Skip to main content

How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentiality

  • Chapter
Computational Intelligence in Information Assurance and Security

Part of the book series: Studies in Computational Intelligence ((SCI,volume 57))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aguiar MS, Dimuro GP, Costa ACR, Silva RKS, Costa FA, Kreinovich V (2004) The multilayered interval categorizer tesselation-based model, In: Iochpe C, Câmara G (eds), IFIP WG2.6 Proceedings of the 6th Brazilian Symposium on Geoinformatics Geoinfo’2004, Campos do Jordão, Brazil, November 22-24, 2004, pp. 437-454. ISBN 3901882200.

    Google Scholar 

  2. Aldouri R, Keller GR, Gates A, Rasillo J, Salayandia L, Kreinovich V, Seeley J, Taylor P, Holloway S (2004) GEON: Geophysical data add the 3rd dimension in geospatial studies. In: Proceedings of the ESRI International User Conference 2004, San Diego, California, August 9-13, 2004, Paper 1898.

    Google Scholar 

  3. Averill MG, Miller KC, Keller GR, Kreinovich V, Araiza R, Starks SA (2005) Using expert knowledge in solving the seismic inverse problem, In: Proceedings of the 24nd International Conference of the North American Fuzzy Information Processing Society NAFIPS’2005, Ann Arbor, Michigan, June 22-25, 2005, pp. 310-314.

    Google Scholar 

  4. Averill MG, Miller KC, Keller GR, Kreinovich V, Araiza R, Starks SA (2007) Using Expert Knowledge in Solving the Seismic Inverse Problem. International Journal of Approximate Reasoning, to appear.

    Google Scholar 

  5. Bardossy G, Fodor J (2004) Evaluation of uncertainties and risks in geology. Springer Verlag, Berlin.

    MATH  Google Scholar 

  6. Berz M, Bischof C, Corliss G, Griewank A (1996), Computational differentiation: techniques, applications, and tools. SIAM, Philadelphia.

    MATH  Google Scholar 

  7. Bojadziev G, Bojadziev M (1995) Fuzzy sets, fuzzy logic, applications. World Scientific, Singapore.

    MATH  Google Scholar 

  8. Ceberio M, Ferson S, Kreinovich V, Chopra S, Xiang G, Murguia A, Santillan J (2006) How to take into account dependence between the inputs: from interval computations to constraint-related set computations, with potential applications to nuclear safety, bio- and geosciences. In: Proceedings of the Second International Workshop on Reliable Engineering Computing, Savannah, Georgia, February 22-24, 2006, pp. 127-154.

    Google Scholar 

  9. Ceberio M, Kreinovich V, Chopra S, Ludäscher B (2005) Taylor model-type techniques for handling uncertainty in expert systems, with potential applications to geoinformatics. In: Proceedings of the 17th World Congress of the International Association for Mathematics and Computers in Simulation IMACS’2005, Paris, France, July 11-15, 2005.

    Google Scholar 

  10. Dalenius T (1986) Finding a needle in a haystack - or identifying anonymous census record. Journal of Official Statistics 2(3):329-336.

    Google Scholar 

  11. Demicco R, Klir G, eds (2003) Fuzzy logic in geology. Academic Press.

    Google Scholar 

  12. Denning DERD (1982) Cryptography and data security. Addison-Wesley, Reading, Massachusetts.

    MATH  Google Scholar 

  13. Doser DI, Crain KD, Baker MR, Kreinovich V, Gerstenberger MC (1998) Estimating uncertainties for geophysical tomography. Reliable Computing 4(3):241-268.

    Article  Google Scholar 

  14. Dubois D, Prade H (1978) Operations on fuzzy numbers. International Journal of Systems Science 9:613-626.

    Article  MATH  MathSciNet  Google Scholar 

  15. Dubois D, Prade H (1979) Fuzzy real algebra: some results. Fuzzy Sets and Systems 2:327-348.

    Article  MATH  MathSciNet  Google Scholar 

  16. Dubois D, Prade H (1980) Fuzzy sets and systems: theory and applications. Academic Press, New York, London.

    MATH  Google Scholar 

  17. Duncan G, Lambert D (1987) The risk of disclosure for microdata. In: Proc. of the Bureau of the Census Third Annual Research Conference, Bureau of the Census, Washington, DC, 263-274.

    Google Scholar 

  18. Duncan G, Mukherjee S (1991) Microdata disclosure limitation in statistical databases: query size and random sample query control. In: Prof. 1991 IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 20-22, 1991.

    Google Scholar 

  19. Fellegi I (1972) On the question of statistical confidentiality. Journal of the American Statistical Association 7-18.

    Google Scholar 

  20. Fuller WA (1987) Measurement error models. J. Wiley & Sons, New York.

    Book  Google Scholar 

  21. Gates A, Kreinovich V, Longpré L, Pinheiro da Silva P, Keller GR (2006) Towards secure cyberinfrastructure for sharing border information. In: Proceedings of the Lineae Terrarum: International Border Conference, El Paso, Las Cruces, and Cd. Juárez, March 27-30, 2006.

