-
1
-
-
34748830177
-
-
Doyle P, Lane J, Theeuwes J, Zayatz L, editors, Confidentiality, disclosure and data access: theory and practical applications for statistical agencies, Amsterdam: Elsevier Science; 2001.
-
-
-
-
2
-
-
34748857215
-
-
Willenborg LCRJ, De Waal T. Statistical disclosure control in practice. Lecture notes in statistics, vol. 111, Springer; Berlin: 1996.
-
-
-
-
3
-
-
34748879256
-
-
Willenborg LCRJ, De Waal T. Elements of statistical disclosure control. Lecture notes in statistics, vol. 155, Springer; Berlin: 2001.
-
-
-
-
4
-
-
29844455635
-
Models and methods for the microdata protection problem
-
Hurkens C.A.J., and Tiourine S.R. Models and methods for the microdata protection problem. Journal of Official Statistics 14 4 (1998) 437-447
-
(1998)
Journal of Official Statistics
, vol.14
, Issue.4
, pp. 437-447
-
-
Hurkens, C.A.J.1
Tiourine, S.R.2
-
5
-
-
0042515066
-
Linear sensitivity measures and statistical disclosure control
-
Cox L.H. Linear sensitivity measures and statistical disclosure control. Journal of Statistical Planning and Inference 5 (1981) 153-164
-
(1981)
Journal of Statistical Planning and Inference
, vol.5
, pp. 153-164
-
-
Cox, L.H.1
-
8
-
-
26944441439
-
The invasion of privacy problem and statistics production. An overview
-
Dalenius T. The invasion of privacy problem and statistics production. An overview. Statistik Tidskrift 12 (1974) 213-225
-
(1974)
Statistik Tidskrift
, vol.12
, pp. 213-225
-
-
Dalenius, T.1
-
9
-
-
0011583242
-
Disclosure limitation methods in use: results of a survey
-
Doyle P., Lane J., Theeuwes J., and Zayatz L. (Eds), Elsevier Science, Amsterdam
-
Felsö F., Theeuwes J., and Wagner G.G. Disclosure limitation methods in use: results of a survey. In: Doyle P., Lane J., Theeuwes J., and Zayatz L. (Eds). Confidentiality, disclosure and data access: theory and practical applications for statistical agencies (2001), Elsevier Science, Amsterdam
-
(2001)
Confidentiality, disclosure and data access: theory and practical applications for statistical agencies
-
-
Felsö, F.1
Theeuwes, J.2
Wagner, G.G.3
-
10
-
-
0002670447
-
A decision-theoretic approach to data disclosure problem
-
Trottini M. A decision-theoretic approach to data disclosure problem. Research in Official Statistics 4 (2001) 7-22
-
(2001)
Research in Official Statistics
, vol.4
, pp. 7-22
-
-
Trottini, M.1
-
11
-
-
0000082189
-
Suppression methodology and statistical disclosure control
-
Cox L.H. Suppression methodology and statistical disclosure control. Journal of the American Statistical Association 75 (1980) 377-385
-
(1980)
Journal of the American Statistical Association
, vol.75
, pp. 377-385
-
-
Cox, L.H.1
-
12
-
-
84974742458
-
Automated cell suppression to preserve confidentiality of business statistics
-
Sande G. Automated cell suppression to preserve confidentiality of business statistics. Statistical Journal of the United Nations ECE 2 (1984) 33-41
-
(1984)
Statistical Journal of the United Nations ECE
, vol.2
, pp. 33-41
-
-
Sande, G.1
-
13
-
-
84949440059
-
-
Robertson DA, Ethier R. Cell suppression: experience and theory. In: Domingo-Ferrer J, editor, Inference control in statistical databases. Lecture notes in computer science, vol. 2316, 2002, p. 8-20.
-
-
-
-
14
-
-
34748814168
-
-
Kelly JP. Confidentiality protection in two and three-dimensional tables. PhD dissertation, University of Maryland, College Park, MD, 1990.
