-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Adam, N. R., J. C. Wortmann. 1989. Security-control methods for statistical databases: A comparative study. ACM Comput. Surveys 21 515-556.
-
(1989)
ACM Comput. Surveys
, vol.21
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
3
-
-
33746711412
-
Approximation algorithms for k-anonymity
-
Aggarwal, C., T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, A. Zhu. 2005. Approximation algorithms for k-anonymity. J. Privacy Tech.
-
(2005)
J. Privacy Tech
-
-
Aggarwal, C.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
4
-
-
21844517925
-
Statistical disclosure in two-dimensional tables: General tables
-
Carvalho, F. D., N. Dellaert, M. S. Osorio. 1994. Statistical disclosure in two-dimensional tables: General tables. J. Amer. Statist. Assoc. 89 1547-1557.
-
(1994)
J. Amer. Statist. Assoc
, vol.89
, pp. 1547-1557
-
-
Carvalho, F.D.1
Dellaert, N.2
Osorio, M.S.3
-
5
-
-
0001147194
-
Application of transportation thoery to statistical problems
-
Causey, B. D., L. H. Cox, L. R. Ernst. 1985. Application of transportation thoery to statistical problems. J. Amer. Statist. Assoc. 80 909.
-
(1985)
J. Amer. Statist. Assoc
, vol.80
, pp. 909
-
-
Causey, B.D.1
Cox, L.H.2
Ernst, L.R.3
-
7
-
-
0033349024
-
Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators
-
Chowdhury, S. D., G. T. Duncan, R. Krishnan, S. F. Roehrig, S. Mukherjee. 1999. Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators. Management Sci. 45 1710-1723.
-
(1999)
Management Sci
, vol.45
, pp. 1710-1723
-
-
Chowdhury, S.D.1
Duncan, G.T.2
Krishnan, R.3
Roehrig, S.F.4
Mukherjee, S.5
-
8
-
-
0000082189
-
Suppression methodology and statistical disclosure control
-
Cox, L. H. 1980. Suppression methodology and statistical disclosure control. J. Amer. Statist. Assoc. 75 377-385.
-
(1980)
J. Amer. Statist. Assoc
, vol.75
, pp. 377-385
-
-
Cox, L.H.1
-
9
-
-
84876653615
-
-
Cox, L. H. 1992. Solving confidentiality protection problems in tabulations using network optimization: A network model for cell suppression in U.S. economic censuses. R. Mokken, ed. Internat. Sem. Statist. Confidentiality. Eurostat, Dublin, Ireland, 229-245.
-
Cox, L. H. 1992. Solving confidentiality protection problems in tabulations using network optimization: A network model for cell suppression in U.S. economic censuses. R. Mokken, ed. Internat. Sem. Statist. Confidentiality. Eurostat, Dublin, Ireland, 229-245.
-
-
-
-
10
-
-
20444440962
-
Assessing the risk of disclosure of confidential categorical data
-
J. M. Bernardo, M. J. Bayarri, J. O. Berger, A. P. Dawid, D. Heckerman, A. F. M. Smith, M. West, eds, Oxford University Press, Oxford, UK
-
Dobra, A., S. E. Fienberg, M. Trottini. 2003. Assessing the risk of disclosure of confidential categorical data. J. M. Bernardo, M. J. Bayarri, J. O. Berger, A. P. Dawid, D. Heckerman, A. F. M. Smith, M. West, eds. Bayesian Statistics 7. Oxford University Press, Oxford, UK, 125-144.
-
(2003)
Bayesian Statistics 7
, pp. 125-144
-
-
Dobra, A.1
Fienberg, S.E.2
Trottini, M.3
-
11
-
-
0036190566
-
Practical data-oriented microaggregation for statistical disclosure control
-
Domingo-Ferrer, J., J. M. Mateo-Sanz. 2002. Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans. Knowledge Data Engrg. 14(1) 189-201.
-
(2002)
IEEE Trans. Knowledge Data Engrg
, vol.14
, Issue.1
, pp. 189-201
-
-
Domingo-Ferrer, J.1
Mateo-Sanz, J.M.2
-
12
-
-
26944448516
-
Ordinal, continuous, and heterogeneous k-anonymity through microaggregation
-
Domingo-Ferrer, D., V. Torra. 2005. Ordinal, continuous, and heterogeneous k-anonymity through microaggregation. Data Mining Knowledge Discovery 11(2) 195-212.
-
(2005)
Data Mining Knowledge Discovery
, vol.11
, Issue.2
, pp. 195-212
-
-
Domingo-Ferrer, D.1
Torra, V.2
-
13
-
-
0011644131
-
Obtaining information while preserving privacy: A Markov perturbation method for tabular data
-
J. Domingo-Ferrer, ed, IDS Press, Amsterdam, The Netherlands
-
Duncan, G. T., S. Fienberg. 1999. Obtaining information while preserving privacy: A Markov perturbation method for tabular data. J. Domingo-Ferrer, ed. Statist. Data Protection (SDP 1998) Proc., IDS Press, Amsterdam, The Netherlands.
-
(1999)
Statist. Data Protection (SDP 1998) Proc
-
-
Duncan, G.T.1
Fienberg, S.2
-
14
-
-
34247510982
-
-
Working paper, Carnegie Mellon University, Pittsburgh, PA
-
Duncan, G., R. Krishnan, R. Padman, P. Reuther, S. Roehrig. 2003a. Exact and heuristic methods for cell suppression in multi-dimensional linked tables. Working paper, Carnegie Mellon University, Pittsburgh, PA.
