-
1
-
-
0011582276
-
Microdata protection through noise addition
-
Doyle P., Lane J.I., Theuwes J.M., and Zayatz L. (Eds.). Elsevier, Amsterdam
-
Abowd J.M. and Woodcock S.D. 2001. Microdata protection through noise addition. In: Doyle P., Lane J.I., Theuwes J.M., and Zayatz L. (Eds.), Confidentiality, Disclosure, and Data Access: Theory and Practical Application for Statistical Agencies. Elsevier, Amsterdam, pp. 215-277.
-
(2001)
Confidentiality, Disclosure, and Data Access: Theory and Practical Application for Statistical Agencies
, pp. 215-277
-
-
Abowd, J.M.1
Woodcock, S.D.2
-
3
-
-
0026303073
-
An adaptive algorithm for the approximate calculation of multiple integrals
-
Berntsen J., Espelid T.O., and Genz A. 1991a. An adaptive algorithm for the approximate calculation of multiple integrals. ACM Transactions on Mathematical Software 17(4): 437-451.
-
(1991)
ACM Transactions on Mathematical Software
, vol.17
, Issue.4
, pp. 437-451
-
-
Berntsen, J.1
Espelid, T.O.2
Genz, A.3
-
4
-
-
0026263188
-
Algorithm 698: DCUHRE: An adaptive multidimensional integration routine for a vector of integrals
-
Berntsen J., Espelid T.O., and Genz A. 1991b. Algorithm 698: DCUHRE: An adaptive multidimensional integration routine for a vector of integrals. ACM Transactions on Mathematical Software 17(4): 452-456.
-
(1991)
ACM Transactions on Mathematical Software
, vol.17
, Issue.4
, pp. 452-456
-
-
Berntsen, J.1
Espelid, T.O.2
Genz, A.3
-
6
-
-
84949472056
-
Microdata protection through noise addition
-
Domingo-Ferrer J. (Ed.), Inference Control in Statistical Databases
-
Brand R. 2002. Microdata protection through noise addition. In: Domingo-Ferrer J. (Ed.), Inference Control in Statistical Databases. Vol. 2316 of Lecture Notes in Computer Science. Springer, pp. 97-116.
-
(2002)
Lecture Notes in Computer Science
, vol.2316
, pp. 97-116
-
-
Brand, R.1
-
7
-
-
0348093417
-
-
Personal communication
-
Burridge J. 2003a. Personal communication.
-
(2003)
-
-
Burridge, J.1
-
8
-
-
0347432367
-
Information preserving statistical obfuscation
-
This volume
-
Burridge J. 2003b. Information preserving statistical obfuscation. Statistics & Computing. This volume.
-
(2003)
Statistics & Computing
-
-
Burridge, J.1
-
9
-
-
0000732463
-
A limited memory algorithm for bound constrained optimization
-
Byrd R.H., Lu P., Nocedal J., and Zhu C. 1995. A limited memory algorithm for bound constrained optimization. SIAM Journal on Scientific Computing 16(5): 1190-1208.
-
(1995)
SIAM Journal on Scientific Computing
, vol.16
, Issue.5
, pp. 1190-1208
-
-
Byrd, R.H.1
Lu, P.2
Nocedal, J.3
Zhu, C.4
-
10
-
-
0039833377
-
Protecting confidentiality in business surveys
-
Cox B.G., Binder D.A., Chinnappa B.N., Christianson A., Colledge M.J., and Kott P.S. (Eds.). Wiley
-
Cox L.H. 1995. Protecting confidentiality in business surveys. In: Cox B.G., Binder D.A., Chinnappa B.N., Christianson A., Colledge M.J., and Kott P.S. (Eds.), Business Survey Methods. Wiley, pp. 443-473.
-
(1995)
Business Survey Methods
, pp. 443-473
-
-
Cox, L.H.1
-
11
-
-
0000546609
-
I-divergence geometry of probability distributions and minimization problems
-
Csiszár I. 1975. I-divergence geometry of probability distributions and minimization problems. The Annals of Probability 3: 146-158.
-
(1975)
The Annals of Probability
, vol.3
, pp. 146-158
-
-
Csiszár, I.1
-
12
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
Dalenius T. 1977. Towards a methodology for statistical disclosure control. Statistisk Tidskrift 3: 213-225.
-
(1977)
Statistisk Tidskrift
, vol.3
, pp. 213-225
-
-
Dalenius, T.1
-
13
-
-
84949476900
-
LHS-based hybrid microdata vs. rank swapping and microaggregation for numeric microdata protection
-
Domingo-Ferrer J. (Ed.), Inference Control in Statistical Databases. Springer
-
Dandekar R.A., Domingo-Ferrer J., and Sebé F. 2002. LHS-based hybrid microdata vs. rank swapping and microaggregation for numeric microdata protection. In: Domingo-Ferrer J. (Ed.), Inference Control in Statistical Databases. Vol. 2316 of Lecture Notes in Computer Science. Springer, pp. 153-162.
