25
Views
1
CrossRef citations to date
0
Altmetric
Special Issue Paper

Exact and heuristic methods for cell suppression in multi-dimensional linked tables

, , &
Pages 291-304 | Received 01 Jun 2009, Accepted 01 Jun 2010, Published online: 21 Dec 2017

References

  • AlmeidaMTSchützGCarvalhoFDCell suppression problem: A genetic-based approachComput Opns Res2008351613162310.1016/j.cor.2006.09.004
  • BradleySPHaxACMagnantiTLApplied Mathematical Programming1977
  • CauseyBDCoxLHErnstLRApplication of transportation theory to statistical problemsJASA19858090390910.1080/01621459.1985.10478201
  • CoxLHSuppression methodology and statistical disclosure controlJASA19807537738510.1080/01621459.1980.10477481
  • CoxLHA constructive procedure for unbiased controlled roundingJASA19878252052410.1080/01621459.1987.10478456
  • Cox LH (1992). Solving confidentiality protection problems in tabulations using network optimization: A network model for cell suppression in U.S. economic censuses. International Seminar on Statistical Confidentiality. Eurostat, Dublin, Ireland, pp 229–245.
  • CoxLHNetwork models for complementary cell suppressionJASA1995901453146210.1080/01621459.1995.10476652
  • De CarvalhoFDDellaertNOsorioMSStatistical disclosure in two-dimensional tables: General tablesJASA1994891547155710.1080/01621459.1994.10476895
  • Dobra A and Fienberg SE (2000). Bounds for cell entries in contingency tables given marginal totals and decomposable graphs. Proceedings of the National Academy of Sciences of the United States of America 97 (22): 11885–11892.
  • DuncanGTFienbergSObtaining information while preserving privacy: A Markov perturbation method for tabular dataStatistical Data Protection (SDP ‘98) Proceedings1999351362
  • DuncanGTLambertDThe risk of disclosure for microdataJ Bus Econ Stat19897207217
  • DuncanGTMukherjeeSConfidentiality within computer databasesStat Appl19946227239
  • DuncanGTMukherjeeSOptimal disclosure limitation strategy in statistical databases’ deterring tracker attacks through additive noiseJASA20009572072910.1080/01621459.2000.10474260
  • Duncan GT, Krishnan R, Padman R and Roehrig S (1998). Inference of three-way table entries from two-dimensional projections. In: Proceedings of HICSS ’98, IEEE Computer Society: Washington, DC, pp 204–212.
  • Dutta ChowdhurySDuncanGTKrishnanRRoehrigSMukherjeeSDisclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operatorsMngt Sci1999451710172310.1287/mnsc.45.12.1710
  • EvansTZayatzLSlantaJUsing Noise for Disclosure Limitation of Establishment Tabular Data1996
  • FellegiIPOn the question of statistical confidentialityJASA19726771810.1080/01621459.1972.10481199
  • FischettiMSalazarJJModels and algorithms for optimizing cell suppression in tabular data with linear constraintsJASA200095915928
  • Geurts J (1992). Heuristics for cell suppression in tables. Working paper, Netherlands Central Bureau of Statistics.
  • GloverFLagunaMTabu Search1997
  • GopalRDGoesPBGarfinkelRInterval protection of confidential information in a databaseINFORMS JOC19981030932210.1287/ijoc.10.3.309
  • Kelly JP (1990). Confidentiality protection in two and three-dimensional tables. PhD Thesis, University of Maryland, College Park, MD.
  • KellyJPGoldenBLAssadAAUsing simulated annealing to solve controlled rounding problemsORSA JOC1990217418510.1287/ijoc.2.2.174
  • KellyJPGoldenBLAssadAACell suppression: Disclosure protection for sensitive tabular dataNetworks19922239741710.1002/net.3230220407
  • Lougee-Heimer R (1989). Guaranteeing confidentiality: The protection of tabular data. Masters Thesis, Department of Mathematical Sciences, Clemson University.
  • MuralidharKBatraDKirsPJAccessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approachMng Sci1995411549156410.1287/mnsc.41.9.1549
  • Nargundkar MS and Saveland W (1972). Random-rounding of tables to prevent statistical disclosures. In: Proceedings of the American Statistical Association, Washington, DC, ASA: Alexandria, VA, pp 382–385.
  • Smith JE, Clark A and Staggemeier A (2009). A genetic approach to statistical disclosure control. In: Raidl G (ed.) Proceedings of Gecco, the ACM-SIGEVO Conference on Evolutionary Computation, ACM: New York, USA, pp 1625–1632.
  • Sullivan CM and Rowe E (1992). A data structure and linear programming technique to facilitate cell suppression strategies. In: Proceedings of the Section on Survey Research Methods, American Statistical Association: Washington, DC, pp 685–690.
  • Sullivan CM and Zayatz L (1991). A network flow disclosure avoidance system applied to the census of agriculture. In: Proceedings of the Section on Survey Research Methods, American Statistical Association: Washington: DC, pp 363–368.
  • WillenborgLDe WaalAGStatistical Disclosure Control in Practice1996
  • WillenborgLHundepoolAARGUS for statistical disclosure controlStatistical Data Protection (SDP ‘98) Proceedings1998227242
  • Willenborg L, De Waal AG and Keller WJ (1996). Some Methodological Issues in Statistical Disclosure Control. Fundacao Instituto Brasileiro de Geographica e Estatistica.
  • Zayatz L (1992). Using linear programming methodology for disclosure avoidance purposes I. Research Report, Statistical Research Division, Bureau of the Census, Washington, D.C.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.