-
(2003)
Exact and heuristic methods for cell suppression in multi-dimensional linked tables
-
-
Duncan, G.1
Krishnan, R.2
Padman, R.3
Reuther, P.4
Roehrig, S.5
-
15
-
-
0011583645
-
Disclosure risk vs. data utility: The R-U confidentiality map
-
Technical Report 2003-6, Heinz School of Public Policy and Management, Carnegie Mellon University, Pittsburgh, PA
-
Duncan, G. T., S. Keller-McNulty, S. L. Stokes. 2003b. Disclosure risk vs. data utility: The R-U confidentiality map. Technical Report 2003-6, Heinz School of Public Policy and Management, Carnegie Mellon University, Pittsburgh, PA.
-
(2003)
-
-
Duncan, G.T.1
Keller-McNulty, S.2
Stokes, S.L.3
-
16
-
-
0035410523
-
Solving the cell suppression on tabular data with linear constraints
-
Fischetti, M., J. Salazar. 2001. Solving the cell suppression on tabular data with linear constraints. Management Sci. 47 1008-1027.
-
(2001)
Management Sci
, vol.47
, pp. 1008-1027
-
-
Fischetti, M.1
Salazar, J.2
-
17
-
-
0036602405
-
Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
-
Garfinkel, R., R. D. Gopal, P. B. Goes. 2002. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Sci. 48 749-764.
-
(2002)
Management Sci
, vol.48
, pp. 749-764
-
-
Garfinkel, R.1
Gopal, R.D.2
Goes, P.B.3
-
20
-
-
0000328477
-
Interval protection of confidential information in a database
-
Gopal, R. D., P. B. Goes, R. Garfinkel. 1998. Interval protection of confidential information in a database. INFORMS J. Comput. 10 309-322.
-
(1998)
INFORMS J. Comput
, vol.10
, pp. 309-322
-
-
Gopal, R.D.1
Goes, P.B.2
Garfinkel, R.3
-
21
-
-
85041841273
-
-
Health Insurance Portability and Accountability Act (HIPAA). 1996.
-
Health Insurance Portability and Accountability Act (HIPAA). 1996.
-
-
-
-
25
-
-
33748519577
-
Privacy protection in data mining: A perturbation approach for categorical data
-
Li, X., S. Sarkar. 2006a. Privacy protection in data mining: A perturbation approach for categorical data. Inform. Systems Res. 17(3) 254-270.
-
(2006)
Inform. Systems Res
, vol.17
, Issue.3
, pp. 254-270
-
-
Li, X.1
Sarkar, S.2
-
26
-
-
33746873290
-
A tree-based perturbation approach for privacy-preserving data mining
-
Li, X., S. Sarkar. 2006b. A tree-based perturbation approach for privacy-preserving data mining. IEEE Trans. Knowledge Data Engrg. 18(9) 1278-1283.
-
(2006)
IEEE Trans. Knowledge Data Engrg
, vol.18
, Issue.9
, pp. 1278-1283
-
-
Li, X.1
Sarkar, S.2
-
27
-
-
25844456648
-
Maximizing accuracy of shared databases when concealing sensitive patterns
-
Menon, S., S. Sarkar, S. Mukherjee. 2005. Maximizing accuracy of shared databases when concealing sensitive patterns. Inform. Systems Res. 16(3) 256-270.
-
(2005)
Inform. Systems Res
, vol.16
, Issue.3
, pp. 256-270
-
-
Menon, S.1
Sarkar, S.2
Mukherjee, S.3
-
29
-
-
0000610330
-
Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach
-
Muralidhar, K., D. Batra, P. J. Kirs. 1995. Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach. Management Sci. 41 1549-1564.
-
(1995)
Management Sci
, vol.41
, pp. 1549-1564
-
-
Muralidhar, K.1
Batra, D.2
Kirs, P.J.3
-
31
-
-
85041851526
-
Guaranteeing anonymity when sharing medical data
-
Hanley & Belfus, Inc, Washington, D.C
-
Sweeney, L. 2002a. Guaranteeing anonymity when sharing medical data. Proc. J. Amer. Medical Inform. Assoc. Hanley & Belfus, Inc., Washington, D.C.
-
(2002)
Proc. J. Amer. Medical Inform. Assoc
-
-
Sweeney, L.1
-
32
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
Sweeney, L. 2002b. Achieving k-anonymity privacy protection using generalization and suppression. Internat. J. Uncertainty, Fuzziness Knowledge-Based Systems 10(5) 571-588.
-
(2002)
Internat. J. Uncertainty, Fuzziness Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
33
-
-
34247533165
-
-
United States General Accounting Office, Report to congressional requesters: Medical records privacy, February
-
United States General Accounting Office. 1999. Report to congressional requesters: Medical records privacy. (February).
-
(1999)
-
-
-
35
-
-
34247549101
-
ARGUS for statistical disclosure control
-
J. Domingo-Ferrer, ed, IDS Press, Amsterdam, The Netherlands
-
Willenborg, L., A. Hundepool. 1998. ARGUS for statistical disclosure control. J. Domingo-Ferrer, ed. Statist. Data Protection (SDP 1998) Proc., IDS Press, Amsterdam, The Netherlands.
-
(1998)
Statist. Data Protection (SDP 1998) Proc
-
-
Willenborg, L.1
Hundepool, A.2
-
36
-
-
34247490518
-
Using linear programming methodology for disclosure avoidance purposes
-
Statistical Research Division, Bureau of the Census, Washington, D.C
-
Zayatz, L. 1992. Using linear programming methodology for disclosure avoidance purposes. Research report, Statistical Research Division, Bureau of the Census, Washington, D.C.
-
(1992)
Research report
-
-
Zayatz, L.1
|