메뉴 건너뛰기




Volumn 2316, Issue , 2002, Pages 34-58

Extending cell suppression to protect tabular data against several attackers

Author keywords

[No Author keywords available]

Indexed keywords

CELLS; CYTOLOGY; OPTIMAL SYSTEMS;

EID: 56749112555     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-47804-3_4     Document Type: Conference Paper
Times cited : (4)

References (18)
  • 1
    • 0000082189 scopus 로고
    • Suppression Methodology and Statistical Disclosure Control
    • Cox, L.H. (1980) Suppression Methodology and Statistical Disclosure Control. Journal of the American Statistical Association, 75, 377–385
    • (1980) Journal of the American Statistical Association , vol.75 , pp. 377-385
    • Cox, L.H.1
  • 5
    • 0008551538 scopus 로고    scopus 로고
    • Models and Algorithms for the 2-Dimensional Cell Suppression Problem in Statistical Disclosure Control
    • Fischetti, M. and Salazar, J.J. (1999) Models and Algorithms for the 2-Dimensional Cell Suppression Problem in Statistical Disclosure Control. Mathematical Programming, 84, 283–312
    • (1999) Mathematical Programming , vol.84 , pp. 283-312
    • Fischetti, M.1    Salazar, J.J.2
  • 6
    • 2242454277 scopus 로고    scopus 로고
    • Models and Algorithms for Optimizing Cell Suppression Problem in Tabular Data with Linear Constraints
    • Fischetti, M. and Salazar, J.J. (2000) Models and Algorithms for Optimizing Cell Suppression Problem in Tabular Data with Linear Constraints. Journal of the American Statistical Association, 95, 916–928
    • (2000) Journal of the American Statistical Association , vol.95 , pp. 916-928
    • Fischetti, M.1    Salazar, J.J.2
  • 7
    • 0008553333 scopus 로고
    • Technical Paper, Netherlands Central Bureau of Statistics, Voorburg
    • Geurts, J. (1992) Heuristics for Cell Suppression in Tables. Technical Paper, Netherlands Central Bureau of Statistics, Voorburg
    • (1992) Heuristics for Cell Suppression in Tables
    • Geurts, J.1
  • 8
    • 0024019017 scopus 로고
    • A Graph Theoretic Approach to Statistical Data Security
    • Gusfield, D. (1988) A Graph Theoretic Approach to Statistical Data Security. SIAM Journal on Computing, 17, 552–571
    • (1988) SIAM Journal on Computing , vol.17 , pp. 552-571
    • Gusfield, D.1
  • 10
    • 0030353658 scopus 로고    scopus 로고
    • Data Security Equals Graph Connectivity
    • Kao, M.Y. (1996) Data Security Equals Graph Connectivity. SIAM Journal on Discrete Mathematics, 9, 87–100
    • (1996) SIAM Journal on Discrete Mathematics , vol.9 , pp. 87-100
    • Kao, M.Y.1
  • 12
    • 0000120975 scopus 로고
    • Cell Suppression: Disclosure Protection for Sensitive Tabular Data
    • Kelly, J.P., Golden, B.L., and Assad, A.A. (1992) Cell Suppression: Disclosure Protection for Sensitive Tabular Data. Networks 22, 397–417
    • (1992) Networks , vol.22 , pp. 397-417
    • Kelly, J.P.1    Golden, B.L.2    Assad, A.A.3
  • 16
    • 84974742458 scopus 로고
    • Automated cell suppression to preserve confidentiality of business statistics
    • Sande, G. (1984) Automated cell suppression to preserve confidentiality of business statistics. Statistical Journal of the United Nations ECE 2, 33–41
    • (1984) Statistical Journal of the United Nations ECE , vol.2 , pp. 33-41
    • Sande, G.1
  • 17
    • 84949473765 scopus 로고
    • ACS documentation. Sande & Associates, 600 Sanderling Ct. Secaucus NJ, 07094 U.S.A
    • Sande, G. (1995) ACS documentation. Sande & Associates, 600 Sanderling Ct. Secaucus NJ, 07094 U.S.A
    • (1995)
    • Sande, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.