Home     Publications     Links     Conferences     History            20 20 20

Data Privacy

http://www.ppdm.cat


Content:
This web page includes slides and other material related to data privacy. It includes slides from different talks as well as slides and material from the book:
  • V. Torra (2017) Data privacy: Foundations, new developments and the big data challenge, Springer. Link Springer


Book slides:
Slides corresponding to the content of the book used in PhD and master courses. Slides used in the PhD course Introduction to Data Privacy (U. of Linköping, 2013)

Talk @ NAV (Oslo):
Talk at NAV in Oslo on January 15th, 2018. Introduction to data privacy. The talk included examples of data protection in R. Protection of microdata (masking methods) and of tabular data. We used sdcMicro and sdcTable. Slides, code and example file used.
Talk @ DPM2017:
Keynote talk in DPM 2017: Privacy models and disclosure risk: integral privacy.
Talk @ HiS2017:
Data privacy: an introduction. Talk given in the U. of Skovde on February 2017.
Invited talk @ IFIP2016:
This talk was about how to deal with data privacy in big data, from the point of view of data anonymization (data masking). The talk presents a few directions for future research. The talk was given in the IFIP Summer School 2016 (program here). A full paper corresponding to this talk is being published by Springer.
  • V. Torra, G. Navarro-Arribas (2016) Big Data Privacy and Anonymization, in A: Lehmann et al., Privacy and Identity Management 2016, IFIP AICT 498. Read it here (open access).

Talk @ Uppsala 2016:
Short summary: How to use machine learning to evaluate the worst-case disclosure risk scenario, and what is the role of transparency in disclosure risk assessment.
Talk @ Chalmers 2015:
Short summary: How to use machine learning to evaluate the worst-case disclosure risk scenario, and what is the role of transparency in disclosure risk assessment.
Invited Talk @ PAIS 2015:
Discussion on how transparency affects disclosure risk. When any release applies the transparency principle, we inform users on how the data has been processed (protected), and they can use this information to attack data more effectively. Information on the transparency principle can be found here.

The course:
The following links describe the content of the course, the assignments, and the exam.
  • Course plan: planning.pdf
  • Assignment: assignment.pdf
  • Files: census.csv
  • Exam: exam.pdf (v. 02)
    The figure can be downloaded here (file xjRUmaps.pdf)
  • Articles, and Links to articles:
    • Warren, S. D., Brandeis, L. (1890) The Right to Privacy, Harvard Law Review IV:5 (15 December 1890) html@MIT
    • Edman, M., Yener, B. (2009) On anonymity in an electronic society: a survey of anonymous communication systems, ACM Computing Surveys 42. paper@ACM DL, pdf@ucf


 



Vicenç Torra, Last modified: 09 : 46 February 02 2018. Last modified: 09 : 46; February 02, 2018.