-
-
-
-
15
-
-
0000120975
-
Cell suppression: disclosure protection for sensitive tabular data
-
Kelly J.P., Golden B.L., and Assad A.A. Cell suppression: disclosure protection for sensitive tabular data. Networks 22 (1992) 397-417
-
(1992)
Networks
, vol.22
, pp. 397-417
-
-
Kelly, J.P.1
Golden, B.L.2
Assad, A.A.3
-
16
-
-
84949455490
-
-
Castro J. Network flows heuristics for complementary cell suppression: an empirical evaluation and extensions. In: Domingo-Ferrer J. (Ed.), Inference control in statistical databases. Lecture notes in computer science, vol. 2316, 2002, p. 59-73.
-
-
-
-
17
-
-
28044451474
-
-
Castro J. A fast network flows heuristic for cell suppression in positive tables. In: Domingo-Ferrer J, Torra V, editors, Privacy in statistical databases. Lecture notes in computer science, vol. 3050, 2004, p. 136-48.
-
-
-
-
18
-
-
56749085696
-
-
Castro J. A shortest paths heuristic for statistical disclosure control in positive tables. INFORMS Journal on Computing, 2006, to appear.
-
-
-
-
19
-
-
34748824804
-
-
De Silets L, Golden BL, Kumar R, Wang Q. A neural network model for cell suppression of tabular data. Proceeding of the international joint conference on neural networks, vol. III, Baltimore, Maryland, 1992, p. 203-214.
-
-
-
-
20
-
-
34748846723
-
-
Almeida MT, Schütz G, Carvalho FD. Statistical disclosure control: a genetic-based approach. Technical report, Centro de Investigaçao Operacional, Lisbon, 2005.
-
-
-
-
21
-
-
0031189118
-
Cell suppression methodology: the importance of suppressing marginal totals
-
Chu P.C. Cell suppression methodology: the importance of suppressing marginal totals. IEEE Transactions on Knowledge and Data Engineering 9 4 (1997) 513-523
-
(1997)
IEEE Transactions on Knowledge and Data Engineering
, vol.9
, Issue.4
, pp. 513-523
-
-
Chu, P.C.1
-
22
-
-
0024019017
-
A graph theoretic approach to statistical data security
-
Gusfield D. A graph theoretic approach to statistical data security. SIAM Journal on Computing 17 (1988) 552-571
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 552-571
-
-
Gusfield, D.1
-
23
-
-
0011190489
-
Efficient detection and protection of information in cross tabulated tables I: linear invariant test
-
Kao M.Y., and Gusfield D. Efficient detection and protection of information in cross tabulated tables I: linear invariant test. SIAM Journal on Discrete Mathematics 6 3 (1993) 460-476
-
(1993)
SIAM Journal on Discrete Mathematics
, vol.6
, Issue.3
, pp. 460-476
-
-
Kao, M.Y.1
Gusfield, D.2
-
26
-
-
0001272011
-
Approximation algorithms for several graph augmentation problems
-
Frederickson G.N., and Ja'Ja J. Approximation algorithms for several graph augmentation problems. SIAM Journal on Computing 10 2 (1981) 270-283
-
(1981)
SIAM Journal on Computing
, vol.10
, Issue.2
, pp. 270-283
-
-
Frederickson, G.N.1
Ja'Ja, J.2
-
27
-
-
0023399929
-
Optimal mixed graph augmentation
-
Gusfield D. Optimal mixed graph augmentation. SIAM Journal on Computing 16 4 (1987) 599-612
-
(1987)
SIAM Journal on Computing
, vol.16
, Issue.4
, pp. 599-612
-
-
Gusfield, D.1
-
28
-
-
0008551538
-
Models and algorithms for the 2-dimensional cell suppression problem in statistical disclosure control
-
Fischetti M., and Salazar J.J. Models and algorithms for the 2-dimensional cell suppression problem in statistical disclosure control. Mathematical Programming 84 (1999) 283-312
-
(1999)
Mathematical Programming
, vol.84
, pp. 283-312
-
-
Fischetti, M.1
Salazar, J.J.2
-
31
-
-
0342647299
-
Lower-bounding procedures for the 2-dimensional cell suppression problem
-
Carvalho F.D., and Almeida M.T. Lower-bounding procedures for the 2-dimensional cell suppression problem. European Journal of Operational Research 123 (2000) 29-41
-
(2000)
European Journal of Operational Research
, vol.123
, pp. 29-41
-
-
Carvalho, F.D.1
Almeida, M.T.2
-
32
-
-
13844316377
-
Exact disclosure prevention in 2-dimensional statistical tables
-
Almeida M.T., and Carvalho F.D. Exact disclosure prevention in 2-dimensional statistical tables. Computers & Operations Research 32 (2005) 2919-2936
-
(2005)
Computers & Operations Research
, vol.32
, pp. 2919-2936
-
-
Almeida, M.T.1
Carvalho, F.D.2
-
33
-
-
34748917447
-
-
Carvalho FD, Almeida MT. An integer approach for the cell suppression problem in two-dimensional statistical tables. Technical report #3-05, Centro de Investigaçao Operacional, Lisbon, 2005.
