{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:29:21Z","timestamp":1725474561163},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540689621"},{"type":"electronic","value":"9783540689638"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11961635_25","type":"book-chapter","created":{"date-parts":[[2006,11,27]],"date-time":"2006-11-27T18:56:45Z","timestamp":1164653805000},"page":"349-352","source":"Crossref","is-referenced-by-count":1,"title":["Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract)"],"prefix":"10.1007","author":[{"given":"Haibing","family":"Lu","sequence":"first","affiliation":[]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xintao","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"25_CR1","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N.R. Adam","year":"1989","unstructured":"Adam, N.R., Wortmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Computing Surveys\u00a021(4), 515\u2013556 (1989)","journal-title":"ACM Computing Surveys"},{"issue":"2","key":"25_CR2","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/S0378-3758(02)00392-0","volume":"117","author":"L.H. Cox","year":"2003","unstructured":"Cox, L.H.: On properties of multi-dimensional statistical tables. Journal of Statistical Planning and Inference\u00a0117(2), 251\u2013273 (2003)","journal-title":"Journal of Statistical Planning and Inference"},{"key":"25_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-47804-3_1","volume-title":"Inference Control in Statistical Databases","author":"J. Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J.: Advances in inference control in statistical databases: An overview. In: Domingo-Ferrer, J. (ed.) Inference Control in Statistical Databases. LNCS, vol.\u00a02316, pp. 1\u20137. Springer, Heidelberg (2002)"},{"key":"25_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/11930242_6","volume-title":"Privacy in Statistical Databases","author":"H. Lu","year":"2006","unstructured":"Lu, H., Li, Y., Wu, X.: Disclosure analysis for two-way contingency tables. In: Domingo-Ferrer, J., Franconi, L. (eds.) PSD 2006. LNCS, vol.\u00a04302, pp. 57\u201367. Springer, Heidelberg (2006)"},{"key":"25_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-4028-0","volume-title":"Statistical Disclosure Control in Practice","author":"L. Willenborg","year":"1996","unstructured":"Willenborg, L., de Walal, T.: Statistical Disclosure Control in Practice. Springer, Heidelberg (1996)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11961635_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:22:21Z","timestamp":1619508141000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11961635_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540689621","9783540689638"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/11961635_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}