메뉴 건너뛰기




Volumn 35, Issue 5, 2008, Pages 1638-1651

Statistical confidentiality: Optimization techniques to protect tables

Author keywords

Cell suppression; Integer programming; Rounding; Statistical disclosure limitation

Indexed keywords

INFORMATION MANAGEMENT; INTEGER PROGRAMMING; OPTIMIZATION; PROBLEM SOLVING; SECURITY OF DATA; STATISTICAL METHODS;

EID: 34748897771     PISSN: 03050548     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cor.2006.09.007     Document Type: Article
Times cited : (18)

References (93)
  • 1
    • 34748830177 scopus 로고    scopus 로고
    • Doyle P, Lane J, Theeuwes J, Zayatz L, editors, Confidentiality, disclosure and data access: theory and practical applications for statistical agencies, Amsterdam: Elsevier Science; 2001.
  • 2
    • 34748857215 scopus 로고    scopus 로고
    • Willenborg LCRJ, De Waal T. Statistical disclosure control in practice. Lecture notes in statistics, vol. 111, Springer; Berlin: 1996.
  • 3
    • 34748879256 scopus 로고    scopus 로고
    • Willenborg LCRJ, De Waal T. Elements of statistical disclosure control. Lecture notes in statistics, vol. 155, Springer; Berlin: 2001.
  • 4
    • 29844455635 scopus 로고    scopus 로고
    • Models and methods for the microdata protection problem
    • Hurkens C.A.J., and Tiourine S.R. Models and methods for the microdata protection problem. Journal of Official Statistics 14 4 (1998) 437-447
    • (1998) Journal of Official Statistics , vol.14 , Issue.4 , pp. 437-447
    • Hurkens, C.A.J.1    Tiourine, S.R.2
  • 5
    • 0042515066 scopus 로고
    • Linear sensitivity measures and statistical disclosure control
    • Cox L.H. Linear sensitivity measures and statistical disclosure control. Journal of Statistical Planning and Inference 5 (1981) 153-164
    • (1981) Journal of Statistical Planning and Inference , vol.5 , pp. 153-164
    • Cox, L.H.1
  • 8
    • 26944441439 scopus 로고
    • The invasion of privacy problem and statistics production. An overview
    • Dalenius T. The invasion of privacy problem and statistics production. An overview. Statistik Tidskrift 12 (1974) 213-225
    • (1974) Statistik Tidskrift , vol.12 , pp. 213-225
    • Dalenius, T.1
  • 10
    • 0002670447 scopus 로고    scopus 로고
    • A decision-theoretic approach to data disclosure problem
    • Trottini M. A decision-theoretic approach to data disclosure problem. Research in Official Statistics 4 (2001) 7-22
    • (2001) Research in Official Statistics , vol.4 , pp. 7-22
    • Trottini, M.1
  • 11
    • 0000082189 scopus 로고
    • Suppression methodology and statistical disclosure control
    • Cox L.H. Suppression methodology and statistical disclosure control. Journal of the American Statistical Association 75 (1980) 377-385
    • (1980) Journal of the American Statistical Association , vol.75 , pp. 377-385
    • Cox, L.H.1
  • 12
    • 84974742458 scopus 로고
    • Automated cell suppression to preserve confidentiality of business statistics
    • Sande G. Automated cell suppression to preserve confidentiality of business statistics. Statistical Journal of the United Nations ECE 2 (1984) 33-41
    • (1984) Statistical Journal of the United Nations ECE , vol.2 , pp. 33-41
    • Sande, G.1
  • 13
    • 84949440059 scopus 로고    scopus 로고
    • Robertson DA, Ethier R. Cell suppression: experience and theory. In: Domingo-Ferrer J, editor, Inference control in statistical databases. Lecture notes in computer science, vol. 2316, 2002, p. 8-20.
  • 14
    • 34748814168 scopus 로고    scopus 로고
    • Kelly JP. Confidentiality protection in two and three-dimensional tables. PhD dissertation, University of Maryland, College Park, MD, 1990.