-
-
-
-
34
-
-
0001751897
-
Disclosure limitation methods and information loss for tabular data
-
Doyle P., Lane J., Theeuwes J., and Zayatz L. (Eds), Elsevier Science, Amsterdam
-
Duncan G.T., Fienberg S.E., Krishnan R., Padman R., and Roehrig S.F. Disclosure limitation methods and information loss for tabular data. In: Doyle P., Lane J., Theeuwes J., and Zayatz L. (Eds). Confidentiality, disclosure and data access: theory and practical applications for statistical agencies (2001), Elsevier Science, Amsterdam
-
(2001)
Confidentiality, disclosure and data access: theory and practical applications for statistical agencies
-
-
Duncan, G.T.1
Fienberg, S.E.2
Krishnan, R.3
Padman, R.4
Roehrig, S.F.5
-
35
-
-
0034710980
-
Bounds for cell entries in contigency tables given marginal totals and decomposable graphs
-
Dobra A., and Fienberg S.E. Bounds for cell entries in contigency tables given marginal totals and decomposable graphs. Proceedings of the National Academy of Sciences of the USA 97 (2000) 11885-11892
-
(2000)
Proceedings of the National Academy of Sciences of the USA
, vol.97
, pp. 11885-11892
-
-
Dobra, A.1
Fienberg, S.E.2
-
36
-
-
34748924868
-
-
Geurts J. Heuristics for cell suppression in tables. Technical report, Netherlands Central Bureau of Statistics, Voorburg, 1992.
-
-
-
-
37
-
-
0028380482
-
Three-dimensional statistical data security problems
-
Irving R.W., and Jerrum M.R. Three-dimensional statistical data security problems. SIAM Journal on Computing 23 1 (1994) 170-184
-
(1994)
SIAM Journal on Computing
, vol.23
, Issue.1
, pp. 170-184
-
-
Irving, R.W.1
Jerrum, M.R.2
-
38
-
-
0033238479
-
Statistical disclosure in general three-dimensional tables
-
Dellaert N.P., and Luijten W.A. Statistical disclosure in general three-dimensional tables. Statistica Neerlandica 53 (1999) 197-221
-
(1999)
Statistica Neerlandica
, vol.53
, pp. 197-221
-
-
Dellaert, N.P.1
Luijten, W.A.2
-
39
-
-
0035410523
-
Solving the cell suppression problem on tabular data with linear constraints
-
Fischetti M., and Salazar J.J. Solving the cell suppression problem on tabular data with linear constraints. Management Science 47 7 (2001) 1008-1026
-
(2001)
Management Science
, vol.47
, Issue.7
, pp. 1008-1026
-
-
Fischetti, M.1
Salazar, J.J.2
-
40
-
-
84949443341
-
-
De Wolf PP. HiTaS: a heuristic approach to cell suppression in hierarchical tables. In: Domingo-Ferrer J, editor, Inference control in statistical databases. Lecture notes in computer science, vol. 2316, 2002, p. 74-82.
-
-
-
-
41
-
-
0033349024
-
Disclosure detection in multivariate categorical databases: auditing confidentiality protection through two new matrix operators
-
Chowdhury S.D., Duncan G.T., Krishnan R., Roehrig S.F., and Mukherjee S. Disclosure detection in multivariate categorical databases: auditing confidentiality protection through two new matrix operators. Management Science 45 (1999) 1710-1723
-
(1999)
Management Science
, vol.45
, pp. 1710-1723
-
-
Chowdhury, S.D.1
Duncan, G.T.2
Krishnan, R.3
Roehrig, S.F.4
Mukherjee, S.5
-
42
-
-
34748882252
-
-
Roehrig SF, Padman R, Krishnan R, Duncan GT. Exact and heuristic methods for cell suppression in multi-dimensional linked tables. Technical report, 2004.
