메뉴 건너뛰기




Volumn 42, Issue 1, 2006, Pages 204-220

Secure and useful data sharing

Author keywords

Confidentiality; Data sharing; E commerce; E government; Privacy

Indexed keywords

DATA PRIVACY; DATA TRANSFER; ELECTRONIC COMMERCE; ELECTRONIC COMMUNITIES; INTERNET; SOCIETIES AND INSTITUTIONS;

EID: 33747756443     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2004.10.013     Document Type: Article
Times cited : (27)

References (49)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: a comparative study
    • Adam N.R., and Wortmann J.C. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys 21 4 (1989) 515-556
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.C.2
  • 2
    • 0034249441 scopus 로고    scopus 로고
    • Supply chain inventory management and the value of shared information
    • Cachon G., and Fisher M. Supply chain inventory management and the value of shared information. Management Science 46 8 (2000) 1032-1048
    • (2000) Management Science , vol.46 , Issue.8 , pp. 1032-1048
    • Cachon, G.1    Fisher, M.2
  • 3
    • 0035351891 scopus 로고    scopus 로고
    • Contracting to assure supply: how to share demand forecasts in a supply chain
    • Cachon G., and Lariviere M. Contracting to assure supply: how to share demand forecasts in a supply chain. Management Science 47 5 (2001) 629-646
    • (2001) Management Science , vol.47 , Issue.5 , pp. 629-646
    • Cachon, G.1    Lariviere, M.2
  • 4
    • 0032677415 scopus 로고    scopus 로고
    • Competitive and cooperative inventory policies in a 2 stage supply chain
    • Cachon G., and Zipkin P. Competitive and cooperative inventory policies in a 2 stage supply chain. Management Science 45 7 (1999) 936-953
    • (1999) Management Science , vol.45 , Issue.7 , pp. 936-953
    • Cachon, G.1    Zipkin, P.2
  • 7
    • 33747793767 scopus 로고    scopus 로고
    • Planning for privacy
    • Cline K. Planning for privacy. Banking Strategies 76 6 (2000) 110
    • (2000) Banking Strategies , vol.76 , Issue.6 , pp. 110
    • Cline, K.1
  • 8
    • 0012793677 scopus 로고
    • Towards a methodology for statistical disclosure control
    • Dalenius T. Towards a methodology for statistical disclosure control. Statistisktidskrift 5 1 (1977) 429-444
    • (1977) Statistisktidskrift , vol.5 , Issue.1 , pp. 429-444
    • Dalenius, T.1
  • 9
    • 0020779363 scopus 로고
    • Inference control for statistical databases
    • Denning D.E., and Schlorer R.J. Inference control for statistical databases. Computer 16 7 (1983) 69-82
    • (1983) Computer , vol.16 , Issue.7 , pp. 69-82
    • Denning, D.E.1    Schlorer, R.J.2
  • 10
    • 33747807063 scopus 로고    scopus 로고
    • There's gold in the databases
    • DePompa B. There's gold in the databases. Information Week (1996 (January 8)) 54
    • (1996) Information Week , pp. 54
    • DePompa, B.1
  • 11
    • 4344686171 scopus 로고    scopus 로고
    • Record matching in data warehouses: a decision model for data consolidation
    • Dey D. Record matching in data warehouses: a decision model for data consolidation. Operations Research 51 2 (2003) 240-255
    • (2003) Operations Research , vol.51 , Issue.2 , pp. 240-255
    • Dey, D.1
  • 12
    • 33747755186 scopus 로고    scopus 로고
    • D. Dey, V. Mookerjee, Techniques for efficient record linkage in heterogeneous databases, Working paper (2003).
  • 13
    • 0032182242 scopus 로고    scopus 로고
    • A probabilistic decision model for entity matching in heterogeneous databases
    • Dey D., Sarkar S., and De P. A probabilistic decision model for entity matching in heterogeneous databases. Management Science 44 10 (1998) 1379-1395
    • (1998) Management Science , vol.44 , Issue.10 , pp. 1379-1395
    • Dey, D.1    Sarkar, S.2    De, P.3
  • 15
    • 2242464139 scopus 로고    scopus 로고
    • Optimal disclosure limitation strategy in statistical databases: deterring tracker attacks through additive noise
    • Duncan G.T., and Mukherjee S. Optimal disclosure limitation strategy in statistical databases: deterring tracker attacks through additive noise. Journal of the American Statistical Association 95 3 (2000) 720-729
    • (2000) Journal of the American Statistical Association , vol.95 , Issue.3 , pp. 720-729
    • Duncan, G.T.1    Mukherjee, S.2
  • 16