  • 15
    • 0000120975 scopus 로고
    • Cell suppression: disclosure protection for sensitive tabular data
    • Kelly J.P., Golden B.L., and Assad A.A. Cell suppression: disclosure protection for sensitive tabular data. Networks 22 (1992) 397-417
    • (1992) Networks , vol.22 , pp. 397-417
    • Kelly, J.P.1    Golden, B.L.2    Assad, A.A.3
  • 16
    • 84949455490 scopus 로고    scopus 로고
    • Castro J. Network flows heuristics for complementary cell suppression: an empirical evaluation and extensions. In: Domingo-Ferrer J. (Ed.), Inference control in statistical databases. Lecture notes in computer science, vol. 2316, 2002, p. 59-73.
  • 17
    • 28044451474 scopus 로고    scopus 로고
    • Castro J. A fast network flows heuristic for cell suppression in positive tables. In: Domingo-Ferrer J, Torra V, editors, Privacy in statistical databases. Lecture notes in computer science, vol. 3050, 2004, p. 136-48.
  • 18
    • 56749085696 scopus 로고    scopus 로고
    • Castro J. A shortest paths heuristic for statistical disclosure control in positive tables. INFORMS Journal on Computing, 2006, to appear.
  • 19
    • 34748824804 scopus 로고    scopus 로고
    • De Silets L, Golden BL, Kumar R, Wang Q. A neural network model for cell suppression of tabular data. Proceeding of the international joint conference on neural networks, vol. III, Baltimore, Maryland, 1992, p. 203-214.
  • 20
    • 34748846723 scopus 로고    scopus 로고
    • Almeida MT, Schütz G, Carvalho FD. Statistical disclosure control: a genetic-based approach. Technical report, Centro de Investigaçao Operacional, Lisbon, 2005.
  • 21
    • 0031189118 scopus 로고    scopus 로고
    • Cell suppression methodology: the importance of suppressing marginal totals
    • Chu P.C. Cell suppression methodology: the importance of suppressing marginal totals. IEEE Transactions on Knowledge and Data Engineering 9 4 (1997) 513-523
    • (1997) IEEE Transactions on Knowledge and Data Engineering , vol.9 , Issue.4 , pp. 513-523
    • Chu, P.C.1
  • 22
    • 0024019017 scopus 로고
    • A graph theoretic approach to statistical data security
    • Gusfield D. A graph theoretic approach to statistical data security. SIAM Journal on Computing 17 (1988) 552-571
    • (1988) SIAM Journal on Computing , vol.17 , pp. 552-571
    • Gusfield, D.1
  • 23
    • 0011190489 scopus 로고
    • Efficient detection and protection of information in cross tabulated tables I: linear invariant test
    • Kao M.Y., and Gusfield D. Efficient detection and protection of information in cross tabulated tables I: linear invariant test. SIAM Journal on Discrete Mathematics 6 3 (1993) 460-476
    • (1993) SIAM Journal on Discrete Mathematics , vol.6 , Issue.3 , pp. 460-476
    • Kao, M.Y.1    Gusfield, D.2
  • 24
  • 26
    • 0001272011 scopus 로고
    • Approximation algorithms for several graph augmentation problems
    • Frederickson G.N., and Ja'Ja J. Approximation algorithms for several graph augmentation problems. SIAM Journal on Computing 10 2 (1981) 270-283
    • (1981) SIAM Journal on Computing , vol.10 , Issue.2 , pp. 270-283
    • Frederickson, G.N.1    Ja'Ja, J.2
  • 27
    • 0023399929 scopus 로고
    • Optimal mixed graph augmentation
    • Gusfield D. Optimal mixed graph augmentation. SIAM Journal on Computing 16 4 (1987) 599-612
    • (1987) SIAM Journal on Computing , vol.16 , Issue.4 , pp. 599-612
    • Gusfield, D.1
  • 28
    • 0008551538 scopus 로고    scopus 로고
    • Models and algorithms for the 2-dimensional cell suppression problem in statistical disclosure control
    • Fischetti M., and Salazar J.J. Models and algorithms for the 2-dimensional cell suppression problem in statistical disclosure control. Mathematical Programming 84 (1999) 283-312
    • (1999) Mathematical Programming , vol.84 , pp. 283-312
    • Fischetti, M.1    Salazar, J.J.2
  • 31
    • 0342647299 scopus 로고    scopus 로고
    • Lower-bounding procedures for the 2-dimensional cell suppression problem
    • Carvalho F.D., and Almeida M.T. Lower-bounding procedures for the 2-dimensional cell suppression problem. European Journal of Operational Research 123 (2000) 29-41
    • (2000) European Journal of Operational Research , vol.123 , pp. 29-41
    • Carvalho, F.D.1    Almeida, M.T.2
  • 32
    • 13844316377 scopus 로고    scopus 로고
    • Exact disclosure prevention in 2-dimensional statistical tables
    • Almeida M.T., and Carvalho F.D. Exact disclosure prevention in 2-dimensional statistical tables. Computers & Operations Research 32 (2005) 2919-2936
    • (2005) Computers & Operations Research , vol.32 , pp. 2919-2936
    • Almeida, M.T.1    Carvalho, F.D.2
  • 33
    • 34748917447 scopus 로고    scopus 로고
    • Carvalho FD, Almeida MT. An integer approach for the cell suppression problem in two-dimensional statistical tables. Technical report #3-05, Centro de Investigaçao Operacional, Lisbon, 2005.