-
-
-
-
43
-
-
0347593826
-
Mathematical models for applying cell suppression methodology in statistical data protection
-
Salazar J.J. Mathematical models for applying cell suppression methodology in statistical data protection. European Journal of Operational Research 154 (2004) 740-754
-
(2004)
European Journal of Operational Research
, vol.154
, pp. 740-754
-
-
Salazar, J.J.1
-
44
-
-
34748867630
-
-
Buzzigoli L, Giusti A. An algorithm to calculate the lower and upper bounds of the elements of an array given its marginals. Proceedings of the statistical data protection conference, 1998, p. 131-47.
-
-
-
-
45
-
-
0035694218
-
Bounds for cell entries in contingency tables induced by fixed marginal totals
-
Dobra A., and Fienberg S.E. Bounds for cell entries in contingency tables induced by fixed marginal totals. Statistical Journal of the United Nations ECE 18 (2001) 363-371
-
(2001)
Statistical Journal of the United Nations ECE
, vol.18
, pp. 363-371
-
-
Dobra, A.1
Fienberg, S.E.2
-
46
-
-
84949443746
-
-
Cox LH. Bounds on entries in 3-dimensional contingency tables subject to given marginal totals. In: Domingo-Ferrer J, editor, Inference control in statistical databases, Lecture notes in computer science, vol. 2316, 2002, p. 21-33.
-
-
-
-
47
-
-
20444440962
-
Assessing the risk of disclosure of confidential categorical data
-
Bernardo J.M., Bayarri M.J., Berger J.O., Dawid A.P., Heckerman D., Smith A.F.M., and West M. (Eds), Oxford University Press, Oxford
-
Dobra A., Fienberg S.E., and Trottini M. Assessing the risk of disclosure of confidential categorical data. In: Bernardo J.M., Bayarri M.J., Berger J.O., Dawid A.P., Heckerman D., Smith A.F.M., and West M. (Eds). Bayesian statistics vol. 7 (2003), Oxford University Press, Oxford
-
(2003)
Bayesian statistics
, vol.7
-
-
Dobra, A.1
Fienberg, S.E.2
Trottini, M.3
-
48
-
-
0347432366
-
Preserving confidentiality of high-dimensional tabulated data: statistical and computational issues
-
Dobra A., Karr A.F., and Sanil A.P. Preserving confidentiality of high-dimensional tabulated data: statistical and computational issues. Statistics & Computing 13 4 (2003) 363-370
-
(2003)
Statistics & Computing
, vol.13
, Issue.4
, pp. 363-370
-
-
Dobra, A.1
Karr, A.F.2
Sanil, A.P.3
-
49
-
-
0036811137
-
Software systems for tabular data releases
-
Karr A.F., Dobra A., Sanil A.P., and Fienberg S.E. Software systems for tabular data releases. International Journal on Uncertainty Fuzziness and Knowledge-based Systems 10 5 (2002) 529-544
-
(2002)
International Journal on Uncertainty Fuzziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 529-544
-
-
Karr, A.F.1
Dobra, A.2
Sanil, A.P.3
Fienberg, S.E.4
-
50
-
-
34748900448
-
On necessary conditions for the existence of the solution to the multi-index transportation problem
-
Moravek J., and Vlach M. On necessary conditions for the existence of the solution to the multi-index transportation problem. Operations Research 15 (1967) 542-545
-
(1967)
Operations Research
, vol.15
, pp. 542-545
-
-
Moravek, J.1
Vlach, M.2
-
51
-
-
0022441612
-
Conditions for the existence of solutions of the three-dimensional planar transportation problem
-
Vlach M. Conditions for the existence of solutions of the three-dimensional planar transportation problem. Discrete Applied Mathematics 13 (1986) 61-78
-
(1986)
Discrete Applied Mathematics
, vol.13
, pp. 61-78
-
-
Vlach, M.1
-
52
-
-
0041505370
-
Controlled random rounding
-
Fellegi I.P. Controlled random rounding. Survey Methodology 1 (1975) 123-133
-
(1975)
Survey Methodology
, vol.1
, pp. 123-133
-
-
Fellegi, I.P.1
-
53
-
-
15044356955
-
Matrix rounding problem
-
