{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:00:12Z","timestamp":1725894012401},"publisher-location":"Berlin, Heidelberg","reference-count":47,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540493303"},{"type":"electronic","value":"9783540493327"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11930242_6","type":"book-chapter","created":{"date-parts":[[2006,11,27]],"date-time":"2006-11-27T08:22:29Z","timestamp":1164615749000},"page":"57-67","source":"Crossref","is-referenced-by-count":2,"title":["Disclosure Analysis for Two-Way Contingency Tables"],"prefix":"10.1007","author":[{"given":"Haibing","family":"Lu","sequence":"first","affiliation":[]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xintao","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"6_CR1","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N.R. Adam","year":"1989","unstructured":"Adam, N.R., Wortmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Computing Surveys\u00a021(4), 515\u2013556 (1989)","journal-title":"ACM Computing Surveys"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: PODS (2001)","DOI":"10.1145\/375551.375602"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: SIGMOD Conference, pp. 439\u2013450 (2000)","DOI":"10.1145\/335191.335438"},{"issue":"3","key":"6_CR4","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1145\/320613.320617","volume":"5","author":"L.L. Beck","year":"1980","unstructured":"Beck, L.L.: A security mechanism for statistical databases. ACM Trans. Database Syst.\u00a05(3), 316\u2013338 (1980)","journal-title":"ACM Trans. Database Syst."},{"issue":"6","key":"6_CR5","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/69.895801","volume":"12","author":"A. Brodsky","year":"2000","unstructured":"Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl. Data Eng.\u00a012(6), 900\u2013919 (2000)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"6_CR6","unstructured":"Buzzigoli, L., Giusti, A.: An algorithm to calculate the lower and upper bounds of the elements of an array given its marginals. In: Proceedings of the conference for statistical data protection, pp. 131\u2013147 (1999)"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"903","DOI":"10.2307\/2288551","volume":"80","author":"B.D. Causey","year":"1985","unstructured":"Causey, B.D., Cox, L.H., Ernst, L.R.: Applications of transportation theory to statistical problems. Journal of the American Statistical Association\u00a080, 903\u2013909 (1985)","journal-title":"Journal of the American Statistical Association"},{"key":"6_CR8","unstructured":"Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: ICDM, pp. 589\u2013592 (2005)"},{"issue":"1","key":"6_CR9","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1145\/319540.319558","volume":"6","author":"F.Y.L. Chin","year":"1981","unstructured":"Chin, F.Y.L., \u00d6zsoyoglu, G.: Statistical database design. ACM Trans. Database Syst.\u00a06(1), 113\u2013139 (1981)","journal-title":"ACM Trans. Database Syst."},{"issue":"6","key":"6_CR10","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TSE.1982.236161","volume":"8","author":"F.Y.L. Chin","year":"1982","unstructured":"Chin, F.Y.L., \u00d6zsoyoglu, G.: Auditing and inference control in statistical databases. IEEE Trans. Software Eng.\u00a08(6), 574\u2013582 (1982)","journal-title":"IEEE Trans. Software Eng."},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"1710","DOI":"10.1287\/mnsc.45.12.1710","volume":"45","author":"S. Chowdhury","year":"1999","unstructured":"Chowdhury, S., Duncan, G., Krishnan, R., Roehrig, S., Mukherjee, S.: Disclosure detection in multivariate categorical databases: auditing confidentiality protection through two new matrix operators. Management Sciences\u00a045, 1710\u20131723 (1999)","journal-title":"Management Sciences"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Cox, L.: Bounding entries in 3-dimensional contingency tables. In: SDC: From Theory to Practice (2001), \n                    \n                      http:\/\/vneumann.etse.urv.es\/amrads\/papers\/coxlux.pdf","DOI":"10.1007\/3-540-47804-3_3"},{"issue":"2","key":"6_CR13","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/S0378-3758(02)00392-0","volume":"117","author":"L. Cox","year":"2003","unstructured":"Cox, L.: On properties of multi-dimensional statistical tables. Journal of Statistical Planning and Inference\u00a0117(2), 251\u2013273 (2003)","journal-title":"Journal of Statistical Planning and Inference"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"377","DOI":"10.2307\/2287463","volume":"75","author":"L.H. Cox","year":"1980","unstructured":"Cox, L.H.: Suppression methodology and statistical disclosure control. Journal of American Statistical Association\u00a075, 377\u2013385 (1980)","journal-title":"Journal of American Statistical Association"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"520","DOI":"10.2307\/2289455","volume":"82","author":"L.H. Cox","year":"1987","unstructured":"Cox, L.H.: A constructive procedure for unbiased controlled rounding. Journal of the American Statistical Association\u00a082, 520\u2013524 (1987)","journal-title":"Journal of the American Statistical Association"},{"issue":"1-4","key":"6_CR16","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/BF02216926","volume":"20","author":"L.H. Cox","year":"1989","unstructured":"Cox, L.H., George, J.A.: Controlled rounding for tables with subtotals. Annuals of operations research\u00a020(1-4), 141\u2013157 (1989)","journal-title":"Annuals of operations research"},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"1453","DOI":"10.2307\/2291538","volume":"90","author":"L.H. Cox","year":"1995","unstructured":"Cox, L.H.: Network models for complementary cell suppression. Journal of the American Statistical Association\u00a090, 1453\u20131462 (1995)","journal-title":"Journal of the American Statistical Association"},{"key":"6_CR18","unstructured":"Dandekar, R.A., Cox, L.H.: Synthetic tabular data: An alternative to complementary cell suppression. Manuscript available from URL, \n                    \n                      http:\/\/mysite.verizon.net\/vze7w8vk\/"},{"issue":"7","key":"6_CR19","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MC.1983.1654444","volume":"16","author":"D.E. Denning","year":"1983","unstructured":"Denning, D.E., Schlorer, J.: Inference controls for statistical databases. IEEE Computer\u00a016(7), 69\u201382 (1983)","journal-title":"IEEE Computer"},{"issue":"1","key":"6_CR20","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/320064.320068","volume":"4","author":"D.P. Dobkin","year":"1979","unstructured":"Dobkin, D.P., Jones, A.K., Lipton, R.J.: Secure databases: Protection against user influence. ACM Trans. Database Syst.\u00a04(1), 97\u2013106 (1979)","journal-title":"ACM Trans. Database Syst."},{"issue":"22","key":"6_CR21","doi-asserted-by":"publisher","first-page":"11885","DOI":"10.1073\/pnas.97.22.11885","volume":"97","author":"A. Dobra","year":"2000","unstructured":"Dobra, A., Fienberg, S.E.: Bounds for cell entries in contingency tables given fixed marginal totals and decomposable graphs. Proceedings of the National Academy of Sciences of the United States of America\u00a097(22), 11885\u201311892 (2000)","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"key":"6_CR22","first-page":"363","volume":"18","author":"A. Dobra","year":"2001","unstructured":"Dobra, A., Fienberg, S.E.: Bounds for cell entries in contingency tables induced by fixed marginal totals with applications to disclosure limitation. Statistical journal of the united states\u00a018, 363\u2013371 (2001)","journal-title":"Statistical journal of the united states"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1023\/A:1025671023941","volume":"13","author":"A. Dobra","year":"2003","unstructured":"Dobra, A., Karr, A., Sanil, A.: Preserving confidentiality of high-dimensional tabulated data: Statistical and computational issues. Statistics and Computing\u00a013, 363\u2013370 (2003)","journal-title":"Statistics and Computing"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer, J.: Advances in inference control in statistical databases: An overview. In: Inference Control in Statistical Databases, pp. 1\u20137 (2002)","DOI":"10.1007\/3-540-47804-3_1"},{"issue":"1","key":"6_CR25","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J. Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J.M.: Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans. Knowl. Data Eng.\u00a014(1), 189\u2013201 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"6_CR26","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/772862.772864","volume":"4","author":"C. Farkas","year":"2002","unstructured":"Farkas, C., Jajodia, S.: The inference problem: A survey. SIGKDD Explorations\u00a04(2), 6\u201311 (2002)","journal-title":"SIGKDD Explorations"},{"issue":"7","key":"6_CR27","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1287\/mnsc.47.7.1008.9805","volume":"47","author":"M. Fischetti","year":"2001","unstructured":"Fischetti, M., Salazar, J.: Solving the cell suppression problem on tabular data with linear constraints. Management sciences\u00a047(7), 1008\u20131027 (2001)","journal-title":"Management sciences"},{"key":"6_CR28","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1287\/mnsc.47.7.1008.9805","volume":"47","author":"M. Fischetti","year":"2000","unstructured":"Fischetti, M., Salazar, J.J.: Solving the cell suppression problem on tabular data with linear constraints. Management Sciences\u00a047, 1008\u20131026 (2000)","journal-title":"Management Sciences"},{"key":"6_CR29","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1023\/A:1021927424942","volume":"13","author":"M. Fischetti","year":"2003","unstructured":"Fischetti, M., Salazar, J.J.: Partial cell suppression: a new methodology for statistical disclosure control. Statistics and