  • 35
    • 0034710980 scopus 로고    scopus 로고
    • Bounds for cell entries in contigency tables given marginal totals and decomposable graphs
    • Dobra A., and Fienberg S.E. Bounds for cell entries in contigency tables given marginal totals and decomposable graphs. Proceedings of the National Academy of Sciences of the USA 97 (2000) 11885-11892
    • (2000) Proceedings of the National Academy of Sciences of the USA , vol.97 , pp. 11885-11892
    • Dobra, A.1    Fienberg, S.E.2
  • 36
    • 34748924868 scopus 로고    scopus 로고
    • Geurts J. Heuristics for cell suppression in tables. Technical report, Netherlands Central Bureau of Statistics, Voorburg, 1992.
  • 37
    • 0028380482 scopus 로고
    • Three-dimensional statistical data security problems
    • Irving R.W., and Jerrum M.R. Three-dimensional statistical data security problems. SIAM Journal on Computing 23 1 (1994) 170-184
    • (1994) SIAM Journal on Computing , vol.23 , Issue.1 , pp. 170-184
    • Irving, R.W.1    Jerrum, M.R.2
  • 38
    • 0033238479 scopus 로고    scopus 로고
    • Statistical disclosure in general three-dimensional tables
    • Dellaert N.P., and Luijten W.A. Statistical disclosure in general three-dimensional tables. Statistica Neerlandica 53 (1999) 197-221
    • (1999) Statistica Neerlandica , vol.53 , pp. 197-221
    • Dellaert, N.P.1    Luijten, W.A.2
  • 39
    • 0035410523 scopus 로고    scopus 로고
    • Solving the cell suppression problem on tabular data with linear constraints
    • Fischetti M., and Salazar J.J. Solving the cell suppression problem on tabular data with linear constraints. Management Science 47 7 (2001) 1008-1026
    • (2001) Management Science , vol.47 , Issue.7 , pp. 1008-1026
    • Fischetti, M.1    Salazar, J.J.2
  • 40
    • 84949443341 scopus 로고    scopus 로고
    • De Wolf PP. HiTaS: a heuristic approach to cell suppression in hierarchical tables. In: Domingo-Ferrer J, editor, Inference control in statistical databases. Lecture notes in computer science, vol. 2316, 2002, p. 74-82.
  • 41
    • 0033349024 scopus 로고    scopus 로고
    • Disclosure detection in multivariate categorical databases: auditing confidentiality protection through two new matrix operators
    • Chowdhury S.D., Duncan G.T., Krishnan R., Roehrig S.F., and Mukherjee S. Disclosure detection in multivariate categorical databases: auditing confidentiality protection through two new matrix operators. Management Science 45 (1999) 1710-1723
    • (1999) Management Science , vol.45 , pp. 1710-1723
    • Chowdhury, S.D.1    Duncan, G.T.2    Krishnan, R.3    Roehrig, S.F.4    Mukherjee, S.5
  • 42
    • 34748882252 scopus 로고    scopus 로고
    • Roehrig SF, Padman R, Krishnan R, Duncan GT. Exact and heuristic methods for cell suppression in multi-dimensional linked tables. Technical report, 2004.
