{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:35:07Z","timestamp":1743032107848,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031139444"},{"type":"electronic","value":"9783031139451"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-13945-1_6","type":"book-chapter","created":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T23:02:54Z","timestamp":1663110174000},"page":"77-91","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Perspectives for Tabular Data Protection \u2013 How About Synthetic Data?"],"prefix":"10.1007","author":[{"given":"Felix","family":"Geyer","sequence":"first","affiliation":[]},{"given":"Reinhard","family":"Tent","sequence":"additional","affiliation":[]},{"given":"Michel","family":"Reiffert","sequence":"additional","affiliation":[]},{"given":"Sarah","family":"Giessing","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,14]]},"reference":[{"key":"6_CR1","unstructured":"Breiman, L., Friedman, J., Stone, C.J., Olshen, R.A.: Classification and Regression Trees. Wadsworth International Group (1984)"},{"key":"6_CR2","unstructured":"Burnett-Isaacs, K., et al.: Synthetic data for national statistical organization: a starter guide, version 2 (2021). https:\/\/statswiki.unece.org\/download\/attachments\/282330193\/HLG-MOS%20Synthetic%20Data%20Guide.docx?version=2&modificationDate=1642449524045&api=v2. Accessed 20 May 2022"},{"issue":"4","key":"6_CR3","first-page":"589","volume":"25","author":"J Drechsler","year":"2009","unstructured":"Drechsler, J., Reiter, J.P.: Disclosure risk and data utility for partially synthetic data: an empirical study using the German IAB establishment survey. J. Official Statist. 25(4), 589\u2013603 (2009)","journal-title":"J. Official Statist."},{"key":"6_CR4","unstructured":"Enderle, T., Giessing, S.: Implementation of a \u2018p-table generator\u2019 as separate R-package. Deliverable D3.2 of Work Package 3 \u201cPrototypical implementation of the cell key\/seed method\u201d within the Specific Grant Agreement \u201cOpen Source tools for perturbative confidentiality methods\u201d (2018b)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-030-57521-2_11","volume-title":"Privacy in Statistical Databases","author":"T Enderle","year":"2020","unstructured":"Enderle, T., Giessing, S., Tent, R.: Calculation of risk probabilities for the cell key method. In: Domingo-Ferrer, J., Muralidhar, K. (eds.) Privacy in Statistical Databases. LNCS, vol. 12276, pp. 151\u2013165. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57521-2_11"},{"key":"6_CR6","unstructured":"Fraser, B., Wooton, J.: A proposed method for confidentialising tabular output to protect against differencing. In: Monographs of Official Statistics. Work session on Statistical Data Confidentiality, Eurostat-Office for Official Publications of the European Communities, Luxembourg, pp. 299\u2013302 (2006)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-319-45381-1_18","volume-title":"Privacy in Statistical Databases","author":"S Giessing","year":"2016","unstructured":"Giessing, S.: Computational issues in the design of transition probabilities and disclosure risk estimation for additive noise. In: DomingoFerrer, J., Peji\u0107Bach, M. (eds.) Privacy in Statistical Databases. LNCS, vol. 9867, pp. 237\u2013251. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45381-1_18"},{"key":"6_CR8","unstructured":"Giessing, S., Tent, R.: Concepts for generalising tools implementing the cell key method to the case of continuous variables. In: Joint UNECE\/Eurostat Work Session on Statistical Data Confidentiality, The Hague, 29\u201331 October 2019. http:\/\/www.unece.org\/fileadmin\/DAM\/stats\/documents\/ece\/ces\/ge.46\/2019\/mtg1\/SDC2019_S2_Germany_Giessing_Tent_AD.pdf"},{"key":"6_CR9","unstructured":"Gussenbauer, J.: Record swapping: Package vignette (2019). https:\/\/github.com\/sdcTools\/recordSwapping"},{"key":"6_CR10","unstructured":"Little, R.J.A.: Statistical Analysis of Masked Data (1993)"},{"key":"6_CR11","unstructured":"Marley, J.K., Leaver, V.L.: A method for confidentialising user-defined tables: statistical properties and a risk-utility analysis. In: Proceedings of 58th World Statistical Congress, pp. 1072\u20131081 (2011)"},{"key":"6_CR12","unstructured":"Meindl, B., Kowaric, A., De Wolf, P.P.: Prototype implementation of the cell key method, including test results and a description on the use for census data. Deliverable D3.1 of Work Package 3 \u201cPrototypical implementation of the cell key\/seed method\u201d within the Specific Grant Agreement \u201cOpen Source tools for perturbative confidentiality methods\u201d (2018)"},{"key":"6_CR13","doi-asserted-by":"publisher","unstructured":"Nowok, B., Raab, G., Dibben, C.: synthpop: Bespoke creation of synthetic data in R. J. Statist. Softw. 