-
1
-
-
0024914229
-
Security-control methods for statistical databases: a comparative study
-
Adam N.R., and Wortmann J.C. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys 21 4 (1989) 515-556
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
2
-
-
0034249441
-
Supply chain inventory management and the value of shared information
-
Cachon G., and Fisher M. Supply chain inventory management and the value of shared information. Management Science 46 8 (2000) 1032-1048
-
(2000)
Management Science
, vol.46
, Issue.8
, pp. 1032-1048
-
-
Cachon, G.1
Fisher, M.2
-
3
-
-
0035351891
-
Contracting to assure supply: how to share demand forecasts in a supply chain
-
Cachon G., and Lariviere M. Contracting to assure supply: how to share demand forecasts in a supply chain. Management Science 47 5 (2001) 629-646
-
(2001)
Management Science
, vol.47
, Issue.5
, pp. 629-646
-
-
Cachon, G.1
Lariviere, M.2
-
4
-
-
0032677415
-
Competitive and cooperative inventory policies in a 2 stage supply chain
-
Cachon G., and Zipkin P. Competitive and cooperative inventory policies in a 2 stage supply chain. Management Science 45 7 (1999) 936-953
-
(1999)
Management Science
, vol.45
, Issue.7
, pp. 936-953
-
-
Cachon, G.1
Zipkin, P.2
-
7
-
-
33747793767
-
Planning for privacy
-
Cline K. Planning for privacy. Banking Strategies 76 6 (2000) 110
-
(2000)
Banking Strategies
, vol.76
, Issue.6
, pp. 110
-
-
Cline, K.1
-
8
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
Dalenius T. Towards a methodology for statistical disclosure control. Statistisktidskrift 5 1 (1977) 429-444
-
(1977)
Statistisktidskrift
, vol.5
, Issue.1
, pp. 429-444
-
-
Dalenius, T.1
-
9
-
-
0020779363
-
Inference control for statistical databases
-
Denning D.E., and Schlorer R.J. Inference control for statistical databases. Computer 16 7 (1983) 69-82
-
(1983)
Computer
, vol.16
, Issue.7
, pp. 69-82
-
-
Denning, D.E.1
Schlorer, R.J.2
-
10
-
-
33747807063
-
There's gold in the databases
-
DePompa B. There's gold in the databases. Information Week (1996 (January 8)) 54
-
(1996)
Information Week
, pp. 54
-
-
DePompa, B.1
-
11
-
-
4344686171
-
Record matching in data warehouses: a decision model for data consolidation
-
Dey D. Record matching in data warehouses: a decision model for data consolidation. Operations Research 51 2 (2003) 240-255
-
(2003)
Operations Research
, vol.51
, Issue.2
, pp. 240-255
-
-
Dey, D.1
-
12
-
-
33747755186
-
-
D. Dey, V. Mookerjee, Techniques for efficient record linkage in heterogeneous databases, Working paper (2003).
-
-
-
-
13
-
-
0032182242
-
A probabilistic decision model for entity matching in heterogeneous databases
-
Dey D., Sarkar S., and De P. A probabilistic decision model for entity matching in heterogeneous databases. Management Science 44 10 (1998) 1379-1395
-
(1998)
Management Science
, vol.44
, Issue.10
, pp. 1379-1395
-
-
Dey, D.1
Sarkar, S.2
De, P.3
-
15
-
-
2242464139
-
Optimal disclosure limitation strategy in statistical databases: deterring tracker attacks through additive noise
-
Duncan G.T., and Mukherjee S. Optimal disclosure limitation strategy in statistical databases: deterring tracker attacks through additive noise. Journal of the American Statistical Association 95 3 (2000) 720-729
-
(2000)
Journal of the American Statistical Association
, vol.95
, Issue.3
, pp. 720-729
-
-
Duncan, G.T.1
Mukherjee, S.2
-
16
-
-
84972531331
-
Enhancing access to microdata while protecting confidentiality: prospects for the future
-
Duncan G.T., and Pearson R.W. Enhancing access to microdata while protecting confidentiality: prospects for the future. Statistical Science 6 3 (1991) 219-239
-
(1991)
Statistical Science
, vol.6
, Issue.3
, pp. 219-239
-
-
Duncan, G.T.1
Pearson, R.W.2
-
17
-
-
33747778439
-
-
G.T. Duncan, R. Krishnan, R. Padman, S.F. Roehrig, Exact and heuristic methods for cell suppression in multi-dimensional linked tables, NISS Technical Report (2004).
