Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/62025
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Giggins, Helen | en |
dc.contributor.author | Brankovic, Ljiljana | en |
dc.date.accessioned | 2024-08-08T02:47:46Z | - |
dc.date.available | 2024-08-08T02:47:46Z | - |
dc.date.issued | 2008 | - |
dc.identifier.citation | Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008, p. 108-113 | en |
dc.identifier.isbn | 978-076953428-2 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/62025 | - |
dc.description.abstract | <p>The statistical analysis of data stored in data warehouses is an important phase in the organisation's strategic planning process. For the maximum benefit to be gained from such data warehouses, a relationship of trust needs to exist between all parties involved. In this paper we investigate its importance with respect to the statistical security problem. Understanding trust relationships in this context is particularly crucial since an individual's privacy cannot be guaranteed using traditional security mechanisms.</p> | en |
dc.language | en | en |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en |
dc.relation.ispartof | Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008 | en |
dc.title | Statistical disclosure control: To trust or not to trust | en |
dc.type | Conference Publication | en |
dc.relation.conference | CSA 2008: International Symposium on Computer Science and its Applications (CSA) | en |
dc.identifier.doi | 10.1109/CSA.2008.7 | en |
local.contributor.firstname | Helen | en |
local.contributor.firstname | Ljiljana | en |
local.profile.school | School of Science and Technology | en |
local.profile.email | lbrankov@une.edu.au | en |
local.output.category | E1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.date.conference | 13th to 15th of October, 2008 | en |
local.conference.place | Australia | en |
local.publisher.place | United States of America | en |
local.format.startpage | 108 | en |
local.format.endpage | 113 | en |
local.peerreviewed | Yes | en |
local.title.subtitle | To trust or not to trust | en |
local.contributor.lastname | Giggins | en |
local.contributor.lastname | Brankovic | en |
dc.identifier.staff | une-id:lbrankov | en |
local.profile.orcid | 0000-0002-5056-4627 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/62025 | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | Statistical disclosure control | en |
local.output.categorydescription | E1 Refereed Scholarly Conference Publication | en |
local.conference.details | CSA 2008: International Symposium on Computer Science and its Applications (CSA), Australia, 13th to 15th of October, 2008 | en |
local.search.author | Giggins, Helen | en |
local.search.author | Brankovic, Ljiljana | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.sensitive.cultural | No | en |
local.year.published | 2008 | en |
local.subject.for2020 | 460402 Data and information privacy | en |
local.subject.seo2020 | 220499 Information systems, technologies and services not elsewhere classified | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
Appears in Collections: | Conference Publication School of Science and Technology |
Files in This Item:
File | Size | Format |
---|
Page view(s)
112
checked on Aug 11, 2024
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.