  • 43
    • 0347593826 scopus 로고    scopus 로고
    • Mathematical models for applying cell suppression methodology in statistical data protection
    • Salazar J.J. Mathematical models for applying cell suppression methodology in statistical data protection. European Journal of Operational Research 154 (2004) 740-754
    • (2004) European Journal of Operational Research , vol.154 , pp. 740-754
    • Salazar, J.J.1
  • 44
    • 34748867630 scopus 로고    scopus 로고
    • Buzzigoli L, Giusti A. An algorithm to calculate the lower and upper bounds of the elements of an array given its marginals. Proceedings of the statistical data protection conference, 1998, p. 131-47.
  • 45
    • 0035694218 scopus 로고    scopus 로고
    • Bounds for cell entries in contingency tables induced by fixed marginal totals
    • Dobra A., and Fienberg S.E. Bounds for cell entries in contingency tables induced by fixed marginal totals. Statistical Journal of the United Nations ECE 18 (2001) 363-371
    • (2001) Statistical Journal of the United Nations ECE , vol.18 , pp. 363-371
    • Dobra, A.1    Fienberg, S.E.2
  • 46
    • 84949443746 scopus 로고    scopus 로고
    • Cox LH. Bounds on entries in 3-dimensional contingency tables subject to given marginal totals. In: Domingo-Ferrer J, editor, Inference control in statistical databases, Lecture notes in computer science, vol. 2316, 2002, p. 21-33.
  • 47
    • 20444440962 scopus 로고    scopus 로고
    • Assessing the risk of disclosure of confidential categorical data
    • Bernardo J.M., Bayarri M.J., Berger J.O., Dawid A.P., Heckerman D., Smith A.F.M., and West M. (Eds), Oxford University Press, Oxford
    • Dobra A., Fienberg S.E., and Trottini M. Assessing the risk of disclosure of confidential categorical data. In: Bernardo J.M., Bayarri M.J., Berger J.O., Dawid A.P., Heckerman D., Smith A.F.M., and West M. (Eds). Bayesian statistics vol. 7 (2003), Oxford University Press, Oxford
    • (2003) Bayesian statistics , vol.7
    • Dobra, A.1    Fienberg, S.E.2    Trottini, M.3
  • 48
    • 0347432366 scopus 로고    scopus 로고
    • Preserving confidentiality of high-dimensional tabulated data: statistical and computational issues
    • Dobra A., Karr A.F., and Sanil A.P. Preserving confidentiality of high-dimensional tabulated data: statistical and computational issues. Statistics & Computing 13 4 (2003) 363-370
    • (2003) Statistics & Computing , vol.13 , Issue.4 , pp. 363-370
    • Dobra, A.1    Karr, A.F.2    Sanil, A.P.3
  • 50
    • 34748900448 scopus 로고
    • On necessary conditions for the existence of the solution to the multi-index transportation problem
    • Moravek J., and Vlach M. On necessary conditions for the existence of the solution to the multi-index transportation problem. Operations Research 15 (1967) 542-545
    • (1967) Operations Research , vol.15 , pp. 542-545
    • Moravek, J.1    Vlach, M.2
  • 51
    • 0022441612 scopus 로고
    • Conditions for the existence of solutions of the three-dimensional planar transportation problem
    • Vlach M. Conditions for the existence of solutions of the three-dimensional planar transportation problem. Discrete Applied Mathematics 13 (1986) 61-78
    • (1986) Discrete Applied Mathematics , vol.13 , pp. 61-78
    • Vlach, M.1
  • 52
    • 0041505370 scopus 로고
    • Controlled random rounding
    • Fellegi I.P. Controlled random rounding. Survey Methodology 1 (1975) 123-133
    • (1975) Survey Methodology , vol.1 , pp. 123-133
    • Fellegi, I.P.1
  • 53
    • 15044356955 scopus 로고
    • Matrix rounding problem
    • Bacharach M. Matrix rounding problem. Management Science 9 (1966) 732-742
    • (1966) Management Science , vol.9 , pp. 732-742
    • Bacharach, M.1
  • 54
    • 0006500171 scopus 로고
    • A simple procedure for controlled rounding