Computing\u00a013, 13\u201321 (2003)","journal-title":"Statistics and Computing"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: SIGMOD Conference, pp. 37\u201348 (2005)","DOI":"10.1145\/1066157.1066163"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: KDD, pp. 279\u2013288 (2002)","DOI":"10.1145\/775088.775089"},{"key":"6_CR32","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: ICDM, pp. 99\u2013106 (2003)"},{"key":"6_CR33","unstructured":"Li, Y., Lu, H., Deng, R.H.: Practical inference control for data cubes (extended abstract). In: IEEE Symposium on Security and Privacy (2006)"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Li, Y., Wang, L., Jajodia, S.: Preventing interval-based inference by random data perturbation. In: Privacy Enhancing Technologies, pp. 160\u2013170 (2002)","DOI":"10.1007\/3-540-36467-6_12"},{"issue":"1","key":"6_CR35","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TKDE.2006.14","volume":"18","author":"K. Liu","year":"2006","unstructured":"Liu, K., Kargupta, H., Ryan, J.: Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng.\u00a018(1), 92\u2013106 (2006)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"6_CR36","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.1287\/mnsc.45.10.1399","volume":"45","author":"K. Muralidhar","year":"2002","unstructured":"Muralidhar, K., Sarathy, R.: A general aditive data perturbation method for database security. Management Sciences\u00a045, 1399\u20131415 (2002)","journal-title":"Management Sciences"},{"key":"6_CR37","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International (1998)"},{"issue":"1","key":"6_CR38","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/319540.319555","volume":"6","author":"J. Schl\u00f6rer","year":"1981","unstructured":"Schl\u00f6rer, J.: Security of statistical databases: Multidimensional transformation. ACM Trans. Database Syst.\u00a06(1), 95\u2013112 (1981)","journal-title":"ACM Trans. Database Syst."},{"issue":"3","key":"6_CR39","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1093\/comjnl\/26.3.218","volume":"26","author":"J. Schl\u00f6rer","year":"1983","unstructured":"Schl\u00f6rer, J.: Information loss in partitioned statistical databases. Comput. J.\u00a026(3), 218\u2013223 (1983)","journal-title":"Comput. J."},{"key":"6_CR40","unstructured":"Sturmfels, B.: Week 1: Two-way contingency tables, John von Neumann Lectures 2003 at the Technical University M\u00fcnchen (2003), \n                    \n                      http:\/\/www-m10.mathematik.tu-muenchen.de\/neumann\/lecturenotes\/neumann_week1.pdf"},{"issue":"5","key":"6_CR41","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 571\u2013588 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"issue":"4","key":"6_CR42","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1145\/1994.383392","volume":"9","author":"J.F. Traub","year":"1984","unstructured":"Traub, J.F., Yemini, Y., Wozniakowski, H.: The statistical security of a statistical database. ACM Trans. Database Syst.\u00a09(4), 672\u2013679 (1984)","journal-title":"ACM Trans. Database Syst."},{"key":"6_CR43","series-title":"Lecture Notes in Artificial Intelligence","first-page":"249","volume-title":"Advances in Data Mining","author":"K. Wang","year":"2004","unstructured":"Wang, K., Yu, P.S., Chakraborty, S.: Bottom-up generalization: A data mining solution to privacy protection. In: Perner, P. (ed.) ICDM 2004. LNCS (LNAI), vol.\u00a03275, pp. 249\u2013256. Springer, Heidelberg (2004)"},{"key":"6_CR44","unstructured":"Wang, L., Jajodia, S., Wijesekera, D.: Securing olap data cubes against privacy breaches. In: IEEE Symposium on Security and Privacy, pp. 161\u2013175 (2004)"},{"key":"6_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-540-39650-5_6","volume-title":"Computer Security \u2013 ESORICS 2003","author":"L. Wang","year":"2003","unstructured":"Wang, L., Li, Y., Wijesekera, D., Jajodia, S.: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 100\u2013115. Springer, Heidelberg (2003)"},{"key":"6_CR46","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-4028-0","volume-title":"Statistical Disclosure Control in Practice","author":"L. Willenborg","year":"1996","unstructured":"Willenborg, L., de Walal, T.: Statistical Disclosure Control in Practice. Springer, Heidelberg (1996)"},{"key":"6_CR47","unstructured":"Yao, C., Wang, X.S., Jajodia, S.: Checking for k-anonymity violation by views. In: VLDB, pp. 910\u2013921 (2005)"}],"container-title":["Lecture Notes in Computer Science","Privacy in Statistical Databases"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11930242_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:18:33Z","timestamp":1558271913000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11930242_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540493303","9783540493327"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/11930242_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}