메뉴 건너뛰기




Volumn 4302, Issue , 2006, Pages 57-67

Disclosure analysis for two-way contingency tables

Author keywords

[No Author keywords available]

Indexed keywords

CYTOLOGY;

EID: 79959246230     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11930242_6     Document Type: Conference Paper
Times cited : (2)

References (47)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • N. R. Adam and J. C. Wortmann. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys, 21(4):515–556, 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.C.2
  • 2
    • 0034827009 scopus 로고    scopus 로고
    • On the design and quantification of privacy preserving data mining algorithms
    • Dakshi Agrawal and Charu C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In PODS, 2001.
    • (2001) PODS
    • Agrawal, D.1    Aggarwal, C.C.2
  • 3
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • Rakesh Agrawal and Ramakrishnan Srikant. Privacy-preserving data mining. In SIGMOD Conference, pages 439–450, 2000.
    • (2000) SIGMOD Conference , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 4
    • 0019056889 scopus 로고
    • Beck. A security mechanism for statistical databases
    • Leland L. Beck. A security mechanism for statistical databases. ACM Trans. Database Syst., 5(3):316–338, 1980.
    • (1980) ACM Trans. Database Syst , vol.5 , Issue.3 , pp. 316-338
    • Leland, L.1
  • 5
    • 0034314077 scopus 로고    scopus 로고
    • Secure databases: Constraints, inference channels, and monitoring disclosures
    • Alexander Brodsky, Csilla Farkas, and Sushil Jajodia. Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl. Data Eng., 12(6):900–919, 2000.
    • (2000) IEEE Trans. Knowl. Data Eng , vol.12 , Issue.6 , pp. 900-919
    • Brodsky, A.1    Farkas, C.2    Jajodia, S.3
  • 6
    • 0002084144 scopus 로고    scopus 로고
    • An algorithm to calculate the lower and upper bounds of the elements of an array given its marginals
    • L. Buzzigoli and A. Giusti. An algorithm to calculate the lower and upper bounds of the elements of an array given its marginals. In Proceedings of the conference for statistical data protection, pages 131–147, 1999.
    • (1999) Proceedings of the Conference for Statistical Data Protection , pp. 131-147
    • Buzzigoli, L.1    Giusti, A.2
  • 8
    • 33750283449 scopus 로고    scopus 로고
    • Privacy preserving data classification with rotation perturbation
    • Keke Chen and Ling Liu. Privacy preserving data classification with rotation perturbation. In ICDM, pages 589–592, 2005.
    • (2005) ICDM, Pages 589–592
    • Chen, K.1    Liu, L.2
  • 10
    • 0020205885 scopus 로고
    • Auditing and inference control in statistical databases
    • Francis Y. L. Chin and Gultekin Özsoyoglu. Auditing and inference control in statistical databases. IEEE Trans. Software Eng., 8(6):574–582, 1982.
    • (1982) IEEE Trans. Software Eng , vol.8 , Issue.6 , pp. 574-582
    • Chin, F.Y.L.1    Özsoyoglu, G.2
  • 11
    • 0033349024 scopus 로고    scopus 로고
    • Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators
    • S. Chowdhury, G. Duncan, R. Krishnan, S. Roehrig, and S. Mukherjee. Disclosure detection in multivariate categorical databases: auditing confidentiality protection through two new matrix operators. Management Sciences, 45:1710–1723, 1999.
    • (1999) Management Sciences , vol.45 , pp. 1710-1723
    • Chowdhury, S.1    Duncan, G.2    Krishnan, R.3    Roehrig, S.4    Mukherjee, S.5
  • 12
    • 84969367319 scopus 로고    scopus 로고
    • Bounding entries in 3-dimensional contingency tables
    • L. Cox. Bounding entries in 3-dimensional contingency tables. In SDC: From Theory to Practice, 2001. http://vneumann.etse.urv.es/amrads/papers/coxlux.pdf.
    • (2001) SDC: From Theory to Practice
    • Cox, L.1
  • 13
    • 0042384761 scopus 로고    scopus 로고
    • On properties of multi-dimensional statistical tables
    • L. Cox. On properties of multi-dimensional statistical tables. Journal of Statistical Planning and Inference, 117(2):251–273, 2003.
    • (2003) Journal of Statistical Planning and Inference , vol.117 , Issue.2 , pp. 251-273
    • Cox, L.1
  • 14
    • 0000082189 scopus 로고
    • Suppression methodology and statistical disclosure control
    • L. H. Cox. Suppression methodology and statistical disclosure control. Journal of American Statistical Association, 75:377–385, 1980.
    • (1980) Journal of American Statistical Association , vol.75 , pp. 377-385
    • Cox, L.H.1
  • 15
    • 0001445186 scopus 로고
    • A constructive procedure for unbiased controlled rounding
