{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:47:09Z","timestamp":1747284429846},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319112565"},{"type":"electronic","value":"9783319112572"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11257-2_25","type":"book-chapter","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T06:42:54Z","timestamp":1410331374000},"page":"326-337","source":"Crossref","is-referenced-by-count":1,"title":["Controlled Shuffling, Statistical Confidentiality and Microdata Utility: A Successful Experiment with a 10% Household Sample of the 2011 Population Census of Ireland for the IPUMS-International Database"],"prefix":"10.1007","author":[{"given":"Robert","family":"McCaa","sequence":"first","affiliation":[]},{"given":"Krishnamurty","family":"Muralidhar","sequence":"additional","affiliation":[]},{"given":"Rathindra","family":"Sarathy","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Comerford","sequence":"additional","affiliation":[]},{"given":"Albert","family":"Esteve-Palos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-642-33627-0_14","volume-title":"Privacy in Statistical Databases","author":"L. Cleveland","year":"2012","unstructured":"Cleveland, L., McCaa, R., Ruggles, S., Sobek, M.: When Excessive Perturbation Goes Wrong and Why IPUMS-International Relies Instead on Sampling, Suppression, Swapping, and Other Minimally Harmful Methods to Protect Privacy of Census Microdata. In: Domingo-Ferrer, J., Tinnirello, I. (eds.) PSD 2012. LNCS, vol.\u00a07556, pp. 179\u2013187. Springer, Heidelberg (2012)"},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-642-15838-4_13","volume-title":"Privacy in Statistical Databases","author":"M. Elliot","year":"2010","unstructured":"Elliot, M., Lomax, S., Mackey, E., Purdam, K.: Data Environment Analysis and the Key Variable Mapping System. In: Domingo-Ferrer, J., Magkos, E. (eds.) PSD 2010. LNCS, vol.\u00a06344, pp. 138\u2013147. Springer, Heidelberg (2010), \n                    \n                      http:\/\/www.springerlink.com\/index\/6KL805434G016U15.pdf\n                    \n                    \n                   (July 13, 2012)"},{"key":"25_CR3","first-page":"6","volume":"14","author":"M. Elliot","year":"1999","unstructured":"Elliot, M., Dale, A.: Scenarios of attack: the data intruder\u2019s perspective on statistical disclosure risk. Netherlands Official Statistics\u00a014, 6\u201310 (1999)","journal-title":"Netherlands Official Statistics"},{"key":"25_CR4","unstructured":"Domingo-Ferrer, J., Torra, V.: A critique of k-anonymity and some of its enhancements. In: Third International Conference on Availability, Reliability and Security, ARES 2008, pp. 990\u2013993 (2008), \n                    \n                      http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?rnumber=4529451\n                    \n                    \n                   (accessed July 14, 2012)"},{"key":"25_CR5","series-title":"Wiley Series in Survey Methodology","doi-asserted-by":"publisher","DOI":"10.1002\/9781118348239","volume-title":"Statistical Disclosure Control","author":"A. Hundepool","year":"2012","unstructured":"Hundepool, A., Domingo-Ferrer, J., Franconi, L., Giessing, S., Nordholt, E., Spicer, K., de Wolf, P.-P.: Statistical Disclosure Control. Wiley Series in Survey Methodology. John Wiley & Sons, London (2012)"},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2001","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge Based Systems\u00a010, 557\u2013570 (2001)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge Based Systems"},{"issue":"1","key":"25_CR7","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J. Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J.M.: Practical data-oriented microaggregation for statistical disclosure control. IEEE Transactions on Knowledge and Data Engineering\u00a014(1), 189\u2013201 (2002)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"25_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-642-33627-0_8","volume-title":"Privacy in Statistical Databases","author":"J. Domingo-Ferrer","year":"2012","unstructured":"Domingo-Ferrer, J., Muralidhar, K., Ruffian-Torrell, G.: Anonymization Methods for Taxonomic Microdata. In: Domingo-Ferrer, J., Tinnirello, I. (eds.) PSD 2012. LNCS, vol.\u00a07556, pp. 90\u2013102. Springer, Heidelberg (2012)"},{"key":"25_CR9","unstructured":"World Health Organization. International Classification of Diseases. Geneva, 9th Revision, Clinical Modification, 6th edn. (2008), \n                    \n                      http:\/\/icd9cm.chrisendres.com\/"},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/0378-3758(82)90058-1","volume":"6","author":"T. Dalenius","year":"1982","unstructured":"Dalenius, T., Reiss, S.P.: Data-swapping: A Technique for Disclosure Control. Journal of Statistical Planning and Inference\u00a06, 73\u201385 (1982)","journal-title":"Journal of Statistical Planning and Inference"},{"issue":"5","key":"25_CR11","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1287\/mnsc.1050.0503","volume":"52","author":"K. Muralidhar","year":"2006","unstructured":"Muralidhar, K., Sarathy, R.: Data Shuffling-A New Masking Approach for Numerical Data. Management Science\u00a052(5), 658\u2013670 (2006)","journal-title":"Management Science"},{"key":"25_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/11930242_15","volume-title":"Privacy in Statistical Databases","author":"K. Muralidhar","year":"2006","unstructured":"Muralidhar, K., Sarathy, R., Dandekar, R.: Why Swap when you can Shuffle? A Comparison of the Proximity Swap and the Data Shuffle for Numeric Data. In: Domingo-Ferrer, J., Franconi, L. (eds.) PSD 2006. LNCS, vol.\u00a04302, pp. 164\u2013176. Springer, Heidelberg (2006)"},{"issue":"1","key":"25_CR13","doi-asserted-by":"publisher","first-page":"145","DOI":"10.2307\/2095483","volume":"51","author":"A.E. Raftery","year":"1986","unstructured":"Raftery, A.E.: Choosing models for cross-classifications. American Sociological Review\u00a051(1), 145\u2013146 (1986)","journal-title":"American Sociological Review"}],"container-title":["Lecture Notes in Computer Science","Privacy in Statistical Databases"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11257-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T21:04:29Z","timestamp":1558991069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11257-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319112565","9783319112572"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11257-2_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}