메뉴 건너뛰기




Volumn 7, Issue 2, 1997, Pages 101-114

Suppressing marginal totals from a two-dimensional table to protect sensitive information

Author keywords

Exact disclosure; NP complete problem; Sensitive data; Suppression pattern and graph

Indexed keywords


EID: 0042230290     PISSN: 09603174     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1018517631177     Document Type: Article
Times cited : (5)

References (21)
  • 1
    • 0024914229 scopus 로고
    • Security control methods for statistical databases: A comparative study
    • Adam, N. R. and Wortmann J. C. (1989) Security control methods for statistical databases: a comparative study. ACM Computing Surveys, 21, 515-56.
    • (1989) ACM Computing Surveys , vol.21 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.C.2
  • 5
    • 0023348871 scopus 로고
    • Some new matroids on graphs: Cut sets and max cut problem
    • Conforti, M. and Rao, M. R. (1987) Some new matroids on graphs: cut sets and max cut problem. Mathematics of Operations Research, 12, 193-204.
    • (1987) Mathematics of Operations Research , vol.12 , pp. 193-204
    • Conforti, M.1    Rao, M.R.2
  • 7
    • 0042515066 scopus 로고
    • Linear sensitivity measures in statistical disclosure control
    • Cox, L. H. (1981) Linear sensitivity measures in statistical disclosure control. Journal of Statistical Planning and Inference, 5, 153-64.
    • (1981) Journal of Statistical Planning and Inference , vol.5 , pp. 153-164
    • Cox, L.H.1
  • 8
    • 0020779363 scopus 로고
    • Inference control for statistical databases
    • Denning, D. E. and Schlörer, J. (1983) Inference control for statistical databases. IEEE Computer, 16, 69-82.
    • (1983) IEEE Computer , vol.16 , pp. 69-82
    • Denning, D.E.1    Schlörer, J.2
  • 9
    • 0004201430 scopus 로고
    • Computer Science Press, Potomac, MD
    • Even, S. (1979) Graph Algorithms. Computer Science Press, Potomac, MD.
    • (1979) Graph Algorithms
    • Even, S.1
  • 12
    • 0024019017 scopus 로고
    • A graph theoretic approach to statistical data security
    • Gusfield, D. (1988) A graph theoretic approach to statistical data security. SIAM Journal of Computing, 17, 552-71.
    • (1988) SIAM Journal of Computing , vol.17 , pp. 552-571
    • Gusfield, D.1
  • 13
    • 0042014288 scopus 로고
    • The NP-completeness column: An ongoing guide
    • Johnson, D. S. (1984) The NP-completeness column: an ongoing guide. Journal of Algorithms, 5, 147-60.
    • (1984) Journal of Algorithms , vol.5 , pp. 147-160
    • Johnson, D.S.1
  • 14
    • 0011190489 scopus 로고
    • Efficient detection and protection of information in cross tabulated tables I: Linear invariant test
    • Kao, M. Y. and Gusfield, D. (1993) Efficient detection and protection of information in cross tabulated tables I: linear invariant test. SIAM Journal of Discrete Mathematics, 6, 460-76.
    • (1993) SIAM Journal of Discrete Mathematics , vol.6 , pp. 460-476
    • Kao, M.Y.1    Gusfield, D.2
  • 15
    • 0000120975 scopus 로고
    • Cell suppression: Disclosure protection for sensitive tabular data
    • Kelly, P. K., Golden, B. L., and Assad, A. A. (1992) Cell suppression: disclosure protection for sensitive tabular data. Networks, 22, 397-417.
    • (1992) Networks , vol.22 , pp. 397-417
    • Kelly, P.K.1    Golden, B.L.2    Assad, A.A.3
  • 16
    • 0027874192 scopus 로고
    • A universal-scheme approach to statistical databases containing homogeneous summary tables
    • Malvestuto, F. M. (1993) A universal-scheme approach to statistical databases containing homogeneous summary tables. ACM Transactions on Database Systems, 18, 678-708.
    • (1993) ACM Transactions on Database Systems , vol.18 , pp. 678-708
    • Malvestuto, F.M.1
  • 20
    • 0043016082 scopus 로고
    • Manual on disclosure control methods
    • Schackis, D. (1993) Manual on disclosure control methods. EUROSTAT Report.
    • (1993) EUROSTAT Report
    • Schackis, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.