    • L. H. Cox. A constructive procedure for unbiased controlled rounding. Journal of the American Statistical Association, 82:520–524, 1987.
    • (1987) Journal of the American Statistical Association , vol.82 , pp. 520-524
    • Cox, L.H.1
  • 16
    • 0042251080 scopus 로고
    • Controlled rounding for tables with subtotals
    • L. H. Cox and J. A. George. Controlled rounding for tables with subtotals. Annuals of operations research, 20(1-4):141–157, 1989.
    • (1989) Annuals of Operations Research , vol.20 , Issue.1-4 , pp. 141-157
    • Cox, L.H.1    George, J.A.2
  • 19
    • 0020779363 scopus 로고
    • Inference controls for statistical databases
    • D. E. Denning and J. Schlorer. Inference controls for statistical databases. IEEE Computer, 16(7):69–82, 1983.
    • (1983) IEEE Computer , vol.16 , Issue.7 , pp. 69-82
    • Denning, D.E.1    Schlorer, J.2
  • 20
    • 0018444418 scopus 로고
    • Secure databases: Protection against user influence
    • David P. Dobkin, Anita K. Jones, and Richard J. Lipton. Secure databases: Protection against user influence. ACM Trans. Database Syst., 4(1):97–106, 1979.
    • (1979) ACM Trans. Database Syst , vol.4 , Issue.1 , pp. 97-106
    • Dobkin, D.P.1    Jones, A.K.2    Lipton, R.J.3
  • 22
    • 0035694218 scopus 로고    scopus 로고
    • Bounds for cell entries in contingency tables induced by fixed marginal totals with applications to disclosure limitation
    • A. Dobra and S. E. Fienberg. Bounds for cell entries in contingency tables induced by fixed marginal totals with applications to disclosure limitation. Statistical journal of the united states, 18:363–371, 2001.
    • (2001) Statistical Journal of the United States , vol.18 , pp. 363-371
    • Dobra, A.1    Fienberg, S.E.2
  • 23
    • 0347432366 scopus 로고    scopus 로고
    • Preserving confidentiality of high-dimensional tabulated data: Statistical and computational issues
    • A. Dobra, A. Karr, and A. Sanil. Preserving confidentiality of high-dimensional tabulated data: Statistical and computational issues. Statistics and Computing, 13:363–370, 2003.
    • (2003) Statistics and Computing , vol.13 , pp. 363-370
    • Dobra, A.1    Karr, A.2    Sanil, A.3
  • 24
    • 84949438251 scopus 로고    scopus 로고
    • Advances in inference control in statistical databases: An overview
    • Josep Domingo-Ferrer. Advances in inference control in statistical databases: An overview. In Inference Control in Statistical Databases, pages 1–7, 2002.
    • (2002) Inference Control in Statistical Databases , pp. 1-7
    • Domingo-Ferrer, J.1
  • 25
    • 0036190566 scopus 로고    scopus 로고
    • Practical data-oriented microaggregation for statistical disclosure control
    • Josep Domingo-Ferrer and Josep Maria Mateo-Sanz. Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans. Knowl. Data Eng., 14(1):189–201, 2002.
    • (2002) IEEE Trans. Knowl. Data Eng , vol.14 , Issue.1 , pp. 189-201
    • Domingo-Ferrer, J.1    Mateo-Sanz, J.M.2
  • 26
    • 12244265258 scopus 로고    scopus 로고
    • The inference problem: A survey
    • Csilla Farkas and Sushil Jajodia. The inference problem: A survey. SIGKDD Explorations, 4(2):6–11, 2002.
    • (2002) SIGKDD Explorations , vol.4 , Issue.2 , pp. 6-11
    • Farkas, C.1    Jajodia, S.2
  • 27
    • 0035410523 scopus 로고    scopus 로고
    • Solving the cell suppression problem on tabular data with linear constraints
    • M. Fischetti and J. Salazar. Solving the cell suppression problem on tabular data with linear constraints. Management sciences, 47(7):1008–1027, 2001.
    • (2001) Management Sciences , vol.47 , Issue.7 , pp. 1008-1027
    • Fischetti, M.1    Salazar, J.2
  • 28
    • 0035410523 scopus 로고    scopus 로고
    • Solving the cell suppression problem on tabular data with linear constraints
    • M. Fischetti and J. J. Salazar. Solving the cell suppression problem on tabular data with linear constraints. Management Sciences, 47:1008–1026, 2000.
    • (2000) Management Sciences , vol.47 , pp. 1008-1026
    • Fischetti, M.1    Salazar, J.J.2
  • 29
    • 0345832325 scopus 로고    scopus 로고
    • Partial cell suppression: A new methodology for statistical disclosure control
    • M. Fischetti and J. J. Salazar. Partial cell suppression: a new methodology for statistical disclosure control. Statistics and Computing, 13:13–21, 2003.
    • (2003) Statistics and Computing , vol.13 , pp. 13-21
    • Fischetti, M.1    Salazar, J.J.2
  • 30
    • 29844458622 scopus 로고    scopus 로고
