128
Views
12
CrossRef citations to date
0
Altmetric
Theory and Method

Models and Algorithms for Optimizing Cell Suppression in Tabular Data with Linear Constraints

&
Pages 916-928 | Received 01 Nov 1998, Published online: 17 Feb 2012

References

  • Applegate , D. , Bixby , R. , Cook , W. and Chvátal , V. 1998 . “CRPC Researchers Solve Traveling Salesman Problem for Record-Breaking 13,509 Cities,” , Rice University, Center for Research on Parallel Computation . Internal Report
  • Caprara , A. and Fischetti , M. 1997 . “Branch-and-Cut Algorithms,” . In Annotated Bibliographies in Combinatorial Optimization , Edited by: Dell'Amico , M. , Maffioli , F. and Martello , S. New York : Wiley .
  • Cox , L. H. 1980 . “Suppression Methodology and Statistical Disclosure Control” . Journal of the American Statistical Association , 75 : 377 – 385 .
  • Cox , L. H. 1995 . “Network Models for Complementary Cell Suppression” . Journal of the American Statistical Association , 90 : 1453 – 1462 .
  • Crowder , H. P. , Johnson , E. L. and Padberg , M. W. 1983 . “Solving Large-Scale Zero-One Linear Programming Problems” . Operations Research , 31 : 803 – 834 .
  • Carvalho , F. D. , Dellaert , N. P. and Osório , M. S. 1994 . “Statistical Disclosure in Two-Dimensional Tables: General Tables” . Journal of the American Statistical Association , 89 : 1547 – 1557 .
  • Dellaert , N. P. and Luijten , W. A. 1996 . “Statistical Disclosure in General Three-Dimensional Tables,” , Tinbergen Institute . Technical Paper TI 96–114/9
  • Fischetti , M. and Salazar , J. J. 1998 . “Models and Algorithms for Cell Suppression in Tabular Data With Linear Constraints,” , University of La Laguna . technical paper, available at webpages.ull.es/users/jjsalaza
  • Fischetti , M. and Salazar , J. J. 1999 . “Models and Algorithms for the 2-Dimensional Cell Suppression Problem in Statistical Disclosure Control” . Mathematical Programming , 84 : 283 – 312 .
  • Geurts , J. 1992 . “Heuristics for Cell Suppression in Tables,” , Netherlands Central Bureau of Statistics . working paper
  • Gusfield , D. 1988 . “A Graph Theoretic Approach to Statistical Data Security” . SIAM Journal on Computing , 17 : 552 – 571 .
  • Kao , M. Y. 1996 . “Data Security Equals Graph Connectivity” . SIAM Journal on Discrete Mathematics , 9 : 87 – 100 .
  • Kelly , J. P. 1990 . “Confidentiality Protection in Two- and Three-Dimensional Tables,” , University of Maryland . unpublished Ph.D. dissertation
  • Kelly , J. P. , Golden , B. L. and Assad , A. A. 1992 . “Cell Suppression: Disclosure Protection for Sensitive Tabular Data” . Networks , 22 : 397 – 417 .
  • Nemhauser , G. L. and Wolsey , L. A. 1988 . Integer and Combinatorial Optimization , New York : Wiley .
  • Padberg , M. and Rinaldi , G. 1991 . “A Branch-and-Cut Algorithm for the Resolution of Large-Scale Symmetric Traveling Salesman Problems” . SIAM Reviews , 33 : 60 – 100 .
  • Robertson , D. A. “Cell Suppression at Statistics Canada,” . Proceedings of the Second International Conference on Statistical Confidentiality . Luxembourg .
  • Sande , G. 1984 . “Automated Cell Suppression to Preserve Confidentiality of Business Statistics” . Statistical Journal of the United Nations ECE , 2 : 33 – 41 .
  • Willenborg , L. C. R.J. and de Waal , T. 1996 . Statistical Disclosure Control in Practice , New York : Springer . Lecture Notes in Statistics 11

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.