sensitive Data Provided for Various Analyses.” International Journal of Information Security 21 (6): 1233–46. https://doi.org/10.1007/s10207-022-00607-5.
Templ, Matthias, and Murat Sariyar. “A Systematic Overview on Methods to Protect Sensitive Data Provided for Various Analyses.” International Journal of Information Security, vol. 21, no. 6, 2022, pp. 1233–46, https://doi.org/10.1007/s10207-022-00607-5.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.