메뉴 건너뛰기




Volumn 13, Issue 4, 2003, Pages 329-335

A theoretical basis for perturbation methods

Author keywords

Confidentiality; Data masking; Disclosure risk; Perturbation; Statistical disclosure limitation

Indexed keywords


EID: 0346801841     PISSN: 09603174     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1025610705286     Document Type: Review
Times cited : (39)

References (32)
  • 1
    • 0347432367 scopus 로고    scopus 로고
    • Information preserving statistical obfuscation
    • Burridge J. 2003. Information preserving statistical obfuscation. Statistics and Computing 13: 321-327.
    • (2003) Statistics and Computing , vol.13 , pp. 321-327
    • Burridge, J.1
  • 2
    • 0032656018 scopus 로고    scopus 로고
    • Correlations and copulas for decision and risk analysis
    • Clemen R.T. and Reilly T. 1999. Correlations and copulas for decision and risk analysis. Management Science 45: 208-224.
    • (1999) Management Science , vol.45 , pp. 208-224
    • Clemen, R.T.1    Reilly, T.2
  • 3
    • 0012793677 scopus 로고
    • Towards a methodology for statistical disclosure control
    • Dalenius T. 1977. Towards a methodology for statistical disclosure control. Statistisktidskrift 5: 429-444.
    • (1977) Statistisktidskrift , vol.5 , pp. 429-444
    • Dalenius, T.1
  • 5
    • 84972531331 scopus 로고
    • Enhancing access to microdata while protecting confidentiality: Prospects for the future
    • Duncan G.T. and Pearson R.W. 1991. Enhancing access to microdata while protecting confidentiality: Prospects for the future. Statistical Science 6: 219-239.
    • (1991) Statistical Science , vol.6 , pp. 219-239
    • Duncan, G.T.1    Pearson, R.W.2
  • 6
    • 0002861216 scopus 로고    scopus 로고
    • A Bayesian approach to data disclosure: Optimal intruder behavior for continuous data
    • Fienberg S.E., Makov U.E., and Sanil A.P. 1997. A Bayesian approach to data disclosure: Optimal intruder behavior for continuous data. Journal of Official Statistics 13: 75-89.
    • (1997) Journal of Official Statistics , vol.13 , pp. 75-89
    • Fienberg, S.E.1    Makov, U.E.2    Sanil, A.P.3
  • 7
    • 0000432739 scopus 로고    scopus 로고
    • Disclosure limitation using perturbation and related methods for categorical data
    • Fienberg S.E., Makov U.E., and Steele R.J. 1998. Disclosure limitation using perturbation and related methods for categorical data. Journal of Official Statistics 14: 485-502.
    • (1998) Journal of Official Statistics , vol.14 , pp. 485-502
    • Fienberg, S.E.1    Makov, U.E.2    Steele, R.J.3
  • 8
    • 0000983892 scopus 로고
    • Masking procedures for microdata disclosure limitation
    • Fuller W.A. 1993. Masking procedures for microdata disclosure limitation. Journal of Official Statistics 9: 383-406.
    • (1993) Journal of Official Statistics , vol.9 , pp. 383-406
    • Fuller, W.A.1
  • 9
    • 0040076616 scopus 로고    scopus 로고
    • A model based method for disclosure limitation of business microdata
    • Franconi L. and Stander J. 2002. A model based method for disclosure limitation of business microdata. J. Roy. Stat. Soc. D 51: 51-61.
    • (2002) J. Roy. Stat. Soc. D , vol.51 , pp. 51-61
    • Franconi, L.1    Stander, J.2
  • 10
    • 0347432361 scopus 로고    scopus 로고
    • Spatial and non-spatial model based protection procedures for release of business microdata
    • Franconi L. and Stander J. 2003. Spatial and non-spatial model based protection procedures for release of business microdata. Statistics and Computing 13: 295-305.
    • (2003) Statistics and Computing , vol.13 , pp. 295-305
    • Franconi, L.1    Stander, J.2
  • 12
    • 0002956175 scopus 로고
    • A method for limiting disclosure in microdata based on random noise and transformation
    • Sec. ASA, Washington, DC
    • Kim J. 1986. A method for limiting disclosure in microdata based on random noise and transformation. In: Proc. ASA Surv. Res. Meth. Sec. ASA, Washington, DC, pp. 370-374.
    • (1986) Proc. ASA Surv. Res. Meth. , pp. 370-374
    • Kim, J.1
  • 17
    • 0033207750 scopus 로고    scopus 로고
    • A general additive data perturbation method for database security
    • Muralidhar K., Parsa R., and Sarathy R. 1999. A general additive data perturbation method for database security. Management Science 45: 1399-1415.
    • (1999) Management Science , vol.45 , pp. 1399-1415
    • Muralidhar, K.1    Parsa, R.2    Sarathy, R.3
  • 18
    • 0035565671 scopus 로고    scopus 로고
    • An improved security requirement for data perturbation with implications for E-Commerce
    • Muralidhar K., Sarathy R., and Parsa R. 2001. An improved security requirement for data perturbation with implications for E-Commerce. Decision Sciences 32: 683-698.
    • (2001) Decision Sciences , vol.32 , pp. 683-698
    • Muralidhar, K.1    Sarathy, R.2    Parsa, R.3
  • 19
    • 84976672368 scopus 로고
    • The use of regression methodology for the compromise of confidential information in statistical databases
    • Palley M.A. and Simonoff J.S. 1987. The use of regression methodology for the compromise of confidential information in statistical databases. ACM Transactions on Database Systems 12: 593-608.
    • (1987) ACM Transactions on Database Systems , vol.12 , pp. 593-608
    • Palley, M.A.1    Simonoff, J.S.2
  • 23
    • 0012776989 scopus 로고
    • Discussion: Statistical disclosure limitation
    • Rubin D.B. 1993. Discussion: Statistical disclosure limitation. Journal of Official Statistics 9: 461-468.
    • (1993) Journal of Official Statistics , vol.9 , pp. 461-468
    • Rubin, D.B.1
  • 24
    • 0036909696 scopus 로고    scopus 로고
    • The security of confidential numerical data in databases
    • Sarathy R. and Muralidhar K. 2002. The security of confidential numerical data in databases. Information Systems Research 13: 389-403.
    • (2002) Information Systems Research , vol.13 , pp. 389-403
    • Sarathy, R.1    Muralidhar, K.2
  • 25
    • 0036971583 scopus 로고    scopus 로고
    • Perturbing non-normal confidential variables: The copula approach
    • Sarathy R., Muralidhar K., and Parsa R. 2002. Perturbing non-normal confidential variables: The copula approach. Management Science 48: 1613-1627.
    • (2002) Management Science , vol.48 , pp. 1613-1627
    • Sarathy, R.1    Muralidhar, K.2    Parsa, R.3
  • 28
    • 44949285668 scopus 로고
    • Optimal noise addition for preserving confidentiality in multivariate data
    • Tendick P. 1991. Optimal noise addition for preserving confidentiality in multivariate data. Journal of Statistical Planning and Inference 27: 341-353.
    • (1991) Journal of Statistical Planning and Inference , vol.27 , pp. 341-353
    • Tendick, P.1
  • 29
    • 0028393221 scopus 로고
    • A modified random perturbation method for database security
    • Tendick P. and Matloff N. 1994. A modified random perturbation method for database security. ACM Transactions on Database Systems 19: 47-63.
    • (1994) ACM Transactions on Database Systems , vol.19 , pp. 47-63
    • Tendick, P.1    Matloff, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.