    • Dalenius T. A simple procedure for controlled rounding. Statistisk Tidskrift 3 (1981) 202-208
    • (1981) Statistisk Tidskrift , vol.3 , pp. 202-208
    • Dalenius, T.1
  • 55
    • 0042362844 scopus 로고
    • Controlled rounding
    • Cox L.H., and Ernst L.R. Controlled rounding. INFOR 20 (1982) 423-432
    • (1982) INFOR , vol.20 , pp. 423-432
    • Cox, L.H.1    Ernst, L.R.2
  • 56
    • 77957065890 scopus 로고
    • Applications of network optimization
    • Ball M.O., Magnanti T.L., Monma C.L., and Nemhauser G.L. (Eds), Elsevier, North-Holland, Amsterdam
    • Ahuja R.K., Magnanti T.L., Orlin J.B., and Reddy M.R. Applications of network optimization. In: Ball M.O., Magnanti T.L., Monma C.L., and Nemhauser G.L. (Eds). Handbooks in operations research & management science vol. 7 (1995), Elsevier, North-Holland, Amsterdam 1-83
    • (1995) Handbooks in operations research & management science , vol.7 , pp. 1-83
    • Ahuja, R.K.1    Magnanti, T.L.2    Orlin, J.B.3    Reddy, M.R.4
  • 58
    • 0042251080 scopus 로고
    • Controlled rounding for tables with subtotals
    • Cox L.H., and George J.A. Controlled rounding for tables with subtotals. Annals of Operations Research 20 (1989) 141-157
    • (1989) Annals of Operations Research , vol.20 , pp. 141-157
    • Cox, L.H.1    George, J.A.2
  • 59
    • 0041750563 scopus 로고
    • The controlled rounding problem: relaxations and complexity issues
    • Kelly J.P., Assad A.A., and Golden B.L. The controlled rounding problem: relaxations and complexity issues. OR Specktrum 12 (1990) 129-138
    • (1990) OR Specktrum , vol.12 , pp. 129-138
    • Kelly, J.P.1    Assad, A.A.2    Golden, B.L.3
  • 61
    • 34748886541 scopus 로고    scopus 로고
    • Fagan JT, Greenberg BV, Hemmig R. Controlled rounding of three dimensional tables. Bureau of the Census, Technical report census/SRD/RR-88/02, 1988.
  • 62
    • 0042251070 scopus 로고
    • Using simulated annealing to solve controlled rounding problems
    • Kelly J.P., Golden B.L., and Assad A.A. Using simulated annealing to solve controlled rounding problems. ORSA Journal on Computing 2 (1990) 174-185
    • (1990) ORSA Journal on Computing , vol.2 , pp. 174-185
    • Kelly, J.P.1    Golden, B.L.2    Assad, A.A.3
  • 63
    • 21144463251 scopus 로고
    • Large-scale controlled rounding using TABU search with strategic oscillation
    • Kelly J.P., Golden B.L., and Assad A.A. Large-scale controlled rounding using TABU search with strategic oscillation. Annals of Operations Research 41 (1993) 69-84
    • (1993) Annals of Operations Research , vol.41 , pp. 69-84
    • Kelly, J.P.1    Golden, B.L.2    Assad, A.A.3
  • 65
    • 27344440294 scopus 로고    scopus 로고
    • Computational experience with the controlled rounding problem in statistical disclosure control
    • Fischetti M., and Salazar J.J. Computational experience with the controlled rounding problem in statistical disclosure control. Journal of Official Statistics 14 4 (1998) 553-565
    • (1998) Journal of Official Statistics , vol.14 , Issue.4 , pp. 553-565
    • Fischetti, M.1    Salazar, J.J.2
  • 66
    • 29044443601 scopus 로고    scopus 로고
    • Controlled rounding and cell perturbation: statistical disclosure limitation methods for tabular data
    • Salazar J.J. Controlled rounding and cell perturbation: statistical disclosure limitation methods for tabular data. Mathematical Programming 105 (2006) 583-603
    • (2006) Mathematical Programming , vol.105 , pp. 583-603
    • Salazar, J.J.1
  • 67
    • 35048868813 scopus 로고    scopus 로고
    • Salazar JJ, Lowthian P, Young C, Merola G, Bond S, Brown D. Getting the best results in controlled rounding with the least effort. In: Domingo-Ferrer J, Torra V, editors, Privacy in statistical databases. Lecture notes in computer science, vol. 3050, 2004, p. 58-72.