-
-
-
-
18
-
-
0033349024
-
Disclosure detection in multivariate categorical databases: auditing confidentiality protection through two new matrix operators
-
Dutta Chowdhury S., Duncan G.T., Krishnan R., Roehrig S.F., and Mukherjee S. Disclosure detection in multivariate categorical databases: auditing confidentiality protection through two new matrix operators. Management Science 45 12 (1999) 1710-1723
-
(1999)
Management Science
, vol.45
, Issue.12
, pp. 1710-1723
-
-
Dutta Chowdhury, S.1
Duncan, G.T.2
Krishnan, R.3
Roehrig, S.F.4
Mukherjee, S.5
-
20
-
-
33747796725
-
Confidentiality and data protection through disclosure limitation: evolving principles and technical advances
-
Fienberg S.E. Confidentiality and data protection through disclosure limitation: evolving principles and technical advances. Philippine Statistician 49 1-4 (2000) 1-12
-
(2000)
Philippine Statistician
, vol.49
, Issue.1-4
, pp. 1-12
-
-
Fienberg, S.E.1
-
21
-
-
0000432739
-
Disclosure limitation using perturbation and related methods for categorical data
-
Fienberg S.E., Makov U.E., and Steele R.J. Disclosure limitation using perturbation and related methods for categorical data. Journal of Official Statistics 14 2 (1998) 347-360
-
(1998)
Journal of Official Statistics
, vol.14
, Issue.2
, pp. 347-360
-
-
Fienberg, S.E.1
Makov, U.E.2
Steele, R.J.3
-
22
-
-
33747773896
-
-
GAO, The Challenge of Data Sharing: Results of a GAO-sponsored Symposium on Benefit and Loan programs, United States General Accounting Office Report, GAO-01-67 (2000) (http://www.gao.gov/new.items/d0167.pdf).
-
-
-
-
23
-
-
33747760794
-
-
GAO, Record Linkage and Privacy: Issues in Creating New Federal Research and Statistical Information, United States General Accounting Office Report, GAO-01-126SP (2001) (http://www.gao.gov/new.items/d01126sp.pdf).
-
-
-
-
24
-
-
0036602405
-
Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
-
Garfinkel R., Gopal R., and Goes P. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Science 48 6 (2002) 749-764
-
(2002)
Management Science
, vol.48
, Issue.6
, pp. 749-764
-
-
Garfinkel, R.1
Gopal, R.2
Goes, P.3
-
25
-
-
0032665038
-
Value of information in capacitated supply chains
-
Gavirneni S., Kapuscinski R., and Tayur S. Value of information in capacitated supply chains. Management Science 45 1 (1999) 16-24
-
(1999)
Management Science
, vol.45
, Issue.1
, pp. 16-24
-
-
Gavirneni, S.1
Kapuscinski, R.2
Tayur, S.3
-
26
-
-
0039147548
-
Prospects for operations research in the e-business era
-
Geoffrion A.M., and Krishnan R. Prospects for operations research in the e-business era. Interface 31 2 (2001) 6-36
-
(2001)
Interface
, vol.31
, Issue.2
, pp. 6-36
-
-
Geoffrion, A.M.1
Krishnan, R.2
-
27
-
-
0000328477
-
Interval protection of confidential information in a database
-
Gopal R., Goes P., and Garfinkel R. Interval protection of confidential information in a database. INFORMS Journal on Computing 10 3 (1998) 552-571
-
(1998)
INFORMS Journal on Computing
, vol.10
, Issue.3
, pp. 552-571
-
-
Gopal, R.1
Goes, P.2
Garfinkel, R.3
-
28
-
-
0036563104
-
Confidentiality via camouflage: the CVC approach to disclosure limitation when answering queries to databases
-
Gopal R., Garfinkel R., and Goes P. Confidentiality via camouflage: the CVC approach to disclosure limitation when answering queries to databases. Operations Research 50 3 (2002) 501-516
-
(2002)
Operations Research
, vol.50
, Issue.3
, pp. 501-516
-
-
Gopal, R.1
Garfinkel, R.2
Goes, P.3
-
30
-
-
28444435765
-
Some statistical problems in merging data files
-
Kadane J.B. Some statistical problems in merging data files. Journal of Official Statistics 17 3 (2001) 422-433
-
(2001)
Journal of Official Statistics
, vol.17
, Issue.3
, pp. 422-433
-
-
Kadane, J.B.1
-
31
-
-
0025493232
-
Controlled rounding for tabular data
-
Kelly J.P., Golden B.L., Assad A.J., and Baker E.K. Controlled rounding for tabular data. Operations Research 38 5 (1990) 760-772
-
(1990)
Operations Research
, vol.38
, Issue.5
, pp. 760-772
-
-
Kelly, J.P.1
Golden, B.L.2
Assad, A.J.3
Baker, E.K.4
-
32
-
-
33747791468
-
-
H. Lee, S. Whang, Information Sharing in a Supply Chain, Research Paper No. 1549, Graduate School of Business, Stanford University, 1998.