    • 84972531331 scopus 로고
    • Enhancing access to microdata while protecting confidentiality: prospects for the future
    • Duncan G.T., and Pearson R.W. Enhancing access to microdata while protecting confidentiality: prospects for the future. Statistical Science 6 3 (1991) 219-239
    • (1991) Statistical Science , vol.6 , Issue.3 , pp. 219-239
    • Duncan, G.T.1    Pearson, R.W.2
  • 17
    • 33747778439 scopus 로고    scopus 로고
    • G.T. Duncan, R. Krishnan, R. Padman, S.F. Roehrig, Exact and heuristic methods for cell suppression in multi-dimensional linked tables, NISS Technical Report (2004).
  • 18
    • 0033349024 scopus 로고    scopus 로고
    • Disclosure detection in multivariate categorical databases: auditing confidentiality protection through two new matrix operators
    • Dutta Chowdhury S., Duncan G.T., Krishnan R., Roehrig S.F., and Mukherjee S. Disclosure detection in multivariate categorical databases: auditing confidentiality protection through two new matrix operators. Management Science 45 12 (1999) 1710-1723
    • (1999) Management Science , vol.45 , Issue.12 , pp. 1710-1723
    • Dutta Chowdhury, S.1    Duncan, G.T.2    Krishnan, R.3    Roehrig, S.F.4    Mukherjee, S.5
  • 20
    • 33747796725 scopus 로고    scopus 로고
    • Confidentiality and data protection through disclosure limitation: evolving principles and technical advances
    • Fienberg S.E. Confidentiality and data protection through disclosure limitation: evolving principles and technical advances. Philippine Statistician 49 1-4 (2000) 1-12
    • (2000) Philippine Statistician , vol.49 , Issue.1-4 , pp. 1-12
    • Fienberg, S.E.1
  • 21
    • 0000432739 scopus 로고    scopus 로고
    • Disclosure limitation using perturbation and related methods for categorical data
    • Fienberg S.E., Makov U.E., and Steele R.J. Disclosure limitation using perturbation and related methods for categorical data. Journal of Official Statistics 14 2 (1998) 347-360
    • (1998) Journal of Official Statistics , vol.14 , Issue.2 , pp. 347-360
    • Fienberg, S.E.1    Makov, U.E.2    Steele, R.J.3
  • 22
    • 33747773896 scopus 로고    scopus 로고
    • GAO, The Challenge of Data Sharing: Results of a GAO-sponsored Symposium on Benefit and Loan programs, United States General Accounting Office Report, GAO-01-67 (2000) (http://www.gao.gov/new.items/d0167.pdf).
  • 23
    • 33747760794 scopus 로고    scopus 로고
    • GAO, Record Linkage and Privacy: Issues in Creating New Federal Research and Statistical Information, United States General Accounting Office Report, GAO-01-126SP (2001) (http://www.gao.gov/new.items/d01126sp.pdf).
  • 24
    • 0036602405 scopus 로고    scopus 로고
    • Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
    • Garfinkel R., Gopal R., and Goes P. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Science 48 6 (2002) 749-764
    • (2002) Management Science , vol.48 , Issue.6 , pp. 749-764
    • Garfinkel, R.1    Gopal, R.2    Goes, P.3
  • 25
    • 0032665038 scopus 로고    scopus 로고
    • Value of information in capacitated supply chains
    • Gavirneni S., Kapuscinski R., and Tayur S. Value of information in capacitated supply chains. Management Science 45 1 (1999) 16-24
    • (1999) Management Science , vol.45 , Issue.1 , pp. 16-24
    • Gavirneni, S.1    Kapuscinski, R.2    Tayur, S.3
  • 26
    • 0039147548 scopus 로고    scopus 로고
    • Prospects for operations research in the e-business era
    • Geoffrion A.M., and Krishnan R. Prospects for operations research in the e-business era. Interface 31 2 (2001) 6-36
    • (2001) Interface , vol.31 , Issue.2 , pp. 6-36
    • Geoffrion, A.M.1    Krishnan, R.2
  • 27
    • 0000328477 scopus 로고    scopus 로고
    • Interval protection of confidential information in a database
    • Gopal R., Goes P., and Garfinkel R. Interval protection of confidential information in a database. INFORMS Journal on Computing 10 3 (1998) 552-571
    • (1998) INFORMS Journal on Computing , vol.10 , Issue.3 , pp. 552-571
    • Gopal, R.1    Goes, P.2    Garfinkel, R.3
  • 28
    • 0036563104 scopus 로고    scopus 로고
    • Confidentiality via camouflage: the CVC approach to disclosure limitation when answering queries to databases