    • Deriving private information from randomized data
    • Zhengli Huang, Wenliang Du, and Biao Chen. Deriving private information from randomized data. In SIGMOD Conference, pages 37–48, 2005.
    • (2005) SIGMOD Conference , pp. 37-48
    • Huang, Z.1    Wenliang, D.2    Chen, B.3
  • 31
    • 0242625276 scopus 로고    scopus 로고
    • Iyengar. Transforming data to satisfy privacy constraints
    • Vijay S. Iyengar. Transforming data to satisfy privacy constraints. In KDD, pages 279–288, 2002.
    • (2002) KDD , pp. 279-288
    • Vijay, S.1
  • 32
    • 78149340011 scopus 로고    scopus 로고
    • QiWang, and Krishnamoorthy Sivakumar. On the privacy preserving properties of random data perturbation techniques
    • Hillol Kargupta, Souptik Datta, QiWang, and Krishnamoorthy Sivakumar. On the privacy preserving properties of random data perturbation techniques. In ICDM, pages 99–106, 2003.
    • (2003) ICDM , pp. 99-106
    • Kargupta, H.1    Datta, S.2
  • 34
    • 84957800404 scopus 로고    scopus 로고
    • Preventing interval-based inference by random data perturbation
    • Yingjiu Li, Lingyu Wang, and Sushil Jajodia. Preventing interval-based inference by random data perturbation. In Privacy Enhancing Technologies, pages 160–170, 2002.
    • (2002) Privacy Enhancing Technologies , pp. 160-170
    • Li, Y.1    Wang, L.2    Jajodia, S.3
  • 35
    • 31344447750 scopus 로고    scopus 로고
    • Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
    • Kun Liu, Hillol Kargupta, and Jessica Ryan. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng., 18(1):92–106, 2006.
    • (2006) IEEE Trans. Knowl. Data Eng , vol.18 , Issue.1 , pp. 92-106
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 36
    • 0033207750 scopus 로고    scopus 로고
    • A general aditive data perturbation method for database security
    • K. Muralidhar and R. Sarathy. A general aditive data perturbation method for database security. Management Sciences, 45:1399–1415, 2002.
    • (2002) Management Sciences , vol.45 , pp. 1399-1415
    • Muralidhar, K.1    Sarathy, R.2
  • 38
    • 0019546487 scopus 로고
    • Security of statistical databases: Multidimensional transformation
    • Jan Schlörer. Security of statistical databases: Multidimensional transformation. ACM Trans. Database Syst., 6(1):95–112, 1981.
    • (1981) ACM Trans. Database Syst , vol.6 , Issue.1 , pp. 95-112
    • Schlörer, J.1
  • 39
    • 0020798007 scopus 로고
    • Information loss in partitioned statistical databases
    • Jan Schlörer. Information loss in partitioned statistical databases. Comput. J., 26(3):218–223, 1983.
    • (1983) Comput. J , vol.26 , Issue.3 , pp. 218-223
    • Schlörer, J.1
  • 40
    • 84958980640 scopus 로고    scopus 로고
    • John von Neumann Lectures 2003 at the Technical University München
    • Bernd Sturmfels. Week 1: Two-way contingency tables, 2003. John von Neumann Lectures 2003 at the Technical University München. http://wwwm10.mathematik.tu-muenchen.de/neumann/lecturenotes/neumannweek1.pdf.
    • (2003) Week 1: Two-Way Contingency Tables
    • Sturmfels, B.1
  • 42
    • 0021622802 scopus 로고
    • The statistical security of a statistical database
    • J. F. Traub, Yechiam Yemini, and Henryk Wozniakowski. The statistical security of a statistical database. ACM Trans. Database Syst., 9(4):672–679, 1984.
    • (1984) ACM Trans. Database Syst , vol.9 , Issue.4 , pp. 672-679
    • Traub, J.F.1    Yemini, Y.2    Wozniakowski, H.3
  • 43
    • 19544380211 scopus 로고    scopus 로고
    • Bottom-up generalization: A data mining solution to privacy protection
    • Ke Wang, Philip S. Yu, and Sourav Chakraborty. Bottom-up generalization: A data mining solution to privacy protection. In ICDM, pages 249–256, 2004.
    • (2004) ICDM , pp. 249-256
    • Ke, W.1    Philip, S.Y.2    Chakraborty, S.3
  • 45
    • 0142219258 scopus 로고    scopus 로고
    • Precisely answering multi-dimensional range queries without privacy breaches
    • Lingyu Wang, Yingjiu Li, Duminda Wijesekera, and Sushil Jajodia. Precisely answering multi-dimensional range queries without privacy breaches. In ESORICS, pages 100–115, 2003.
    • (2003) ESORICS , pp. 100-115
    • Wang, L.1    Li, Y.2    Wijesekera, D.3    Jajodia, S.4
  • 47
    • 33745599656 scopus 로고    scopus 로고
    • Checking for k-anonymity violation by views
    • Chao Yao, Xiaoyang Sean Wang, and Sushil Jajodia. Checking for k-anonymity violation by views. In VLDB, pages 910–921, 2005.
    • (2005) VLDB , pp. 910-921
    • Yao, C.1    Wang, X.S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.