  • 68
    • 34748878699 scopus 로고    scopus 로고
    • Salazar JJ, Bycroft C, Toniolo A. The controlled rounding implementation. Monographs of official statistics, Eurostat, 2005.
  • 69
    • 35048825711 scopus 로고    scopus 로고
    • Salazar JJ, Schoch M. A new tool for applying controlled rounding to a statistical table in microsoft excel. In: Domingo-Ferrer J, Torra, V, editors, Privacy in statistical databases, Lecture notes in computer science, vol. 3050, 2004, p. 44-57.
  • 70
    • 0001445186 scopus 로고
    • A constructive procedure for unbiased controlled rounding
    • Cox L.H. A constructive procedure for unbiased controlled rounding. Journal of the American Statistical Association 82 (1987) 520-524
    • (1987) Journal of the American Statistical Association , vol.82 , pp. 520-524
    • Cox, L.H.1
  • 71
    • 84958948527 scopus 로고    scopus 로고
    • Salazar JJ. A New Approach to Round Tabular Data. In: Domingo-Ferrer J, Franconi L, editors, PSD 2006. Lecture Notes in Computer Science, vol. 4302, 2006, p. 25-34.
  • 72
    • 27344442736 scopus 로고    scopus 로고
    • Using noise for disclosure limitation of establishment tabular data
    • Evans T., Zayatz L., and Slanta J. Using noise for disclosure limitation of establishment tabular data. Journal of Official Statistics 14 4 (1998) 537-551
    • (1998) Journal of Official Statistics , vol.14 , Issue.4 , pp. 537-551
    • Evans, T.1    Zayatz, L.2    Slanta, J.3
  • 73
    • 0000432739 scopus 로고    scopus 로고
    • Disclosure limitation using perturbation and related methods for categorical data
    • Fienberg S.E., Makov U.E., and Steele R.J. Disclosure limitation using perturbation and related methods for categorical data. Journal of Official Statistics 14 4 (1998) 485-502
    • (1998) Journal of Official Statistics , vol.14 , Issue.4 , pp. 485-502
    • Fienberg, S.E.1    Makov, U.E.2    Steele, R.J.3
  • 74
    • 0346801841 scopus 로고    scopus 로고
    • A theoretical basis for perturbation methods
    • Muralidhar K., and Sarathy R. A theoretical basis for perturbation methods. Statistics and Computing 13 (2003) 329-335
    • (2003) Statistics and Computing , vol.13 , pp. 329-335
    • Muralidhar, K.1    Sarathy, R.2
  • 75
    • 34748849094 scopus 로고    scopus 로고
    • Fienberg SE, Steele RJ, Makov UE. Statistical notions of data disclosure avoidance and their relationship to traditional statistical methodology: data swapping and log-linear models. Proceedings of bureau of the census 1996 annual research conference, Washington, DC, 1996.
  • 77
    • 34748832691 scopus 로고    scopus 로고
    • Duncan GT, Fienberg SE. Obtaining information while preserving privacy: a Markov perturbation method for tabular data. Proceedings of the statistical data protection conference, 1998, p. 351-62.
  • 78
    • 34748854137 scopus 로고    scopus 로고
    • Duncan GT, Roehrig S. Cyclic perturbation: protecting confidentiality while preserving data utility in tabular data. Technical report, 2004.
  • 79
    • 0345832325 scopus 로고    scopus 로고
    • Partial cell suppression: a new methodology for statistical disclosure control
    • Fischetti M., and Salazar J.J. Partial cell suppression: a new methodology for statistical disclosure control. Statistics and Computing 13 1 (2003) 13-21
    • (2003) Statistics and Computing , vol.13 , Issue.1 , pp. 13-21
    • Fischetti, M.1    Salazar, J.J.2
  • 80
    • 27344440542 scopus 로고    scopus 로고
    • A unified mathematical programming framework for different statistical disclosure limitation methods
    • Salazar J.J. A unified mathematical programming framework for different statistical disclosure limitation methods. Operations Research 53 (2005) 819-829
    • (2005) Operations Research , vol.53 , pp. 819-829
    • Salazar, J.J.1
  • 81
    • 34748852956 scopus 로고    scopus 로고
    • Dandekar RA, Cox LH. Synthetic tabular data: an alternative to complementary cell suppression for disclosure limitation of tabular data. Technical report, 2002.