Bacharach M. Matrix rounding problem. Management Science 9 (1966) 732-742
-
(1966)
Management Science
, vol.9
, pp. 732-742
-
-
Bacharach, M.1
-
54
-
-
0006500171
-
A simple procedure for controlled rounding
-
Dalenius T. A simple procedure for controlled rounding. Statistisk Tidskrift 3 (1981) 202-208
-
(1981)
Statistisk Tidskrift
, vol.3
, pp. 202-208
-
-
Dalenius, T.1
-
55
-
-
0042362844
-
Controlled rounding
-
Cox L.H., and Ernst L.R. Controlled rounding. INFOR 20 (1982) 423-432
-
(1982)
INFOR
, vol.20
, pp. 423-432
-
-
Cox, L.H.1
Ernst, L.R.2
-
56
-
-
77957065890
-
Applications of network optimization
-
Ball M.O., Magnanti T.L., Monma C.L., and Nemhauser G.L. (Eds), Elsevier, North-Holland, Amsterdam
-
Ahuja R.K., Magnanti T.L., Orlin J.B., and Reddy M.R. Applications of network optimization. In: Ball M.O., Magnanti T.L., Monma C.L., and Nemhauser G.L. (Eds). Handbooks in operations research & management science vol. 7 (1995), Elsevier, North-Holland, Amsterdam 1-83
-
(1995)
Handbooks in operations research & management science
, vol.7
, pp. 1-83
-
-
Ahuja, R.K.1
Magnanti, T.L.2
Orlin, J.B.3
Reddy, M.R.4
-
58
-
-
0042251080
-
Controlled rounding for tables with subtotals
-
Cox L.H., and George J.A. Controlled rounding for tables with subtotals. Annals of Operations Research 20 (1989) 141-157
-
(1989)
Annals of Operations Research
, vol.20
, pp. 141-157
-
-
Cox, L.H.1
George, J.A.2
-
59
-
-
0041750563
-
The controlled rounding problem: relaxations and complexity issues
-
Kelly J.P., Assad A.A., and Golden B.L. The controlled rounding problem: relaxations and complexity issues. OR Specktrum 12 (1990) 129-138
-
(1990)
OR Specktrum
, vol.12
, pp. 129-138
-
-
Kelly, J.P.1
Assad, A.A.2
Golden, B.L.3
-
61
-
-
34748886541
-
-
Fagan JT, Greenberg BV, Hemmig R. Controlled rounding of three dimensional tables. Bureau of the Census, Technical report census/SRD/RR-88/02, 1988.
-
-
-
-
62
-
-
0042251070
-
Using simulated annealing to solve controlled rounding problems
-
Kelly J.P., Golden B.L., and Assad A.A. Using simulated annealing to solve controlled rounding problems. ORSA Journal on Computing 2 (1990) 174-185
-
(1990)
ORSA Journal on Computing
, vol.2
, pp. 174-185
-
-
Kelly, J.P.1
Golden, B.L.2
Assad, A.A.3
-
63
-
-
21144463251
-
Large-scale controlled rounding using TABU search with strategic oscillation
-
Kelly J.P., Golden B.L., and Assad A.A. Large-scale controlled rounding using TABU search with strategic oscillation. Annals of Operations Research 41 (1993) 69-84
-
(1993)
Annals of Operations Research
, vol.41
, pp. 69-84
-
-
Kelly, J.P.1
Golden, B.L.2
Assad, A.A.3
-
65
-
-
27344440294
-
Computational experience with the controlled rounding problem in statistical disclosure control
-
Fischetti M., and Salazar J.J. Computational experience with the controlled rounding problem in statistical disclosure control. Journal of Official Statistics 14 4 (1998) 553-565
-
(1998)
Journal of Official Statistics
, vol.14
, Issue.4
, pp. 553-565
-
-
Fischetti, M.1
Salazar, J.J.2
-
66
-
-
29044443601
-
Controlled rounding and cell perturbation: statistical disclosure limitation methods for tabular data
-
Salazar J.J. Controlled rounding and cell perturbation: statistical disclosure limitation methods for tabular data. Mathematical Programming 105 (2006) 583-603
-
(2006)
Mathematical Programming
, vol.105
, pp. 583-603
-
-
Salazar, J.J.1
-
67
-
-
35048868813
-
-
Salazar JJ, Lowthian P, Young C, Merola G, Bond S, Brown D. Getting the best results in controlled rounding with the least effort. In: Domingo-Ferrer J, Torra V, editors, Privacy in statistical databases. Lecture notes in computer science, vol. 3050, 2004, p. 58-72.
