This web page includes slides and other material related to my book (and courses based on the content of the book):
- V. Torra (2017) Data privacy: Foundations, new developments and the big data challenge, Springer. Link Springer
Other slides related to courses and seminars related to data privacy (including code with examples) can be found here.
| Book slides:
Slides corresponding to the content of the book used in PhD and master courses. In brackets, chapters and sections in the book.
- Introduction to the course
- Motivation, difficulties of the field, and terminology (Chapter 1). Definitions of anonymity set, disclosure (identity and attribute disclosure). Definition of the transparency principle. Privacy by design.
- Short summary of privacy models. Among other privacy models, we mention the following ones: k-anonymity, reidentification, secure multiparty computation, differential privacy, integral privacy, homomorphic encryption.
- Classification of data protection procedures (Sec. 3.1-3.3). Data protection procedures are classified according to (i) on whose privacy is being sought (i.e., respondent/data subject, holder/data controller, and user), (ii) our knowledge on the computations to be done (i.e., known/unknown), and (iii) the number of data sources (single, multiple).
- Some data protection procedures (Sec. 3.4-3.6) Differential privacy. Trusted third party. Secure multiparty computation. Result privacy. Data protection mechanisms for tabular data.
- User privacy, some methods (Sec. 4.1-)
- Privacy models and disclosure risk measures (Sec. 5.-)
| PhD course:
Slides used in the PhD course Introduction to Data Privacy (U. of Linköping, 2013)
| The course:
The following links describe the content of the course, the assignments, and the exam.
- Course plan: planning.pdf
- Assignment: assignment.pdf
- Files: census.csv
- Exam: exam.pdf (v. 02)
The figure can be downloaded here
- Articles, and Links to articles:
- Warren, S. D., Brandeis, L. (1890) The Right to Privacy, Harvard Law Review IV:5 (15 December 1890) html@MIT
- Edman, M., Yener, B. (2009) On anonymity in an electronic society: a survey of anonymous communication systems, ACM Computing Surveys 42. paper@ACM DL, pdf@ucf