{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:02:01Z","timestamp":1725663721510},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540577850"},{"type":"electronic","value":"9783540483328"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-57785-8_185","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T08:21:16Z","timestamp":1330244476000},"page":"723-734","source":"Crossref","is-referenced-by-count":1,"title":["Total protection of analytic invariant information in cross tabulated tables"],"prefix":"10.1007","author":[{"given":"Ming-Yang","family":"Kao","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,31]]},"reference":[{"key":"59_CR1","unstructured":"A. V. Aho, J. E. Hopcroft, and J. D. Ullman, The Design and Analysis of Computer Algorithms, Addison-Wesley, 1974."},{"key":"59_CR2","unstructured":"G. J. Brackstone, L. Chapman, and G. Sande, Protecting the confidentiality of individual statistical records in Canada, in Proc. the Conference of the European Statisticians 31st Plenary Session, Geneva, 1983."},{"key":"59_CR3","volume-title":"Introduction to Algorithms","author":"T. H. Cormen","year":"1991","unstructured":"T. H. Cormen, C. L. Leiserson, and R. L. Rivest, Introduction to Algorithms, The MIT Press, Cambridge, Massachusetts, 1991."},{"key":"59_CR4","unstructured":"L. H. Cox, Disclosure analysis and cell suppression, in Proc. the American Statistical Association, Social Statistics Section, 1975, pp. 380\u2013382."},{"key":"59_CR5","unstructured":"-, Suppression methodology in statistics disclosure, in Proc. the American Statistical Association, Social Statistics Section, 1977, pp. 750\u2013755."},{"key":"59_CR6","unstructured":"-, Automated statistical disclosure control, in Proc. the American Statistical Association, Survey Research Method Section, 1978, pp. 177\u2013182."},{"key":"59_CR7","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1080\/01621459.1980.10477481","volume":"75","author":"L. H. Cox","year":"1980","unstructured":"-, Suppression methodology and statistical disclosure control, Journal of the American Statistical Association, Theory and Method Section, 75 (1980), pp. 377\u2013385.","journal-title":"Journal of the American Statistical Association, Theory and Method Section"},{"key":"59_CR8","unstructured":"L. H. Cox and G. Sande, Techniques for preserving statistical confidentiality, in Proc. the 42nd Session of the International Statistical Institute, the International Association of Survey Statisticians, 1979."},{"key":"59_CR9","unstructured":"D. Denning, Cryptography and Data Security, Addison-Wesley, 1982."},{"key":"59_CR10","unstructured":"M. Garey and D. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, W. H. Freeman and Company, 1979."},{"key":"59_CR11","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1137\/0216041","volume":"16","author":"D. Gusfield","year":"1987","unstructured":"D. Gusfield, Optimal mixed graph augmentation, SIAM J. Comput., 16 (1987), pp. 599\u2013612.","journal-title":"SIAM J. Comput."},{"key":"59_CR12","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1137\/0217034","volume":"17","author":"D. Gusfield","year":"1988","unstructured":"-, A graph theoretic approach to statistical data security, SIAM J. Cornput., 17 (1988), pp. 552\u2013571.","journal-title":"SIAM J. Cornput."},{"key":"59_CR13","unstructured":"M. Y. Kao, Efficient detection and protection of information in cross tabulated tables II: Minimal linear invariants. Submitted, 1992."},{"key":"59_CR14","unstructured":"-, Efficient detection and protection of information in cross tabulated tables III: Data security equals graph connectivity. Submitted, 1992."},{"key":"59_CR15","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1137\/0406037","volume":"6","author":"M. Y. Kao","year":"1993","unstructured":"M. Y. Kao and D. Gusfield, Efficient detection and protection of information in cross tabulated tables I: Linear invariant test, SIAM Journal on Discrete Mathematics, 6 (1993), pp. 460\u2013476.","journal-title":"SIAM Journal on Discrete Mathematics"},{"key":"59_CR16","doi-asserted-by":"crossref","unstructured":"M. Y. Kao and S. H. Teng, Simple and efficient compression schemes for dense and complement graphs. Submitted, 1993.","DOI":"10.1007\/3-540-58325-4_211"},{"key":"59_CR17","doi-asserted-by":"crossref","unstructured":"S. Lang, Complex Analysis, Springer-Verlag, 1985.","DOI":"10.1007\/978-1-4757-1871-3"},{"key":"59_CR18","unstructured":"H. Royden, Real Analysis, Macmillan, 1988."},{"key":"59_CR19","unstructured":"G. Sande, Towards automated disclosure analysis for establishment based statistics, tech. rep., Statistics Canada, 1977."},{"key":"59_CR20","unstructured":"-, A theorem concerning elementary aggregations in simple tables, tech. rep., Statistics Canada, 1978."},{"key":"59_CR21","first-page":"33","volume":"2","author":"G. Sande","year":"1984","unstructured":"-, Automated cell suppression to preserve confidentiality of business statistics, Statistical Journal of the United Nations, 2 (1984), pp. 33\u201341.","journal-title":"Statistical Journal of the United Nations"},{"key":"59_CR22","unstructured":"-, Confidentiality and polyhedra, an analysis of suppressed entries on cross tabulations, tech. rep., Statistics Canada, unknown date."}],"container-title":["Lecture Notes in Computer Science","STACS 94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-57785-8_185.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:14:03Z","timestamp":1605629643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-57785-8_185"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540577850","9783540483328"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-57785-8_185","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1994]]}}}