skip to main content
10.1145/113413.113436acmconferencesArticle/Chapter ViewAbstractPublication PagespodsConference Proceedingsconference-collections
Article
Free Access

Suppressing marginal cells to protect sensitive information in a two-dimensional statistical table (extended abstract)

Authors Info & Claims
Published:01 April 1991Publication History
First page image

References

  1. 1.N.R. Adam and J.C. Wortmann, Security control methods for statistical databases" a comparative study, ACM Computing Surveys 21 {1989}, 515- 556. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.J.A. Bondy and U.S.R. Murty, Graph Theory wzth Apphcatioas, North-Holland, 1984.Google ScholarGoogle Scholar
  3. 3.F.Y. Chin and G. 5zsoyo#lu, Auditing and inference control in statistical databases, IEEE Trans. Software Engineering 8 {1982}, 574-582.Google ScholarGoogle Scholar
  4. 4.L.H. Cox, Suppression methodotoly and statistical disclosure control, J. Amemcaa Statistical Association 75 (1980}, 377-385.Google ScholarGoogle ScholarCross RefCross Ref
  5. 5.D. Denning, Cryptography and Data Security, Addison-Wesley, Reading, MA, 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.D. Denning and J. SchlSrer, Inference controls for statistical databases, IEEE Computer 16 {1983), 69-82.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.S. Even, Graph Algorithms, Computer Science Press, Potomac, Maryland, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.R.S. Garfinkel and G.L. Nemhauser, Integer Programming, Wiley, 1972.Google ScholarGoogle Scholar
  9. 9.D. Gusfield, A graph theoretic approach to statistical data security, SIAM J. Comput. 17 {1988), 552-571. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.F.M. Malvestuto and M. Moscarini, Aggregate evaluability in statistical databases. Proc. 15-th Int. Conf. on Very Large Data Bases, 279-286, Amsterdam, August 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.F.M. Malvestuto and M. Moscarini, Algebraic edge sets in graphs, Technical Report ENEA RT/STUDI/89/4, 1989.Google ScholarGoogle Scholar
  12. 12.F.M. Malvestuto and M. Moscarini, Query evaluability in statistical databases, IEEE Trans. on Knowledge and Data Engineering P 4 (1990). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.G. 5zsoyo#lu and J. Chung, Information loss in the lattice model of summary tables due to cell suppression, Proceedings of IEEE Symposium on Security and Pmvacy 75-83, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Suppressing marginal cells to protect sensitive information in a two-dimensional statistical table (extended abstract)

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            PODS '91: Proceedings of the tenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
            April 1991
            341 pages
            ISBN:0897914309
            DOI:10.1145/113413

            Copyright © 1991 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 April 1991

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate642of2,707submissions,24%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader