메뉴 건너뛰기




Volumn 13, Issue 4, 2003, Pages 307-320

Maximum entropy simulation for microdata protection

Author keywords

Business microdata; Disclosure limitation; Maximum entropy; Record re identification; Regression; Simulation

Indexed keywords


EID: 0348062788     PISSN: 09603174     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1025606604377     Document Type: Article
Times cited : (15)

References (54)
  • 3
    • 0026303073 scopus 로고
    • An adaptive algorithm for the approximate calculation of multiple integrals
    • Berntsen J., Espelid T.O., and Genz A. 1991a. An adaptive algorithm for the approximate calculation of multiple integrals. ACM Transactions on Mathematical Software 17(4): 437-451.
    • (1991) ACM Transactions on Mathematical Software , vol.17 , Issue.4 , pp. 437-451
    • Berntsen, J.1    Espelid, T.O.2    Genz, A.3
  • 4
    • 0026263188 scopus 로고
    • Algorithm 698: DCUHRE: An adaptive multidimensional integration routine for a vector of integrals
    • Berntsen J., Espelid T.O., and Genz A. 1991b. Algorithm 698: DCUHRE: An adaptive multidimensional integration routine for a vector of integrals. ACM Transactions on Mathematical Software 17(4): 452-456.
    • (1991) ACM Transactions on Mathematical Software , vol.17 , Issue.4 , pp. 452-456
    • Berntsen, J.1    Espelid, T.O.2    Genz, A.3
  • 6
    • 84949472056 scopus 로고    scopus 로고
    • Microdata protection through noise addition
    • Domingo-Ferrer J. (Ed.), Inference Control in Statistical Databases
    • Brand R. 2002. Microdata protection through noise addition. In: Domingo-Ferrer J. (Ed.), Inference Control in Statistical Databases. Vol. 2316 of Lecture Notes in Computer Science. Springer, pp. 97-116.
    • (2002) Lecture Notes in Computer Science , vol.2316 , pp. 97-116
    • Brand, R.1
  • 7
    • 0348093417 scopus 로고    scopus 로고
    • Personal communication
    • Burridge J. 2003a. Personal communication.
    • (2003)
    • Burridge, J.1
  • 8
    • 0347432367 scopus 로고    scopus 로고
    • Information preserving statistical obfuscation
    • This volume
    • Burridge J. 2003b. Information preserving statistical obfuscation. Statistics & Computing. This volume.
    • (2003) Statistics & Computing
    • Burridge, J.1
  • 9
    • 0000732463 scopus 로고
    • A limited memory algorithm for bound constrained optimization
    • Byrd R.H., Lu P., Nocedal J., and Zhu C. 1995. A limited memory algorithm for bound constrained optimization. SIAM Journal on Scientific Computing 16(5): 1190-1208.
    • (1995) SIAM Journal on Scientific Computing , vol.16 , Issue.5 , pp. 1190-1208
    • Byrd, R.H.1    Lu, P.2    Nocedal, J.3    Zhu, C.4
  • 10
    • 0039833377 scopus 로고
    • Protecting confidentiality in business surveys
    • Cox B.G., Binder D.A., Chinnappa B.N., Christianson A., Colledge M.J., and Kott P.S. (Eds.). Wiley
    • Cox L.H. 1995. Protecting confidentiality in business surveys. In: Cox B.G., Binder D.A., Chinnappa B.N., Christianson A., Colledge M.J., and Kott P.S. (Eds.), Business Survey Methods. Wiley, pp. 443-473.
    • (1995) Business Survey Methods , pp. 443-473
    • Cox, L.H.1
  • 11
    • 0000546609 scopus 로고
    • I-divergence geometry of probability distributions and minimization problems
    • Csiszár I. 1975. I-divergence geometry of probability distributions and minimization problems. The Annals of Probability 3: 146-158.
    • (1975) The Annals of Probability , vol.3 , pp. 146-158
    • Csiszár, I.1
  • 12
    • 0012793677 scopus 로고
    • Towards a methodology for statistical disclosure control
    • Dalenius T. 1977. Towards a methodology for statistical disclosure control. Statistisk Tidskrift 3: 213-225.
    • (1977) Statistisk Tidskrift , vol.3 , pp. 213-225
    • Dalenius, T.1
  • 13
    • 84949476900 scopus 로고    scopus 로고
    • LHS-based hybrid microdata vs. rank swapping and microaggregation for numeric microdata protection
    • Domingo-Ferrer J. (Ed.), Inference Control in Statistical Databases. Springer
    • Dandekar R.A., Domingo-Ferrer J., and Sebé F. 2002. LHS-based hybrid microdata vs. rank swapping and microaggregation for numeric microdata protection. In: Domingo-Ferrer J. (Ed.), Inference Control in Statistical Databases. Vol. 2316 of Lecture Notes in Computer Science. Springer, pp. 153-162.
    • (2002) Lecture Notes in Computer Science , vol.2316 , pp. 153-162
    • Dandekar, R.A.1    Domingo-Ferrer, J.2    Sebé, F.3
  • 15
    • 84949463843 scopus 로고    scopus 로고
    • Sensitive micro data protection using Latin Hypercube Sampling technique
    • Domingo-Ferrer J. (Ed.), Inference Control in Statistical Databases. Springer
    • Dandekar R., Cohen M., and Kirkendall N. 2002. Sensitive micro data protection using Latin Hypercube Sampling technique. In: Domingo-Ferrer J. (Ed.), Inference Control in Statistical Databases. Vol. 2316 of Lecture Notes in Computer Science. Springer, pp. 117-125.
    • (2002) Lecture Notes in Computer Science , vol.2316 , pp. 117-125
    • Dandekar, R.1    Cohen, M.2    Kirkendall, N.3
  • 17
    • 2242464139 scopus 로고    scopus 로고
    • Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise
    • Duncan G.T. and Mukherjee S. 2000. Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise. Journal of the American Statistical Association 95: 720-729.
    • (2000) Journal of the American Statistical Association , vol.95 , pp. 720-729
    • Duncan, G.T.1    Mukherjee, S.2
  • 18
    • 0000432739 scopus 로고    scopus 로고
    • Disclosure limitation using perturbation and related methods for categorical data
    • with discussion
    • Fienberg S.E., Makov U., and Steele R.J. 1998. Disclosure limitation using perturbation and related methods for categorical data. Journal of Official Statistics 14: 485-502. (with discussion).
    • (1998) Journal of Official Statistics , vol.14 , pp. 485-502
    • Fienberg, S.E.1    Makov, U.2    Steele, R.J.3
  • 21
    • 0347432361 scopus 로고    scopus 로고
    • Spatial and non-spatial model-based protection procedures for the release of business microdata
    • This volume
    • Franconi L. and Stander J. 2003. Spatial and non-spatial model-based protection procedures for the release of business microdata. Statistics & Computing. This volume.
    • (2003) Statistics & Computing
    • Franconi, L.1    Stander, J.2
  • 22
    • 0346202086 scopus 로고
    • An application of information theory to the problem of statistical disclosure
    • Frank O. 1978. An application of information theory to the problem of statistical disclosure. Journal of Statistical Planning and Inference 2(2): 143-152.
    • (1978) Journal of Statistical Planning and Inference , vol.2 , Issue.2 , pp. 143-152
    • Frank, O.1
  • 23
    • 0000247137 scopus 로고    scopus 로고
    • Estimation and optimization of functions
    • Gilks W.R., Richardson S., and Spiegelhalter D.J.E. (Eds.). Chapman & Hall, London
    • Geyer C.J. 1996. Estimation and optimization of functions. In: Gilks W.R., Richardson S., and Spiegelhalter D.J.E. (Eds.), Markov chain Monte Carlo in Practice. Chapman & Hall, London, pp. 241-258.
    • (1996) Markov Chain Monte Carlo in Practice , pp. 241-258
    • Geyer, C.J.1
  • 24
    • 0348033719 scopus 로고    scopus 로고
    • Safe dissemination of census results by means of interactive probabilistic models
    • Crete
    • Grim J., Boček P., and Pudil P. 2001. Safe dissemination of census results by means of interactive probabilistic models. ETK-NTTS 2001 Pre-proceedings of the Conference. Crete, pp. 849-856.
    • (2001) ETK-NTTS 2001 Pre-proceedings of the Conference , pp. 849-856
    • Grim, J.1    Boček, P.2    Pudil, P.3
  • 26
    • 24244475952 scopus 로고    scopus 로고
    • Strong entropy concentration, game theory, coding and randomness
    • Eurandom, Eindhoven
    • Grünwald P.D. 2001. Strong entropy concentration, game theory, coding and randomness. Technical Report 2001-010. Eurandom, Eindhoven.
    • (2001) Technical Report , vol.2001 , Issue.10
    • Grünwald, P.D.1
  • 27
    • 77956890234 scopus 로고
    • Monte Carlo sampling methods using Markov chains and their applications
    • Hastings W.K. 1970. Monte Carlo sampling methods using Markov chains and their applications. Biometrika 57: 97-109.
    • (1970) Biometrika , vol.57 , pp. 97-109
    • Hastings, W.K.1
  • 29
    • 11944275853 scopus 로고
    • Information theory and statistical mechanics II
    • Jaynes E.T. 1957. Information theory and statistical mechanics II. Physical Review 108: 171-190.
    • (1957) Physical Review , vol.108 , pp. 171-190
    • Jaynes, E.T.1
  • 33
    • 0346832671 scopus 로고    scopus 로고
    • Comment on "Disclosure limitation using perturbation and related methods for categorical data"
    • Kooiman P. 1998. Comment on "Disclosure limitation using perturbation and related methods for categorical data." Journal of Official Statistics 14: 503-508.
    • (1998) Journal of Official Statistics , vol.14 , pp. 503-508
    • Kooiman, P.1
  • 37
    • 0033207750 scopus 로고    scopus 로고
    • A general additive data perturbation method for database security
    • Muralidhar K., Parsa R., and Sarathy R. 1999. A general additive data perturbation method for database security. Management Science 45: 1399-1415.
    • (1999) Management Science , vol.45 , pp. 1399-1415
    • Muralidhar, K.1    Parsa, R.2    Sarathy, R.3
  • 38
    • 0346801841 scopus 로고    scopus 로고
    • A theoretical basis for perturbation methods
    • This volume
    • Muralidhar K. and Sarathy R. 2003. A theoretical basis for perturbation methods. Statistics & Computing. This volume.
    • (2003) Statistics & Computing
    • Muralidhar, K.1    Sarathy, R.2
  • 39
    • 84949443947 scopus 로고    scopus 로고
    • Model based disclosure protection
    • Domingo-Ferrer J. (Ed.), Inference Control in Statistical Databases. Springer
    • Polettini S., Franconi L., and Stander J. 2002. Model based disclosure protection. In: Domingo-Ferrer J. (Ed.), Inference Control in Statistical Databases. Vol. 2316 of Lecture Notes in Computer Science. Springer, pp. 83-96.
    • (2002) Lecture Notes in Computer Science , vol.2316 , pp. 83-96
    • Polettini, S.1    Franconi, L.2    Stander, J.3
  • 43
    • 0348093384 scopus 로고    scopus 로고
    • Methods of inference for partially synthetic, public use data sets
    • Institute of Statistics and Decision Sciences, Duke University, Durham, NC
    • Reiter J.P. 2002a. Methods of inference for partially synthetic, public use data sets. Technical report. Institute of Statistics and Decision Sciences, Duke University, Durham, NC.
    • (2002) Technical Report