-
-
-
-
33
-
-
7444240746
-
Supply chain integration in the age of e-business
-
Lee H., and Whang S. Supply chain integration in the age of e-business. Supply Chain Management Review 3 3 (1999) 16-19
-
(1999)
Supply Chain Management Review
, vol.3
, Issue.3
, pp. 16-19
-
-
Lee, H.1
Whang, S.2
-
34
-
-
33747766245
-
-
H. Lee, S. Whang, Supply Chain Integration over the Internet, http://www.commerce.net/research/ebusiness-strategies/2k1/2k1_2k1_r.pdf (2001).
-
-
-
-
35
-
-
0033686633
-
The value of information sharing in a two-level supply chain
-
Lee H.S., So K.C., and Tang C.S. The value of information sharing in a two-level supply chain. Management Science 46 5 (2000) 626-643
-
(2000)
Management Science
, vol.46
, Issue.5
, pp. 626-643
-
-
Lee, H.S.1
So, K.C.2
Tang, C.S.3
-
36
-
-
33747775580
-
-
R.A. Moore, Controlled Data Swapping Techniques for Masking Public Use Microdata Files, Census Bureau Research Report Series (RR96-04) (1996).
-
-
-
-
37
-
-
0033207750
-
A general additive data perturbation method for database security
-
Muralidhar K., Parsa R., and Sarathy R. A general additive data perturbation method for database security. Management Science 45 10 (1999) 1399-1415
-
(1999)
Management Science
, vol.45
, Issue.10
, pp. 1399-1415
-
-
Muralidhar, K.1
Parsa, R.2
Sarathy, R.3
-
38
-
-
84976672368
-
The use of regression methodology for the compromise of confidential information in statistical databases
-
Palley M.A., and Simonoff J.S. The use of regression methodology for the compromise of confidential information in statistical databases. ACM Transactions on Database Systems 12 4 (1987) 593-608
-
(1987)
ACM Transactions on Database Systems
, vol.12
, Issue.4
, pp. 593-608
-
-
Palley, M.A.1
Simonoff, J.S.2
-
40
-
-
0012776989
-
Statistical disclosure limitation
-
Rubin D.B. Statistical disclosure limitation. Journal of Official Statistics 9 2 (1993) 461-468
-
(1993)
Journal of Official Statistics
, vol.9
, Issue.2
, pp. 461-468
-
-
Rubin, D.B.1
-
41
-
-
0036909696
-
The security of confidential numerical data in databases
-
Sarathy R., and Muralidhar K. The security of confidential numerical data in databases. Information Systems Research 13 4 (2002) 389-403
-
(2002)
Information Systems Research
, vol.13
, Issue.4
, pp. 389-403
-
-
Sarathy, R.1
Muralidhar, K.2
-
42
-
-
0036971583
-
Perturbing non-normal confidential attributes: the copula approach
-
Sarathy R., Muralidhar K., and Parsa R. Perturbing non-normal confidential attributes: the copula approach. Management Science 48 12 (2002) 1613-1627
-
(2002)
Management Science
, vol.48
, Issue.12
, pp. 1613-1627
-
-
Sarathy, R.1
Muralidhar, K.2
Parsa, R.3
-
43
-
-
0002517564
-
Measuring success
-
(Internet/Web/Online Service Information)
-
Schonberg E., Cofino T., Hoch R., Podlaseck M., and Spraragen S.L. Measuring success. Communications of the ACM 43 8 (2000) 53 (Internet/Web/Online Service Information)
-
(2000)
Communications of the ACM
, vol.43
, Issue.8
, pp. 53
-
-
Schonberg, E.1
Cofino, T.2
Hoch, R.3
Podlaseck, M.4
Spraragen, S.L.5
-
44
-
-
33747763387
-
-
G.R. Simpson, Census Bureau Blurs Data to Keep Names Confidential, Wall Street Journal Online (http://www.wsj.com) (Feb. 14, 2001).
-
-
-
-
45
-
-
0027805822
-
Privacy policies and practices: inside the organizational maze
-
Smith H.J. Privacy policies and practices: inside the organizational maze. Communications of the ACM 36 12 (1993) 105-122
-
(1993)
Communications of the ACM
, vol.36
, Issue.12
, pp. 105-122
-
-
Smith, H.J.1
|