Search dblp for Publications

export results for "toc:db/journals/jpc/jpc13.bht:"

 download as .bib file

@article{DBLP:journals/jpc/BenedettoT23,
  author       = {Gary Benedetto and
                  Evan Totty},
  title        = {Synthesizing Familial Linkages for Privacy in Microdata},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.767},
  doi          = {10.29012/JPC.767},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/BenedettoT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/CummingsKR23,
  author       = {Rachel Cummings and
                  Gabriel Kaptchuk and
                  Elissa M. Redmiles},
  title        = {"I need a better description": An Investigation Into User Expectations
                  For Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.813},
  doi          = {10.29012/JPC.813},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/CummingsKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/EtzKP23,
  author       = {Kathy Etz and
                  Heather Kimmel and
                  Amy Pienta},
  title        = {National Addiction and {HIV} Data Archive Program: Developing an Approach
                  for Reuse of Sensitive and Confidential Data},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.853},
  doi          = {10.29012/JPC.853},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/EtzKP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/GreenR23,
  author       = {Elizabeth Green and
                  Felix Ritchie},
  title        = {The present and future of the Five Safes framework},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.831},
  doi          = {10.29012/JPC.831},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/GreenR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/GreenR23a,
  author       = {Elizabeth Green and
                  Felix Ritchie},
  title        = {Using pedagogical and psychological insights to train analysts using
                  confidential data},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.842},
  doi          = {10.29012/JPC.842},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/GreenR23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/JahanaraACRS23,
  author       = {MohammadMahdi Jahanara and
                  Vahid R. Asadi and
                  Marco Carmosino and
                  Akbar Rafiey and
                  Bahar Salamatian},
  title        = {Private Boosted Decision Trees via Smooth Re-Weighting},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.808},
  doi          = {10.29012/JPC.808},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/JahanaraACRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/JangPLS23,
  author       = {Joy Bohyun Jang and
                  Amy M. Pienta and
                  Margaret Levenstein and
                  Joe Saul},
  title        = {Restricted data management: the current practice and the future},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.844},
  doi          = {10.29012/JPC.844},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/JangPLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/KarcherSW23,
  author       = {Sebastian Karcher and
                  Sefa Secen and
                  Nicholas Weber},
  title        = {Protecting Sensitive Data Early in the Research Data Lifecycle},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.846},
  doi          = {10.29012/JPC.846},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/KarcherSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/MarcotteRO23,
  author       = {John E. Marcotte and
                  Sarah Rush and
                  Kelly Ogden{-}Schuette},
  title        = {Tiered Access to Research Data for Secondary Analysis},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.825},
  doi          = {10.29012/JPC.825},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/MarcotteRO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/McKennaMHM23,
  author       = {Ryan McKenna and
                  Gerome Miklau and
                  Michael Hay and
                  Ashwin Machanavajjhala},
  title        = {Optimizing Error of High-Dimensional Statistical Queries Under Differential
                  Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.791},
  doi          = {10.29012/JPC.791},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/McKennaMHM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/PientaJL23,
  author       = {Amy M. Pienta and
                  Joy Jang and
                  Margaret Levenstein},
  title        = {Beyond Legal Frameworks and Security Controls For Accessing Confidential
                  Survey Data: Engaging Data Users in Data Protection},
  journal      = {J. Priv. Confidentiality},
  volume       = {13},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.29012/jpc.845},
  doi          = {10.29012/JPC.845},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/PientaJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics