Please use this identifier to cite or link to this item: https://doi.org/10.21256/zhaw-26691
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTempl, Matthias-
dc.contributor.authorSariyar, Murat-
dc.date.accessioned2023-01-23T10:07:10Z-
dc.date.available2023-01-23T10:07:10Z-
dc.date.issued2022-
dc.identifier.issn1615-5262de_CH
dc.identifier.issn1615-5270de_CH
dc.identifier.urihttps://digitalcollection.zhaw.ch/handle/11475/26691-
dc.descriptionErworben im Rahmen der Schweizer Nationallizenzen (http://www.nationallizenzen.ch)de_CH
dc.description.abstractIn view of the various methodological developments regarding the protection of sensitive data, especially with respect to privacy-preserving computation and federated learning, a conceptual categorization and comparison between various methods stemming from different fields is often desired. More concretely, it is important to provide guidance for the practice, which lacks an overview over suitable approaches for certain scenarios, whether it is differential privacy for interactive queries, k-anonymity methods and synthetic data generation for data publishing, or secure federated analysis for multiparty computation without sharing the data itself. Here, we provide an overview based on central criteria describing a context for privacy-preserving data handling, which allows informed decisions in view of the many alternatives. Besides guiding the practice, this categorization of concepts and methods is destined as a step towards a comprehensive ontology for anonymization. We emphasize throughout the paper that there is no panacea and that context matters.de_CH
dc.language.isoende_CH
dc.publisherSpringerde_CH
dc.relation.ispartofInternational Journal of Information Securityde_CH
dc.rightshttp://creativecommons.org/licenses/by/4.0/de_CH
dc.subjectAnonymizationde_CH
dc.subjectPrivacy-preserving computationde_CH
dc.subjectFederated learningde_CH
dc.subjectSynthetic datade_CH
dc.subject.ddc005: Computerprogrammierung, Programme und Datende_CH
dc.titleA systematic overview on methods to protect sensitive data provided for various analysesde_CH
dc.typeBeitrag in wissenschaftlicher Zeitschriftde_CH
dcterms.typeTextde_CH
zhaw.departementSchool of Engineeringde_CH
zhaw.organisationalunitInstitut für Datenanalyse und Prozessdesign (IDP)de_CH
dc.identifier.doi10.1007/s10207-022-00607-5de_CH
dc.identifier.doi10.21256/zhaw-26691-
zhaw.funding.euNode_CH
zhaw.issue6de_CH
zhaw.originated.zhawYesde_CH
zhaw.pages.end1246de_CH
zhaw.pages.start1233de_CH
zhaw.publication.statuspublishedVersionde_CH
zhaw.volume21de_CH
zhaw.publication.reviewPeer review (Publikation)de_CH
zhaw.author.additionalNode_CH
zhaw.display.portraitYesde_CH
Appears in collections:Publikationen School of Engineering

Show simple item record
Templ, M., & Sariyar, M. (2022). A systematic overview on methods to protect sensitive data provided for various analyses. International Journal of Information Security, 21(6), 1233–1246. https://doi.org/10.1007/s10207-022-00607-5
Templ, M. and Sariyar, M. (2022) ‘A systematic overview on methods to protect sensitive data provided for various analyses’, International Journal of Information Security, 21(6), pp. 1233–1246. Available at: https://doi.org/10.1007/s10207-022-00607-5.
M. Templ and M. Sariyar, “A systematic overview on methods to protect sensitive data provided for various analyses,” International Journal of Information Security, vol. 21, no. 6, pp. 1233–1246, 2022, doi: 10.1007/s10207-022-00607-5.
TEMPL, Matthias und Murat SARIYAR, 2022. A systematic overview on methods to protect sensitive data provided for various analyses. International Journal of Information Security. 2022. Bd. 21, Nr. 6, S. 1233–1246. DOI 10.1007/s10207-022-00607-5
Templ, Matthias, and Murat Sariyar. 2022. “A Systematic Overview on Methods to Protect Sensitive Data Provided for Various Analyses.” International Journal of Information Security 21 (6): 1233–46. https://doi.org/10.1007/s10207-022-00607-5.
Templ, Matthias, and Murat Sariyar. “A Systematic Overview on Methods to Protect Sensitive Data Provided for Various Analyses.” International Journal of Information Security, vol. 21, no. 6, 2022, pp. 1233–46, https://doi.org/10.1007/s10207-022-00607-5.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.