{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:14:27Z","timestamp":1742951667242,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540443452"},{"type":"electronic","value":"9783540458531"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45853-0_4","type":"book-chapter","created":{"date-parts":[[2007,5,4]],"date-time":"2007-05-04T00:42:13Z","timestamp":1178239333000},"page":"55-71","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Cardinality-Based Inference Control in Sum-Only Data Cubes"],"prefix":"10.1007","author":[{"given":"Lingyu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Duminda","family":"Wijesekera","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,26]]},"reference":[{"issue":"4","key":"4_CR1","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N. R. Adam","year":"1989","unstructured":"N. R. Adam and J. C. Wortmann. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys, 21(4):515\u2013556, 1989.","journal-title":"ACM Computing Surveys"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the Twentieth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, pages 247\u2013255, 2001.","DOI":"10.1145\/375551.375602"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"R. Agrawal and R. Srikant. Privacy-preserving data mining. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, pages 439\u2013450, 2000.","DOI":"10.1145\/335191.335438"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"D. Barbar\u00e1 and X. Wu. Using approximations to scale exploratory data analysis in datacubes. In Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 382\u2013386, 1999.","DOI":"10.1145\/312129.312288"},{"issue":"3","key":"4_CR5","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1145\/320613.320617","volume":"5","author":"L. L. Beck","year":"1980","unstructured":"L. L. Beck. A security mechanism for statistical databases. ACM Trans. on Database Systems, 5(3):316\u2013338, 1980.","journal-title":"ACM Trans. on Database Systems"},{"issue":"6","key":"4_CR6","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/69.895801","volume":"12","author":"A. Brodsky","year":"2000","unstructured":"A. Brodsky, C. Farkas, and S. Jajodia. Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowledge and Data Engineering, 12(6):900\u2013919, 2000.","journal-title":"IEEE Trans. Knowledge and Data Engineering"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"A. Brodsky, C. Farkas, D. Wijesekera, and X. S. Wang. Constraints, inference channels and secure databases. In the 6th International Conference on Principles and Practice of Constraint Programming, pages 98\u2013113, 2000.","DOI":"10.1007\/3-540-45349-0_9"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/0304-3975(84)90025-2","volume":"32","author":"F.Y. Chin","year":"1984","unstructured":"F.Y. Chin, P. Kossowski, and S.C. Loh. Efficient inference control for range sum queries. Theoretical Computer Science, 32:77\u201386, 1984.","journal-title":"Theoretical Computer Science"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"F.Y. Chin and G. \u00d6zsoyoglu. Security in partitioned dynamic statistical databases. In Proc. of IEEE COMPS AC, pages 594\u2013601, 1979.","DOI":"10.1109\/CMPSAC.1979.762564"},{"issue":"1","key":"4_CR10","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1145\/319540.319558","volume":"6","author":"F.Y. Chin","year":"1981","unstructured":"F.Y. Chin and G. \u00d6zsoyoglu. Statistical database design. ACM Trans. on Database Systems, 6(1):113\u2013139, 1981.","journal-title":"ACM Trans. on Database Systems"},{"issue":"6","key":"4_CR11","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TSE.1982.236161","volume":"8","author":"F.Y. Chin","year":"1982","unstructured":"F.Y. Chin and G. \u00d6zsoyoglu. Auditing and inference control in statistical databases. IEEE Trans. on Software Engineering, 8(6):574\u2013582, 1982.","journal-title":"IEEE Trans. on Software Engineering"},{"issue":"370","key":"4_CR12","doi-asserted-by":"publisher","first-page":"377","DOI":"10.2307\/2287463","volume":"75","author":"L. H. Cox","year":"1980","unstructured":"L. H. Cox. Suppression methodology and statistical disclosure control. Journal of American Statistic Association, 75(370):377\u2013385, 1980.","journal-title":"Journal of American Statistic Association"},{"issue":"3","key":"4_CR13","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1145\/320613.320616","volume":"5","author":"D.E. Denning","year":"1980","unstructured":"D.E. Denning. Secure statistical databases with random sample queries. ACM Trans. on Database Systems, 5(3):291\u2013315, 1980.","journal-title":"ACM Trans. on Database Systems"},{"issue":"3","key":"4_CR14","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/356778.356782","volume":"11","author":"D.E. Denning","year":"1979","unstructured":"D.E. Denning and P. J. Denning. Data security. ACM computing surveys, 