메뉴 건너뛰기




Volumn 95, Issue 451, 2000, Pages 916-928

Models and algorithms for optimizing cell suppression in tabular data with linear constraints

Author keywords

Confidentiality; Data protection; Integer linear programming; Polyhedral combinatorics; Statistical disclosure control

Indexed keywords


EID: 2242454277     PISSN: 01621459     EISSN: 1537274X     Source Type: Journal    
DOI: 10.1080/01621459.2000.10474282     Document Type: Article
Times cited : (32)

References (19)
  • 3
    • 0000082189 scopus 로고
    • Suppression Methodology and Statistical Disclosure Control
    • Cox, L. H. (1980), “Suppression Methodology and Statistical Disclosure Control,” Journal of the American Statistical Association, 75, 377-385.
    • (1980) Journal of the American Statistical Association , vol.75 , pp. 377-385
    • Cox, L.H.1
  • 4
    • 84924515134 scopus 로고
    • Network Models for Complementary Cell Suppression
    • Cox, L. H. (1995), “Network Models for Complementary Cell Suppression,” Journal of the American Statistical Association, 90, 1453-1462.
    • (1995) Journal of the American Statistical Association , vol.90 , pp. 1453-1462
    • Cox, L.H.1
  • 5
    • 0020815626 scopus 로고
    • Solving Large-Scale Zero-One Linear Programming Problems
    • Crowder, H. P.; Johnson, E. L., and Padberg, M. W. (1983), “Solving Large-Scale Zero-One Linear Programming Problems,” Operations Research, 31, 803-834.
    • (1983) Operations Research , vol.31 , pp. 803-834
    • Crowder, H.P.1    Johnson, E.L.2    Padberg, M.W.3
  • 9
    • 0008551538 scopus 로고    scopus 로고
    • Models and Algorithms for the 2-Dimensional Cell Suppression Problem in Statistical Disclosure Control
    • Fischetti, M., and Salazar, J. J. (1999), “Models and Algorithms for the 2-Dimensional Cell Suppression Problem in Statistical Disclosure Control,” Mathematical Programming, 84, 283-312.
    • (1999) Mathematical Programming , vol.84 , pp. 283-312
    • Fischetti, M.1    Salazar, J.J.2
  • 11
    • 0024019017 scopus 로고
    • A Graph Theoretic Approach to Statistical Data Security
    • Gusfield, D. (1988), “A Graph Theoretic Approach to Statistical Data Security,” SIAM Journal on Computing, 17, 552-571.
    • (1988) SIAM Journal on Computing , vol.17 , pp. 552-571
    • Gusfield, D.1
  • 12
    • 0030353658 scopus 로고    scopus 로고
    • Data Security Equals Graph Connectivity
    • Kao, M. Y. (1996), “Data Security Equals Graph Connectivity,” SIAM Journal on Discrete Mathematics, 9, 87-100.
    • (1996) SIAM Journal on Discrete Mathematics , vol.9 , pp. 87-100
    • Kao, M.Y.1
  • 14
    • 0000120975 scopus 로고
    • Cell Suppression: Disclosure Protection for Sensitive Tabular Data
    • Kelly, J. P., Golden, B. L., and Assad, A. A. (1992), “Cell Suppression: Disclosure Protection for Sensitive Tabular Data,” Networks, 22, 397-417.
    • (1992) Networks , vol.22 , pp. 397-417
    • Kelly, J.P.1    Golden, B.L.2    Assad, A.A.3
  • 16
    • 0026124209 scopus 로고
    • A Branch-and-Cut Algorithm for the Resolution of Large-Scale Symmetric Traveling Salesman Problems
    • Padberg, M., and Rinaldi, G. (1991), “A Branch-and-Cut Algorithm for the Resolution of Large-Scale Symmetric Traveling Salesman Problems,” SIAM Reviews, 33, 60-100.
    • (1991) SIAM Reviews , vol.33 , pp. 60-100
    • Padberg, M.1    Rinaldi, G.2
  • 18
    • 84974742458 scopus 로고
    • Automated Cell Suppression to Preserve Confidentiality of Business Statistics
    • Sande, G. (1984), “Automated Cell Suppression to Preserve Confidentiality of Business Statistics,” Statistical Journal of the United Nations ECE, 2, 33-41.
    • (1984) Statistical Journal of the United Nations ECE , vol.2 , pp. 33-41
    • Sande, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.