- 1.N.R. Adam and J.C. Wortmann, Security control methods for statistical databases" a comparative study, ACM Computing Surveys 21 {1989}, 515- 556. Google ScholarDigital Library
- 2.J.A. Bondy and U.S.R. Murty, Graph Theory wzth Apphcatioas, North-Holland, 1984.Google Scholar
- 3.F.Y. Chin and G. 5zsoyo#lu, Auditing and inference control in statistical databases, IEEE Trans. Software Engineering 8 {1982}, 574-582.Google Scholar
- 4.L.H. Cox, Suppression methodotoly and statistical disclosure control, J. Amemcaa Statistical Association 75 (1980}, 377-385.Google ScholarCross Ref
- 5.D. Denning, Cryptography and Data Security, Addison-Wesley, Reading, MA, 1982. Google ScholarDigital Library
- 6.D. Denning and J. SchlSrer, Inference controls for statistical databases, IEEE Computer 16 {1983), 69-82.Google ScholarDigital Library
- 7.S. Even, Graph Algorithms, Computer Science Press, Potomac, Maryland, 1979. Google ScholarDigital Library
- 8.R.S. Garfinkel and G.L. Nemhauser, Integer Programming, Wiley, 1972.Google Scholar
- 9.D. Gusfield, A graph theoretic approach to statistical data security, SIAM J. Comput. 17 {1988), 552-571. Google ScholarDigital Library
- 10.F.M. Malvestuto and M. Moscarini, Aggregate evaluability in statistical databases. Proc. 15-th Int. Conf. on Very Large Data Bases, 279-286, Amsterdam, August 1989. Google ScholarDigital Library
- 11.F.M. Malvestuto and M. Moscarini, Algebraic edge sets in graphs, Technical Report ENEA RT/STUDI/89/4, 1989.Google Scholar
- 12.F.M. Malvestuto and M. Moscarini, Query evaluability in statistical databases, IEEE Trans. on Knowledge and Data Engineering P 4 (1990). Google ScholarDigital Library
- 13.G. 5zsoyo#lu and J. Chung, Information loss in the lattice model of summary tables due to cell suppression, Proceedings of IEEE Symposium on Security and Pmvacy 75-83, 1986. Google ScholarDigital Library
Index Terms
- Suppressing marginal cells to protect sensitive information in a two-dimensional statistical table (extended abstract)
Recommendations
Censoring Statistical Tables to Protect Sensitive Information: Easy and Hard Problems
SSDBM '96: Proceedings of the Eighth International Conference on Scientific and Statistical Database ManagementProtecting sensitive information in a two-dimensional table asked for by a statistical user of a database raises computational problems involving both the query system which should guarantee the data security, and the user who should be able to disclose ...
Suppressing marginal totals from a two-dimensional table to protect sensitive information
The technique of data suppression for protecting sensitive information in a two-dimensional table from exact disclosure raises the computational problems of testing a given table of censored data for security, and searching for a secure suppression ...
Disclosure risk in dynamic two-dimensional contingency tables (extended abstract)
ICISS'06: Proceedings of the Second international conference on Information Systems SecurityTwo-dimensional contingency tables are central products of many information organizations such as statistical agencies, census bureaus, and health insurance information agencies. In a contingency table, any sensitive information about individuals must ...
Comments