74, 1\u201326 (2016). https:\/\/doi.org\/10.18637\/jss.v074.i11, https:\/\/www.jstatsoft.org\/article\/view\/v074i11","DOI":"10.18637\/jss.v074.i11"},{"issue":"1","key":"6_CR14","first-page":"1","volume":"19","author":"TE Raghunathan","year":"2003","unstructured":"Raghunathan, T.E., Reiter, J.P., Rubin, D.B.: Multiple Imputation for statistical disclosure limitation. J. Official Statist. 19(1), 1\u201316 (2003)","journal-title":"J. Official Statist."},{"issue":"2","key":"6_CR15","first-page":"181","volume":"29","author":"JP Reiter","year":"2003","unstructured":"Reiter, J.P.: Inference for partially synthetic, public use microdata sets. Surv. Methodol. 29(2), 181\u2013188 (2003)","journal-title":"Surv. Methodol."},{"key":"6_CR16","doi-asserted-by":"publisher","unstructured":"Reiter, J.P.: Releasing multiply imputed, synthetic public use microdata: an illustration and empirical study. J. R. Statist. Soc. Ser. A. Statist. Soc. 168(1), 185\u2013205 (2003b). https:\/\/doi.org\/10.1111\/j.1467-985X.2004.00343.x","DOI":"10.1111\/j.1467-985X.2004.00343.x"},{"issue":"3","key":"6_CR17","first-page":"441","volume":"21","author":"J Reiter","year":"2005","unstructured":"Reiter, J.: Using CART to generate partially synthetic public use microdata. J. Official Statist. 21(3), 441\u2013462 (2005)","journal-title":"J. Official Statist."},{"issue":"2","key":"6_CR18","first-page":"461","volume":"9","author":"DB Rubin","year":"1993","unstructured":"Rubin, D.B.: Statistical disclosure limitation. J. Official Statist. 9(2), 461\u2013468 (1993)","journal-title":"J. Official Statist."},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-15838-4_4","volume-title":"Privacy in Statistical Databases","author":"N Shlomo","year":"2010","unstructured":"Shlomo, N., Tudor, C., Groom, P.: Data swapping for protecting census tables. In: Domingo-Ferrer, J., Magkos, E. (eds.) Privacy in Statistical Databases. LNCS, vol. 6344, pp. 41\u201351. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15838-4_4"},{"key":"6_CR20","unstructured":"Thompson, G., Broadfoot, S., Elazar, D.: Methodology for the automatic confidentialisation of statistical outputs from remote servers at the Australian Bureau of statistics. In: Joint UNECE\/Eurostat Work Session on Statistical Data Confidentiality, Ottawa, 28\u201330 Oktober 2013. http:\/\/www.unece.org\/fileadmin\/DAM\/stats\/documents\/ece\/ces\/ge.46\/2013\/Topic_1_ABS.pdf"},{"issue":"12","key":"6_CR21","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1080\/10629360600810434","volume":"76","author":"S Van Buuren","year":"2006","unstructured":"Van Buuren, S., Brand, J.P.L., Groothuis-Oudshoorn, C.G.M., Rubin, D.B.: Fully conditional specification in multivariate imputation. J. Stat. Comput. Simul. 76(12), 1049\u20131064 (2006)","journal-title":"J. Stat. Comput. Simul."}],"container-title":["Lecture Notes in Computer Science","Privacy in Statistical Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-13945-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T11:36:16Z","timestamp":1710329776000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-13945-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031139444","9783031139451"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-13945-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"14 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Privacy in Statistical Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"psd2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crises-deim.urv.cat\/psd2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}