    Google Scholar 

  22. Griewank A (2000) Evaluating derivatives: principles and techniques of algorithmic differentiation. SIAM, Philadelphia.

    MATH  Google Scholar 

  23. Hole JA (1992) Nonlinear high-resolution three-dimensional seismic travel time tomography. J. Geophysical Research 97(B5):6553-6562.

    Article  Google Scholar 

  24. Jaulin L, Kieffer M, Didrit O, Walter E (2001) Applied interval analysis. Springer Verlag, London.

    MATH  Google Scholar 

  25. Kauffman A, Gupta MM (1985) Introduction to fuzzy arithmetic: theory and applications. Van Nostrand, New York.

    Google Scholar 

  26. Kearfott RB, Kreinovich V, eds (1996) Applications of interval computations. Kluwer, Dordrecht.

    MATH  Google Scholar 

  27. Keller GR, Hildenbrand TG, Kucks R, Webring M, Briesacher A, Rujawitz K, Hittleman AM, Roman DJ, Winester D, Aldouri R, Seeley J, Rasillo J, Torres T, Hinze WJ, Gates A, Kreinovich V, Salayandia L (2006) A community effort to construct a gravity database for the United States and an associated Web portal. In: Sinha AK (ed), Geoinformatics: Data to Knowledge, Geological Society of America Publ., Boulder, Colorado, pp. 21-34.

    Chapter  Google Scholar 

  28. Kim J (1986) A method for limiting disclosure of microdata based on random noise and transformation. In: Proceedings of the Section on Survey Research Methods of the American Statistical Association 370-374.

    Google Scholar 

  29. Kirkendall N et al. (1994) Report on Statistical Disclosure Limitations Methodology. Office of Management and Budget, Washington, DC, Statistical Policy Working Paper No. 22.

    Google Scholar 

  30. Klir G, Yuan B (1995) Fuzzy sets and fuzzy logic. Prentice Hall, New Jersey.

    MATH  Google Scholar 

  31. Kreinovich V, Beck J, Ferregut C, Sanchez A, Keller GR, Averill M, Starks SA (2007) Monte-Carlo-type techniques for processing interval uncertainty, and their potential engineering applications. Reliable Computing 13(1):25-69.

    Article  MATH  MathSciNet  Google Scholar 

  32. Kreinovich V, Bernat A, Villa E, Mariscal Y (1991) Parallel computers estimate errors caused by imprecise data. Interval Computations (2):21-46.

    Google Scholar 

  33. Kreinovich V, Ferson S (2004) A new cauchy-based black-box technique for uncertainty in risk analysis. Reliability Engineering and Systems Safety 85 (1-3):267-279.

    Article  Google Scholar 

  34. Kreinovich V, Lakeyev A, Rohn J, Kahl P (1998) Computational complexity and feasibility of data processing and interval computations. Kluwer, Dordrecht.

    MATH  Google Scholar 

  35. Kreinovich V, Longpré L, Starks SA, Xiang G, Beck J, Kandathi K, Nayak A, Ferson S, Hajagos J (2007) Interval versions of statistical techniques, with applications to environmental analysis, bioinformatics, and privacy in statistical databases. Journal of Computational and Applied Mathematics 199(2):418-423.

    Article  MATH  MathSciNet  Google Scholar 

  36. Kreinovich V, Pavlovich MI (1985) Error estimate of the result of indirect measurements by using a calculational experiment. Measurement Techniques 28 (3):201-205.

    Article  Google Scholar 

  37. Longpré L, Kreinovich V, Freudenthal E, Ceberio M, Modave F, Baijal N, Chen W, Chirayath V, Xiang G, Vargas JI (2005) Privacy: protecting, processing, and measuring loss. In: Abstracts of the 2005 South Central Information Security Symposium SCISS’05, Austin, Texas, April 30, 2005, p. 2.

    Google Scholar 

  38. Moore RE, Lodwick WA (2003) Interval analysis and fuzzy set theory. Fuzzy Sets and Systems 135(1):5-9.

    Article  MATH  MathSciNet  Google Scholar 

  39. Morgenstern M (1987) Security and inference in multilevel database and knowledge base systems. In: Proc. of the ACM SIGMOD Conference 357-373.

    Google Scholar 

  40. Nguyen HT, Kreinovich V (1996) Nested intervals and sets: concepts, relations to fuzzy sets, and applications, In: Kearfott RB, Kreinovich V (eds) Applications of interval computations. Kluwer, Dordrecht, pp. 245-290.

    Google Scholar 

  41. Nguyen HT, Walker EA (2005) First course in fuzzy logic. CRC Press, Boca Raton, Florida.

    MATH  Google Scholar 

  42. Office of Technology Assessment (1993) Protecting privacy in computerized medical information. US Government Printing Office, Washington, DC.

    Google Scholar 

  43. Palley M, Siminoff J (1986) Regression methodology based disclosure of a statistical database. In: Proceedings of the Section on Survey Research Methods of the American Statistical Association 382-387.