-
-
-
-
68
-
-
34748878699
-
-
Salazar JJ, Bycroft C, Toniolo A. The controlled rounding implementation. Monographs of official statistics, Eurostat, 2005.
-
-
-
-
69
-
-
35048825711
-
-
Salazar JJ, Schoch M. A new tool for applying controlled rounding to a statistical table in microsoft excel. In: Domingo-Ferrer J, Torra, V, editors, Privacy in statistical databases, Lecture notes in computer science, vol. 3050, 2004, p. 44-57.
-
-
-
-
70
-
-
0001445186
-
A constructive procedure for unbiased controlled rounding
-
Cox L.H. A constructive procedure for unbiased controlled rounding. Journal of the American Statistical Association 82 (1987) 520-524
-
(1987)
Journal of the American Statistical Association
, vol.82
, pp. 520-524
-
-
Cox, L.H.1
-
71
-
-
84958948527
-
-
Salazar JJ. A New Approach to Round Tabular Data. In: Domingo-Ferrer J, Franconi L, editors, PSD 2006. Lecture Notes in Computer Science, vol. 4302, 2006, p. 25-34.
-
-
-
-
72
-
-
27344442736
-
Using noise for disclosure limitation of establishment tabular data
-
Evans T., Zayatz L., and Slanta J. Using noise for disclosure limitation of establishment tabular data. Journal of Official Statistics 14 4 (1998) 537-551
-
(1998)
Journal of Official Statistics
, vol.14
, Issue.4
, pp. 537-551
-
-
Evans, T.1
Zayatz, L.2
Slanta, J.3
-
73
-
-
0000432739
-
Disclosure limitation using perturbation and related methods for categorical data
-
Fienberg S.E., Makov U.E., and Steele R.J. Disclosure limitation using perturbation and related methods for categorical data. Journal of Official Statistics 14 4 (1998) 485-502
-
(1998)
Journal of Official Statistics
, vol.14
, Issue.4
, pp. 485-502
-
-
Fienberg, S.E.1
Makov, U.E.2
Steele, R.J.3
-
74
-
-
0346801841
-
A theoretical basis for perturbation methods
-
Muralidhar K., and Sarathy R. A theoretical basis for perturbation methods. Statistics and Computing 13 (2003) 329-335
-
(2003)
Statistics and Computing
, vol.13
, pp. 329-335
-
-
Muralidhar, K.1
Sarathy, R.2
-
75
-
-
34748849094
-
-
Fienberg SE, Steele RJ, Makov UE. Statistical notions of data disclosure avoidance and their relationship to traditional statistical methodology: data swapping and log-linear models. Proceedings of bureau of the census 1996 annual research conference, Washington, DC, 1996.
-
-
-
-
77
-
-
34748832691
-
-
Duncan GT, Fienberg SE. Obtaining information while preserving privacy: a Markov perturbation method for tabular data. Proceedings of the statistical data protection conference, 1998, p. 351-62.
-
-
-
-
78
-
-
34748854137
-
-
Duncan GT, Roehrig S. Cyclic perturbation: protecting confidentiality while preserving data utility in tabular data. Technical report, 2004.
-
-
-
-
79
-
-
0345832325
-
Partial cell suppression: a new methodology for statistical disclosure control
-
Fischetti M., and Salazar J.J. Partial cell suppression: a new methodology for statistical disclosure control. Statistics and Computing 13 1 (2003) 13-21
-
(2003)
Statistics and Computing
, vol.13
, Issue.1
, pp. 13-21
-
-
Fischetti, M.1
Salazar, J.J.2
-
80
-
-
27344440542
-
A unified mathematical programming framework for different statistical disclosure limitation methods
-
Salazar J.J. A unified mathematical programming framework for different statistical disclosure limitation methods. Operations Research 53 (2005) 819-829
-
(2005)
Operations Research
, vol.53
, pp. 819-829
-
-
Salazar, J.J.1
-
81
-
-
34748852956
-
-
Dandekar RA, Cox LH. Synthetic tabular data: an alternative to complementary cell suppression for disclosure limitation of tabular data. Technical report, 2002.