-
(2002)
Lecture Notes in Computer Science
, vol.2316
, pp. 153-162
-
-
Dandekar, R.A.1
Domingo-Ferrer, J.2
Sebé, F.3
-
15
-
-
84949463843
-
Sensitive micro data protection using Latin Hypercube Sampling technique
-
Domingo-Ferrer J. (Ed.), Inference Control in Statistical Databases. Springer
-
Dandekar R., Cohen M., and Kirkendall N. 2002. Sensitive micro data protection using Latin Hypercube Sampling technique. In: Domingo-Ferrer J. (Ed.), Inference Control in Statistical Databases. Vol. 2316 of Lecture Notes in Computer Science. Springer, pp. 117-125.
-
(2002)
Lecture Notes in Computer Science
, vol.2316
, pp. 117-125
-
-
Dandekar, R.1
Cohen, M.2
Kirkendall, N.3
-
17
-
-
2242464139
-
Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise
-
Duncan G.T. and Mukherjee S. 2000. Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise. Journal of the American Statistical Association 95: 720-729.
-
(2000)
Journal of the American Statistical Association
, vol.95
, pp. 720-729
-
-
Duncan, G.T.1
Mukherjee, S.2
-
18
-
-
0000432739
-
Disclosure limitation using perturbation and related methods for categorical data
-
with discussion
-
Fienberg S.E., Makov U., and Steele R.J. 1998. Disclosure limitation using perturbation and related methods for categorical data. Journal of Official Statistics 14: 485-502. (with discussion).
-
(1998)
Journal of Official Statistics
, vol.14
, pp. 485-502
-
-
Fienberg, S.E.1
Makov, U.2
Steele, R.J.3
-
21
-
-
0347432361
-
Spatial and non-spatial model-based protection procedures for the release of business microdata
-
This volume
-
Franconi L. and Stander J. 2003. Spatial and non-spatial model-based protection procedures for the release of business microdata. Statistics & Computing. This volume.
-
(2003)
Statistics & Computing
-
-
Franconi, L.1
Stander, J.2
-
22
-
-
0346202086
-
An application of information theory to the problem of statistical disclosure
-
Frank O. 1978. An application of information theory to the problem of statistical disclosure. Journal of Statistical Planning and Inference 2(2): 143-152.
-
(1978)
Journal of Statistical Planning and Inference
, vol.2
, Issue.2
, pp. 143-152
-
-
Frank, O.1
-
23
-
-
0000247137
-
Estimation and optimization of functions
-
Gilks W.R., Richardson S., and Spiegelhalter D.J.E. (Eds.). Chapman & Hall, London
-
Geyer C.J. 1996. Estimation and optimization of functions. In: Gilks W.R., Richardson S., and Spiegelhalter D.J.E. (Eds.), Markov chain Monte Carlo in Practice. Chapman & Hall, London, pp. 241-258.
-
(1996)
Markov Chain Monte Carlo in Practice
, pp. 241-258
-
-
Geyer, C.J.1
-
24
-
-
0348033719
-
Safe dissemination of census results by means of interactive probabilistic models
-
Crete
-
Grim J., Boček P., and Pudil P. 2001. Safe dissemination of census results by means of interactive probabilistic models. ETK-NTTS 2001 Pre-proceedings of the Conference. Crete, pp. 849-856.
-
(2001)
ETK-NTTS 2001 Pre-proceedings of the Conference
, pp. 849-856
-
-
Grim, J.1
Boček, P.2
Pudil, P.3
-
26
-
-
24244475952
-
Strong entropy concentration, game theory, coding and randomness
-
Eurandom, Eindhoven
-
Grünwald P.D. 2001. Strong entropy concentration, game theory, coding and randomness. Technical Report 2001-010. Eurandom, Eindhoven.
-
(2001)
Technical Report
, vol.2001
, Issue.10
-
-
Grünwald, P.D.1
-
27
-
-
77956890234
-
Monte Carlo sampling methods using Markov chains and their applications
-
Hastings W.K. 1970. Monte Carlo sampling methods using Markov chains and their applications. Biometrika 57: 97-109.
-
(1970)
Biometrika
, vol.57
, pp. 97-109
-
-
Hastings, W.K.1
-
29
-
-
11944275853
-
Information theory and statistical mechanics II
-
Jaynes E.T. 1957. Information theory and statistical mechanics II. Physical Review 108: 171-190.
-
(1957)
Physical Review
, vol.108
, pp. 171-190
-
-
Jaynes, E.T.1
-
33
-
-
0346832671
-
Comment on "Disclosure limitation using perturbation and related methods for categorical data"
-
Kooiman P. 1998. Comment on "Disclosure limitation using perturbation and related methods for categorical data." Journal of Official Statistics 14: 503-508.
-
(1998)
Journal of Official Statistics
, vol.14
, pp. 503-508
-
-
Kooiman, P.1
-
36
-
-
5744249209
-
Equations of state calculations by fast computing machines
-
Metropolis N., Rosenbluth A.W., Rosenbluth M.N., Teller A.H., and Teller E. 1953. Equations of state calculations by fast computing machines. Journal of Chemical Physics 21: 1087-1092.