    • Reiter, J.P.1
  • 44
    • 0346832672 scopus 로고    scopus 로고
    • Protecting confidentiality by releasing synthetic, public use microdata
    • Institute of Statistics and Decision Sciences. Duke University, Durham, NC
    • Reiter J.P. 2002b. Protecting confidentiality by releasing synthetic, public use microdata. Technical report. Institute of Statistics and Decision Sciences. Duke University, Durham, NC.
    • (2002) Technical Report
    • Reiter, J.P.1
  • 45
    • 0346202092 scopus 로고    scopus 로고
    • Model diagnostics for remote access servers
    • This volume
    • Reiter J.P. 2003. Model diagnostics for remote access servers. Statistics & Computing. This volume
    • (2003) Statistics & Computing
    • Reiter, J.P.1
  • 47
    • 0012776989 scopus 로고
    • Discussion of "Statistical disclosure limitation"
    • Rubin D.B. 1993. Discussion of "Statistical disclosure limitation". Journal of Official Statistics 9: 461-468.
    • (1993) Journal of Official Statistics , vol.9 , pp. 461-468
    • Rubin, D.B.1
  • 48
    • 0036971583 scopus 로고    scopus 로고
    • Perturbing nonnormal confidential attributes: The copula approach
    • Sarathy R., Muralidhar K., and Parsa R. 2002. Perturbing nonnormal confidential attributes: The copula approach. Management Science 48: 1613-1627.
    • (2002) Management Science , vol.48 , pp. 1613-1627
    • Sarathy, R.1    Muralidhar, K.2    Parsa, R.3
  • 49
    • 0346801842 scopus 로고    scopus 로고
    • Remote access systems for statistical analysis of microdata
    • This volume
    • Schouten B. and Cigrang M. 2003. Remote access systems for statistical analysis of microdata. Statistics & Computing. This volume.
    • (2003) Statistics & Computing
    • Schouten, B.1    Cigrang, M.2
  • 50
    • 0346202090 scopus 로고    scopus 로고
    • Assessing disclosure risk and data utility: A multiple objectives decision problem
    • Luxembourg, 7-9 April 2003
    • Trottini M. 2003. Assessing disclosure risk and data utility: A multiple objectives decision problem. Joint ECE/Eurostat work session on Statistical Data Confidentiality (Luxembourg, 7-9 April 2003).
    • (2003) Joint ECE/Eurostat Work Session on Statistical Data Confidentiality
    • Trottini, M.1
  • 52
    • 0007251183 scopus 로고    scopus 로고
    • Re-identification methods for evaluating the confidentiality of analytically valid microdata
    • Winkler W.E. 1998. Re-identification methods for evaluating the confidentiality of analytically valid microdata. Research in Official Statistics, pp. 87-104.
    • (1998) Research in Official Statistics , pp. 87-104
    • Winkler, W.E.1
  • 53
    • 0031345518 scopus 로고    scopus 로고
    • Algorithm 778. L-BFGS-B: Fortran subroutines for Large-Scale bound constrained optimization
    • Zhu C., Byrd R.H., Lu P., and Nocedal J. 1997. Algorithm 778. L-BFGS-B: Fortran subroutines for Large-Scale bound constrained optimization. ACM Transactions on Mathematical Software 23(4): 550-560.
    • (1997) ACM Transactions on Mathematical Software , vol.23 , Issue.4 , pp. 550-560
    • Zhu, C.1    Byrd, R.H.2    Lu, P.3    Nocedal, J.4
  • 54
    • 0000806445 scopus 로고    scopus 로고
    • Minimax entropy principle and its application to texture modeling
    • Zhu S.C., Wu Y., and Mumford D. 1997. Minimax entropy principle and its application to texture modeling. Neural Computation 9: 1627-1660.
    • (1997) Neural Computation , vol.9 , pp. 1627-1660
    • Zhu, S.C.1    Wu, Y.2    Mumford, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.