-
-
-
-
82
-
-
34748896428
-
-
Dandekar RA. Cost effective implementation of synthetic tabulation (a.k.a. controlled tabular adjustments) in legacy and new statistical data publication systems. Joint ECE/Eurostat work session on statistical data confidentiality, Luxembourg, 2003.
-
-
-
-
83
-
-
29044448905
-
-
Dandekar RA. Maximum utility-minimum information loss table server design for statistical disclosure control of tabular data. In: Domingo-Ferrer J, Torra V, editors, Privacy in statistical databases, Lecture notes in computer science, vol. 3050, 2004, p. 121-35.
-
-
-
-
84
-
-
35048868331
-
-
Cox LH, Kelly JP, Patil R. Balancing quality and confidentiality for multivariate tabular data. In: Domingo-Ferrer J, Torra V, editors, Privacy in statistical databases, Lecture notes in computer science, vol. 3050, 2004, p. 87-98.
-
-
-
-
85
-
-
34748816651
-
-
Wang X, Golden B, Wasil E. Achieving controlled tabular adjustment using genetic algorithms. INFORMS computing society conference, Annapolis, January 2005.
-
-
-
-
86
-
-
28044456017
-
-
Castro J. Computational experiments with minimum-distance controlled perturbation methods. In: Domingo-Ferrer J, Torra V, editors, Privacy in statistical databases, Lecture notes in computer science, vol. 3050, 2004, p. 73-86.
-
-
-
-
87
-
-
15044349954
-
Quadratic interior-point methods in statistical disclosure control
-
Castro J. Quadratic interior-point methods in statistical disclosure control. Computational Management Science 2 (2005) 107-121
-
(2005)
Computational Management Science
, vol.2
, pp. 107-121
-
-
Castro, J.1
-
88
-
-
28044467158
-
Minimum-distance controlled perturbation methods for large-scale tabular data protection
-
Castro J. Minimum-distance controlled perturbation methods for large-scale tabular data protection. European Journal of Operational Research 171 (2006) 39-52
-
(2006)
European Journal of Operational Research
, vol.171
, pp. 39-52
-
-
Castro, J.1
-
89
-
-
4544288856
-
The complexity of three-way statistical tables
-
De Loera J., and Onn S. The complexity of three-way statistical tables. SIAM Journal on Computing 33 (2004) 819-836
-
(2004)
SIAM Journal on Computing
, vol.33
, pp. 819-836
-
-
De Loera, J.1
Onn, S.2
-
90
-
-
0036865863
-
Gröbner bases and polyhedral geometry of reducible and cyclic models
-
Hosten S., and Sullivant S. Gröbner bases and polyhedral geometry of reducible and cyclic models. Journal of Combinatorial Theory A 100 (2002) 277-301
-
(2002)
Journal of Combinatorial Theory A
, vol.100
, pp. 277-301
-
-
Hosten, S.1
Sullivant, S.2
-
91
-
-
0000328477
-
Interval protection of confidential information in a database
-
Gopal R., Goes P., and Garfinkel R. Interval protection of confidential information in a database. INFORMS Journal on Computing 10 (1998) 309-322
-
(1998)
INFORMS Journal on Computing
, vol.10
, pp. 309-322
-
-
Gopal, R.1
Goes, P.2
Garfinkel, R.3
-
92
-
-
0036602405
-
Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
-
Garfinkel R., Gopal R., and Goes P. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Science 48 (2002) 749-764
-
(2002)
Management Science
, vol.48
, pp. 749-764
-
-
Garfinkel, R.1
Gopal, R.2
Goes, P.3
-
93
-
-
0036563104
-
Confidentiality via camouflage: the CVC approach to disclosure limitation when answering queries to databases
-
Gopal R., Garfinkel R., and Goes P. Confidentiality via camouflage: the CVC approach to disclosure limitation when answering queries to databases. Operations Research 50 (2002) 501-516
-
(2002)
Operations Research
, vol.50
, pp. 501-516
-
-
Gopal, R.1
Garfinkel, R.2
Goes, P.3
|