-
(1953)
Journal of Chemical Physics
, vol.21
, pp. 1087-1092
-
-
Metropolis, N.1
Rosenbluth, A.W.2
Rosenbluth, M.N.3
Teller, A.H.4
Teller, E.5
-
37
-
-
0033207750
-
A general additive data perturbation method for database security
-
Muralidhar K., Parsa R., and Sarathy R. 1999. A general additive data perturbation method for database security. Management Science 45: 1399-1415.
-
(1999)
Management Science
, vol.45
, pp. 1399-1415
-
-
Muralidhar, K.1
Parsa, R.2
Sarathy, R.3
-
39
-
-
84949443947
-
Model based disclosure protection
-
Domingo-Ferrer J. (Ed.), Inference Control in Statistical Databases. Springer
-
Polettini S., Franconi L., and Stander J. 2002. Model based disclosure protection. In: Domingo-Ferrer J. (Ed.), Inference Control in Statistical Databases. Vol. 2316 of Lecture Notes in Computer Science. Springer, pp. 83-96.
-
(2002)
Lecture Notes in Computer Science
, vol.2316
, pp. 83-96
-
-
Polettini, S.1
Franconi, L.2
Stander, J.3
-
43
-
-
0348093384
-
Methods of inference for partially synthetic, public use data sets
-
Institute of Statistics and Decision Sciences, Duke University, Durham, NC
-
Reiter J.P. 2002a. Methods of inference for partially synthetic, public use data sets. Technical report. Institute of Statistics and Decision Sciences, Duke University, Durham, NC.
-
(2002)
Technical Report
-
-
Reiter, J.P.1
-
44
-
-
0346832672
-
Protecting confidentiality by releasing synthetic, public use microdata
-
Institute of Statistics and Decision Sciences. Duke University, Durham, NC
-
Reiter J.P. 2002b. Protecting confidentiality by releasing synthetic, public use microdata. Technical report. Institute of Statistics and Decision Sciences. Duke University, Durham, NC.
-
(2002)
Technical Report
-
-
Reiter, J.P.1
-
45
-
-
0346202092
-
Model diagnostics for remote access servers
-
This volume
-
Reiter J.P. 2003. Model diagnostics for remote access servers. Statistics & Computing. This volume
-
(2003)
Statistics & Computing
-
-
Reiter, J.P.1
-
47
-
-
0012776989
-
Discussion of "Statistical disclosure limitation"
-
Rubin D.B. 1993. Discussion of "Statistical disclosure limitation". Journal of Official Statistics 9: 461-468.
-
(1993)
Journal of Official Statistics
, vol.9
, pp. 461-468
-
-
Rubin, D.B.1
-
48
-
-
0036971583
-
Perturbing nonnormal confidential attributes: The copula approach
-
Sarathy R., Muralidhar K., and Parsa R. 2002. Perturbing nonnormal confidential attributes: The copula approach. Management Science 48: 1613-1627.
-
(2002)
Management Science
, vol.48
, pp. 1613-1627
-
-
Sarathy, R.1
Muralidhar, K.2
Parsa, R.3
-
49
-
-
0346801842
-
Remote access systems for statistical analysis of microdata
-
This volume
-
Schouten B. and Cigrang M. 2003. Remote access systems for statistical analysis of microdata. Statistics & Computing. This volume.
-
(2003)
Statistics & Computing
-
-
Schouten, B.1
Cigrang, M.2
-
50
-
-
0346202090
-
Assessing disclosure risk and data utility: A multiple objectives decision problem
-
Luxembourg, 7-9 April 2003
-
Trottini M. 2003. Assessing disclosure risk and data utility: A multiple objectives decision problem. Joint ECE/Eurostat work session on Statistical Data Confidentiality (Luxembourg, 7-9 April 2003).
-
(2003)
Joint ECE/Eurostat Work Session on Statistical Data Confidentiality
-
-
Trottini, M.1
-
52
-
-
0007251183
-
Re-identification methods for evaluating the confidentiality of analytically valid microdata
-
Winkler W.E. 1998. Re-identification methods for evaluating the confidentiality of analytically valid microdata. Research in Official Statistics, pp. 87-104.
-
(1998)
Research in Official Statistics
, pp. 87-104
-
-
Winkler, W.E.1
-
53
-
-
0031345518
-
Algorithm 778. L-BFGS-B: Fortran subroutines for Large-Scale bound constrained optimization
-
Zhu C., Byrd R.H., Lu P., and Nocedal J. 1997. Algorithm 778. L-BFGS-B: Fortran subroutines for Large-Scale bound constrained optimization. ACM Transactions on Mathematical Software 23(4): 550-560.
-
(1997)
ACM Transactions on Mathematical Software
, vol.23
, Issue.4
, pp. 550-560
-
-
Zhu, C.1
Byrd, R.H.2
Lu, P.3
Nocedal, J.4
-
54
-
-
0000806445
-
Minimax entropy principle and its application to texture modeling
-
Zhu S.C., Wu Y., and Mumford D. 1997. Minimax entropy principle and its application to texture modeling. Neural Computation 9: 1627-1660.
-
(1997)
Neural Computation
, vol.9
, pp. 1627-1660
-
-
Zhu, S.C.1
Wu, Y.2
Mumford, D.3
|