  • 82
    • 34748896428 scopus 로고    scopus 로고
    • Dandekar RA. Cost effective implementation of synthetic tabulation (a.k.a. controlled tabular adjustments) in legacy and new statistical data publication systems. Joint ECE/Eurostat work session on statistical data confidentiality, Luxembourg, 2003.
  • 83
    • 29044448905 scopus 로고    scopus 로고
    • Dandekar RA. Maximum utility-minimum information loss table server design for statistical disclosure control of tabular data. In: Domingo-Ferrer J, Torra V, editors, Privacy in statistical databases, Lecture notes in computer science, vol. 3050, 2004, p. 121-35.
  • 84
    • 35048868331 scopus 로고    scopus 로고
    • Cox LH, Kelly JP, Patil R. Balancing quality and confidentiality for multivariate tabular data. In: Domingo-Ferrer J, Torra V, editors, Privacy in statistical databases, Lecture notes in computer science, vol. 3050, 2004, p. 87-98.
  • 85
    • 34748816651 scopus 로고    scopus 로고
    • Wang X, Golden B, Wasil E. Achieving controlled tabular adjustment using genetic algorithms. INFORMS computing society conference, Annapolis, January 2005.
  • 86
    • 28044456017 scopus 로고    scopus 로고
    • Castro J. Computational experiments with minimum-distance controlled perturbation methods. In: Domingo-Ferrer J, Torra V, editors, Privacy in statistical databases, Lecture notes in computer science, vol. 3050, 2004, p. 73-86.
  • 87
    • 15044349954 scopus 로고    scopus 로고
    • Quadratic interior-point methods in statistical disclosure control
    • Castro J. Quadratic interior-point methods in statistical disclosure control. Computational Management Science 2 (2005) 107-121
    • (2005) Computational Management Science , vol.2 , pp. 107-121
    • Castro, J.1
  • 88
    • 28044467158 scopus 로고    scopus 로고
    • Minimum-distance controlled perturbation methods for large-scale tabular data protection
    • Castro J. Minimum-distance controlled perturbation methods for large-scale tabular data protection. European Journal of Operational Research 171 (2006) 39-52
    • (2006) European Journal of Operational Research , vol.171 , pp. 39-52
    • Castro, J.1
  • 89
    • 4544288856 scopus 로고    scopus 로고
    • The complexity of three-way statistical tables
    • De Loera J., and Onn S. The complexity of three-way statistical tables. SIAM Journal on Computing 33 (2004) 819-836
    • (2004) SIAM Journal on Computing , vol.33 , pp. 819-836
    • De Loera, J.1    Onn, S.2
  • 90
    • 0036865863 scopus 로고    scopus 로고
    • Gröbner bases and polyhedral geometry of reducible and cyclic models
    • Hosten S., and Sullivant S. Gröbner bases and polyhedral geometry of reducible and cyclic models. Journal of Combinatorial Theory A 100 (2002) 277-301
    • (2002) Journal of Combinatorial Theory A , vol.100 , pp. 277-301
    • Hosten, S.1    Sullivant, S.2
  • 91
    • 0000328477 scopus 로고    scopus 로고
    • Interval protection of confidential information in a database
    • Gopal R., Goes P., and Garfinkel R. Interval protection of confidential information in a database. INFORMS Journal on Computing 10 (1998) 309-322
    • (1998) INFORMS Journal on Computing , vol.10 , pp. 309-322
    • Gopal, R.1    Goes, P.2    Garfinkel, R.3
  • 92
    • 0036602405 scopus 로고    scopus 로고
    • Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
    • Garfinkel R., Gopal R., and Goes P. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Science 48 (2002) 749-764
    • (2002) Management Science , vol.48 , pp. 749-764
    • Garfinkel, R.1    Gopal, R.2    Goes, P.3
  • 93
    • 0036563104 scopus 로고    scopus 로고
    • Confidentiality via camouflage: the CVC approach to disclosure limitation when answering queries to databases
    • Gopal R., Garfinkel R., and Goes P. Confidentiality via camouflage: the CVC approach to disclosure limitation when answering queries to databases. Operations Research 50 (2002) 501-516
    • (2002) Operations Research , vol.50 , pp. 501-516
    • Gopal, R.1    Garfinkel, R.2    Goes, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.