11(3):227\u2013249, 1979.","journal-title":"ACM computing surveys"},{"issue":"7","key":"4_CR15","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MC.1983.1654444","volume":"16","author":"D. E. Denning","year":"1983","unstructured":"D. E. Denning and J. Schl\u00f6rer. Inference controls for statistical databases. IEEE Computer, 16(7):69\u201382, 1983.","journal-title":"IEEE Computer"},{"issue":"1","key":"4_CR16","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/320064.320068","volume":"4","author":"D. Dobkin","year":"1979","unstructured":"D. Dobkin, A. K. Jones, and R. J. Lipton. Secure databases: protection against user influence. ACM Trans. on Database Systems, 4(1):97\u2013106, 1979.","journal-title":"ACM Trans. on Database Systems"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke. Privacy preserving mining of association rules. In Proceedings of the 8th Conference on Knowledge Discovery and Data Mining (KDD\u201902), 2002.","DOI":"10.1145\/775047.775080"},{"issue":"337","key":"4_CR18","doi-asserted-by":"publisher","first-page":"7","DOI":"10.2307\/2284695","volume":"67","author":"L. P. Fellegi","year":"1972","unstructured":"L. P. Fellegi. On the qestion of statistical confidentiality. Journal of American Statistic Association, 67(337):7\u201318, 1972.","journal-title":"Journal of American Statistic Association"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"J. Gray, A. Bosworth, A. Layman, and H. Pirahesh. Data cube: A relational operator generalizing group-by, crosstab and sub-totals. In Proceedings of the 12th International Conference on Data Engineering, pages 152\u2013159, 1996.","DOI":"10.1109\/ICDE.1996.492099"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"V. Harinarayan, A. Rajaraman, and J. D. Ullman. Implementing data cubes efficiently. In Proceedings of the 1996 ACM SIGMOD international conference on Management of data, pages 205\u2013227, 1996.","DOI":"10.1145\/233269.233333"},{"key":"4_CR21","unstructured":"K. Hoffman. Linear Algebra. Prentice-Hall, 1961."},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"J. Kleinberg, C. Papadimitriou, and P. Raghavan. Auditing boolean attributes. In Proc. of the 9th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pages 86\u201391, 2000.","DOI":"10.1145\/335168.335210"},{"key":"4_CR23","unstructured":"Y. Li, L. Wang, X. S. Wang, and S. Jajodia. Auditing interval-based inference. In Proceedings of the 14th Conference on Advanced Information Systems Engineering (CAiSE\u201902), 2001."},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"F. M. Malvestuto and M. Moscarini. Computational issues connected with the protection of sensetive statistics by auditing sum-queries. In Proc. of IEEE Scientific and Statistical Database Management, pages 134\u2013144, 1998.","DOI":"10.1109\/SSDM.1998.688118"},{"key":"4_CR25","unstructured":"J. M. Mateo-Sanz and J. Domingo-Ferrer. A method for data-oriented multi-variate microaggregation. In Proceedings of the Conference on Statistical Data Protection\u201998, pages 89\u201399, 1998."},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"S. Rizvi and J.R. Haritsa. Maintaining data privacy in association rule mining. In Proceedings of the 28th Conference on Very Large Data Base (VLDB\u201902), 2002.","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"issue":"1","key":"4_CR27","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/319540.319555","volume":"6","author":"J. Schl\u00f6rer","year":"1981","unstructured":"J. Schl\u00f6rer. Security of statistical databases: multidimensional transformation. ACM Trans. on Database Systems, 6(1):95\u2013112, 1981.","journal-title":"ACM Trans. on Database Systems"},{"key":"4_CR28","unstructured":"R. P. Tewarson. Sparse Matrices. Academic Press, 1973."},{"issue":"4","key":"4_CR29","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1145\/1994.383392","volume":"9","author":"J. F. Traub","year":"1984","unstructured":"J. F. Traub, Y. Yemini, and H. Wo\u017aniakowski. The statistical security of a statistical database. ACM Trans. on Database Systems, 9(4):672\u2013679, 1984.","journal-title":"ACM Trans. on Database Systems"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"L. Wang, D. Wijesekera, and J. Sushil. Cardinality-based inference control in sum-only data cubes (extended version). Technical Report, 2002. Available at http:\/\/ise.gmu.edu\/techrep\/ .","DOI":"10.1007\/3-540-45853-0_4"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45853-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T01:54:58Z","timestamp":1736992498000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45853-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540443452","9783540458531"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/3-540-45853-0_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"26 September 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}