    • Gopal R., Garfinkel R., and Goes P. Confidentiality via camouflage: the CVC approach to disclosure limitation when answering queries to databases. Operations Research 50 3 (2002) 501-516
    • (2002) Operations Research , vol.50 , Issue.3 , pp. 501-516
    • Gopal, R.1    Garfinkel, R.2    Goes, P.3
  • 30
    • 28444435765 scopus 로고    scopus 로고
    • Some statistical problems in merging data files
    • Kadane J.B. Some statistical problems in merging data files. Journal of Official Statistics 17 3 (2001) 422-433
    • (2001) Journal of Official Statistics , vol.17 , Issue.3 , pp. 422-433
    • Kadane, J.B.1
  • 32
    • 33747791468 scopus 로고    scopus 로고
    • H. Lee, S. Whang, Information Sharing in a Supply Chain, Research Paper No. 1549, Graduate School of Business, Stanford University, 1998.
  • 33
    • 7444240746 scopus 로고    scopus 로고
    • Supply chain integration in the age of e-business
    • Lee H., and Whang S. Supply chain integration in the age of e-business. Supply Chain Management Review 3 3 (1999) 16-19
    • (1999) Supply Chain Management Review , vol.3 , Issue.3 , pp. 16-19
    • Lee, H.1    Whang, S.2
  • 34
    • 33747766245 scopus 로고    scopus 로고
    • H. Lee, S. Whang, Supply Chain Integration over the Internet, http://www.commerce.net/research/ebusiness-strategies/2k1/2k1_2k1_r.pdf (2001).
  • 35
    • 0033686633 scopus 로고    scopus 로고
    • The value of information sharing in a two-level supply chain
    • Lee H.S., So K.C., and Tang C.S. The value of information sharing in a two-level supply chain. Management Science 46 5 (2000) 626-643
    • (2000) Management Science , vol.46 , Issue.5 , pp. 626-643
    • Lee, H.S.1    So, K.C.2    Tang, C.S.3
  • 36
    • 33747775580 scopus 로고    scopus 로고
    • R.A. Moore, Controlled Data Swapping Techniques for Masking Public Use Microdata Files, Census Bureau Research Report Series (RR96-04) (1996).
  • 37
    • 0033207750 scopus 로고    scopus 로고
    • A general additive data perturbation method for database security
    • Muralidhar K., Parsa R., and Sarathy R. A general additive data perturbation method for database security. Management Science 45 10 (1999) 1399-1415
    • (1999) Management Science , vol.45 , Issue.10 , pp. 1399-1415
    • Muralidhar, K.1    Parsa, R.2    Sarathy, R.3
  • 38
    • 84976672368 scopus 로고
    • The use of regression methodology for the compromise of confidential information in statistical databases
    • Palley M.A., and Simonoff J.S. The use of regression methodology for the compromise of confidential information in statistical databases. ACM Transactions on Database Systems 12 4 (1987) 593-608
    • (1987) ACM Transactions on Database Systems , vol.12 , Issue.4 , pp. 593-608
    • Palley, M.A.1    Simonoff, J.S.2
  • 40
    • 0012776989 scopus 로고
    • Statistical disclosure limitation
    • Rubin D.B. Statistical disclosure limitation. Journal of Official Statistics 9 2 (1993) 461-468
    • (1993) Journal of Official Statistics , vol.9 , Issue.2 , pp. 461-468
    • Rubin, D.B.1
  • 41
    • 0036909696 scopus 로고    scopus 로고
    • The security of confidential numerical data in databases
    • Sarathy R., and Muralidhar K. The security of confidential numerical data in databases. Information Systems Research 13 4 (2002) 389-403
    • (2002) Information Systems Research , vol.13 , Issue.4 , pp. 389-403
    • Sarathy, R.1    Muralidhar, K.2
  • 42
    • 0036971583 scopus 로고    scopus 로고
    • Perturbing non-normal confidential attributes: the copula approach
    • Sarathy R., Muralidhar K., and Parsa R. Perturbing non-normal confidential attributes: the copula approach. Management Science 48 12 (2002) 1613-1627
    • (2002) Management Science , vol.48 , Issue.12 , pp. 1613-1627
    • Sarathy, R.1    Muralidhar, K.2    Parsa, R.3
  • 44
    • 33747763387 scopus 로고    scopus 로고
    • G.R. Simpson, Census Bureau Blurs Data to Keep Names Confidential, Wall Street Journal Online (http://www.wsj.com) (Feb. 14, 2001).
  • 45
    • 0027805822 scopus 로고
    • Privacy policies and practices: inside the organizational maze
    • Smith H.J. Privacy policies and practices: inside the organizational maze. Communications of the ACM 36 12 (1993) 105-122
    • (1993) Communications of the ACM , vol.36 , Issue.12 , pp. 105-122
    • Smith, H.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.