Valid statistical analysis for logistic regression with multiple sources

Stephen E. Fienberg, Yuval Nardi, Aleksandra B. Slavković

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

Abstract

Considerable effort has gone into understanding issues of privacy protection of individual information in single databases, and various solutions have been proposed depending on the nature of the data, the ways in which the database will be used and the precise nature of the privacy protection being offered. Once data are merged across sources, however, the nature of the problem becomes far more complex and a number of privacy issues arise for the linked individual files that go well beyond those that are considered with regard to the data within individual sources. In the paper, we propose an approach that gives full statistical analysis on the combined database without actually combining it. We focus mainly on logistic regression, but the method and tools described may be applied essentially to other statistical models as well.

Original languageEnglish (US)
Title of host publicationProtecting Persons While Protecting the People - Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, Revised Selected Papers
Pages82-94
Number of pages13
DOIs
StatePublished - 2009
Event2nd Annual Workshop on Privacy and Security, ISIPS 2008 - New Brunswick, NJ, United States
Duration: May 12 2008May 12 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5661 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other2nd Annual Workshop on Privacy and Security, ISIPS 2008
Country/TerritoryUnited States
CityNew Brunswick, NJ
Period5/12/085/12/08

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Valid statistical analysis for logistic regression with multiple sources'. Together they form a unique fingerprint.

Cite this