{"id":174653,"created":"2025-01-19T00:44:49.120870+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00174653","sets":["581:8417:8427"]},"path":["8427"],"owner":"11","recid":"174653","title":["匿名加工・再識別コンテストIce and Fire:匿名加工方式とその安全性を評価する試み"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-09-15"},"_buckets":{"deposit":"e5bf8c36-2f3a-4e04-b2c5-2d45f4eb63db"},"_deposit":{"id":"174653","pid":{"type":"depid","value":"174653","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"匿名加工・再識別コンテストIce and Fire:匿名加工方式とその安全性を評価する試み","author_link":["360305","360304"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"匿名加工・再識別コンテストIce and Fire:匿名加工方式とその安全性を評価する試み"},{"subitem_title":"Ice and Fire: Data Anonymization and De-Anonymization Competition","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:社会の変革に挑戦するセキュリティ技術とプライバシー保護技術(招待論文)] 個人情報,匿名加工,仮名,再識別,k-匿名性","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2016-09-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"明治大学総合数理学部"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"School of Interdisciplinary Mathematical Sciences, Meiji University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/174653/files/IPSJ-JNL5709002.pdf","label":"IPSJ-JNL5709002.pdf"},"date":[{"dateType":"Available","dateValue":"2018-09-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL5709002.pdf","filesize":[{"value":"780.7 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"25d0d82c-b99d-41e4-b1c2-f61d01fb274f","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"菊池, 浩明"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hiroaki, Kikuchi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"個人情報の保護とビッグデータの活用を両立させるために,個人情報の匿名加工の法整備が進み,様々な方式が導入されようとしている.その一方,匿名加工の為の方式には様々な提案が行われており,適用する分野やデータの種別に適した方式をどのように選定するか定まっていない.加えて,有用性と安全性を正しく評価する方法が確立していない.そこで,共通の疑似データを用いて,匿名加工とその再識別の技術を競うコンテストを企画する.本稿では,このコンテストの目的,提供する疑似データの選定,サンプルの匿名加工と再識別アルゴリズム,有用性評価方法,安全性評価方法について述べる.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Data anonymization is ready to go before the big-data business runs successfully while preserving privacy of personal information. While, it is not trivial to choose the best algorithm to make the given data anonymized to be secure for a given particular purpose. To access the risk to be compromised accurately, the data needs to balance the utility and the security. Hence, with common pseudo micro-data, we propose a competition for best anonymization and re-identification algorithm. The paper addresses the aim of the competition, the target micro-data, sample algorithms, utility and security metrics.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1910","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"1900","bibliographicIssueDates":{"bibliographicIssueDate":"2016-09-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"9","bibliographicVolumeNumber":"57"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"updated":"2025-01-20T06:36:07.098828+00:00","links":{}}