Page 476 - Invited Paper Session (IPS) - Volume 1
P. 476

IPS177 F. Ricciato et al.
                      www.unece.org/fileadmin/DAM/stats/documents/ece/ces/ge.46/2017
                      /6_secret_sharing.pdf.
                 10.  UN Handbook on Privacy-Preserving Computation Techniques, April
                      2019. Available online at http://tinyurl.com/y4do5he4.
                 11.  L Leaver, Victoria and Marley, Jennifer K. (2011) A Method for
                      Confidentialising User-Defined Tables: Statistical Properties and a Risk-
                      Utility Analysis; ISI conference, Dublin 2011.
                 12.  G. Thompson et al (2013) Methodology for the Automatic
                      Confidentialisation of Statistical Outputs from Remote Servers at the
                      Australian Bureau of Statistics, UNECE Works Session on Statistical
                      Confidentiality, Ottawa, Canada, 20-23 October 2013.
                 13.  P.P. de Wolf, Perturbative methods for ESS census tables, conference
                      on New Techniques and Technologies for Statistics, Brussels, March
                      2019.
                 14.  M. Sabt, M. Achemlal, A. Bouabdallah, Trusted Execution Environment:
                      What It is, and What It is Not. 2015 IEEE Trustcom/BigDataSE/ISPA. DOI
                      10.1109/Trustcom.2015.357.
                 15.  G. Spindler and P. Schmechel, Personal Data and Encryption in the
                      European General Data Protection Regulation, (2016) JIPITEC 163 para
                      1. Online: https://www.jipitec.eu/issues/jipitec-7-2-
                      2016/4440/spindler_schmechel_gdpr_encryption_jipitec_7_2_2016_163.
                      pdf





































                                                                     465 | I S I   W S C   2 0 1 9
   471   472   473   474   475   476   477   478   479   480   481