    Google Scholar 

  44. Parker RL (1994) Geophysical inverse theory. Princeton University Press, Princeton, New Jersey.

    MATH  Google Scholar 

  45. Platon E, Tupelly K, Kreinovich V, Starks SA, Villaverde K (2005) Exact bounds for interval and fuzzy functions under monotonicity constraints, with potential applications to biostratigraphy. In: Proceedings of the 2005 IEEE International Conference on Fuzzy Systems FUZZ-IEEE’2005, Reno, Nevada, May 22-25, 2005, pp. 891-896.

    Google Scholar 

  46. Rabinovich S (2005) Measurement errors and uncertainties: theory and practice. American Institute of Physics, New York.

    MATH  Google Scholar 

  47. Schiek CG, Araiza R, Hurtado JM, Velasco AA, Kreinovich V, Sinyansky V (2006) Images with uncertainty: efficient algorithms for shift, rotation, scaling, and registration, and their applications to geosciences. In: Nachtegael M, Van der Weken D, Kerre EE (eds), Soft computing in image processing: recent advances, Springer Verlag.

    Google Scholar 

  48. Sinha AK (2006) Geoinformatics: data to knowledge. Geological Society of America Publ., Boulder, Colorado.

    Google Scholar 

  49. Su T, Ozsoyoglu G (1991) Controlling FD and MVD inference in multilevel relational database systems. IEEE Transactions on Knowledge and Data Engineering 3:474-485.

    Article  Google Scholar 

  50. Sweeney L (1996) Replacing personally-identifying information in medical records, the scrub system. Journal of the American Medical Informatics Association 333-337.

    Google Scholar 

  51. Sweeney L (1997) Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicine and Ethics 25:98-110.

    Article  Google Scholar 

  52. Sweeney L (1997) Guaranteeing anonymity when sharing medical data, the datafly system. Journal of the American Medical Informatics Association 51-55.

    Google Scholar 

  53. Sweeney L (1997) Computational disclosure control for medical microdata. In: Proceedings of the Record Linkage Workshop, Bureau of the Census, Washing- ton, DC.

    Google Scholar 

  54. Sweeney L (1998) Commentary: researchers need not rely on consent or not. New England Journal of Medicine 338(15)

    Google Scholar 

  55. Sweeney L (1998) Towards the optimal suppression of details when disclosing medical data, the use of sub-combination analysis. In: Proceedings of MED-INFO’98, International Medical Informatics Association, Seoul, Korea, North-Holland, p. 1157.

    Google Scholar 

  56. Sweeney L (1998) Three computational systems for disclosing medical data in the year 1999. In: Proceedings of MEDINFO’98, International Medical Informatics Association, Seoul, Korea, North-Holland pp. 1124-1129.

    Google Scholar 

  57. Sweeney L (1998) Datafly: a system for providing anonymity in medical data. In: Lin TY, Qian S (eds.) Database security XI: status and Prospects. Elsevier, Amsterdam.

    Google Scholar 

  58. Torres R, Keller GR, Kreinovich V, Longpré L, Starks SA (2004) Eliminating duplicates under interval and fuzzy uncertainty: an asymptotically optimal algorithm and its geospatial applications. Reliable Computing 10(5):401-422.

    Article  MATH  MathSciNet  Google Scholar 

  59. Trejo R, Kreinovich V (2001) Error estimations for indirect measurements: randomized vs. deterministic algorithms for ‘black-box’ programs. In: Rajasekaran S, Pardalos P, Reif J, and Rolim J (eds), Handbook on randomized computing. Kluwer, Dordrecht, 673-729.

    Google Scholar 

  60. Vavasis SA (1991) Nonlinear optimization: complexity issues, Oxford University Press, New York.

    MATH  Google Scholar 

  61. Willenborg L, De Waal T (1996) Statistical disclosure control in practice. Springer Verlag, New York.

    MATH  Google Scholar 

  62. Wen Q, Gates AQ, Beck J, Kreinovich V, Keller JR (2001) Towards automatic detection of erroneous measurement results in a gravity database. In: Proceedings of the 2001 IEEE Systems, Man, and Cybernetics Conference, Tucson, Arizona, October 7-10, 2001, pp. 2170-2175.

    Google Scholar 

  63. Xie H, Hicks N, Keller GR, Huang H, Kreinovich V (2003) An IDL/ENVI implementation of the FFT based algorithm for automatic image registration. Computers and Geosciences 29(8):1045-1055.

    Article  Google Scholar 

  64. Zelt CA, Barton PJ (1998) Three-dimensional seismic refraction tomography: A comparison of two methods applied to data from the Faeroe Basin. J. Geo-physical Research 103(B4):7187-7210.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Longpré, L., Kreinovich, V. (2007). How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentiality. In: Nedjah, N., Abraham, A., Mourelle, L.d.M. (eds) Computational Intelligence in Information Assurance and Security. Studies in Computational Intelligence, vol 57. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71078-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71078-3_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71077-6

  • Online ISBN: 978-3-540-71078-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics