{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:12:11Z","timestamp":1742983931660,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319997704"},{"type":"electronic","value":"9783319997711"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99771-1_1","type":"book-chapter","created":{"date-parts":[[2018,8,24]],"date-time":"2018-08-24T16:58:04Z","timestamp":1535129884000},"page":"3-12","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Symmetric vs Asymmetric Protection Levels in SDC Methods for Tabular Data"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Baena","sequence":"first","affiliation":[]},{"given":"Jordi","family":"Castro","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 A.","family":"Gonz\u00e1lez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,25]]},"reference":[{"key":"1_CR1","unstructured":"Baena, D., Castro, J., Frangioni, A.: Stabilized Benders methods for large-scale combinatorial optimization, with application to data privacy. Research report DR 2017\/03, Department of Statistics and Operations Research, Universitat Polit\u00e8cnica de Catalunya, Barcelona, Catalonia (2017)"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.cor.2014.11.018","volume":"58","author":"D Baena","year":"2015","unstructured":"Baena, D., Castro, J., Gonz\u00e1lez, J.A.: Fix-and-relax approaches for controlled tabular adjustment. Comput. Oper. Res. 58, 41\u201352 (2015)","journal-title":"Comput. Oper. Res."},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10287-004-0020-y","volume":"2","author":"JF Benders","year":"2005","unstructured":"Benders, J.F.: Partitioning procedures for solving mixed-variables programming problems. Comput. Manage. Sci. 2, 3\u201319 (2005). English translation of the original paper appeared in Numerische Mathematik, 4 (1962) 238\u2013252","journal-title":"Comput. Manage. Sci."},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.ejor.2004.08.034","volume":"171","author":"J Castro","year":"2006","unstructured":"Castro, J.: Minimum-distance controlled perturbation methods for large-scale tabular data protection. Eur. J. Oper. Res. 171, 39\u201352 (2006)","journal-title":"Eur. J. Oper. Res."},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1287\/ijoc.1060.0185","volume":"19","author":"J Castro","year":"2007","unstructured":"Castro, J.: A shortest paths heuristic for statistical disclosure control in positive tables. INFORMS J. Comput. 19, 520\u2013533 (2007)","journal-title":"INFORMS J. Comput."},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.ejor.2011.03.050","volume":"216","author":"J Castro","year":"2012","unstructured":"Castro, J.: Recent advances in optimization techniques for statistical tabular data protection. Eur. J. Oper. Res. 216, 257\u2013269 (2012)","journal-title":"Eur. J. Oper. Res."},{"key":"1_CR7","unstructured":"Castro, J., Gonz\u00e1lez, J.A., Baena, D.: User\u2019s and programmer\u2019s manual of the RCTA package. Technical report DR 2009\/01, Department of Statistics and Operations Research, Universitat Polit\u00e8cnica de Catalunya, Barcelona, Catalonia (2009)"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-45381-1_1","volume-title":"Privacy in Statistical Databases","author":"J Castro","year":"2016","unstructured":"Castro, J., Via, A.: Revisiting interval protection, a.k.a. partial cell suppression, for tabular data. In: Domingo-Ferrer, J., Peji\u0107-Bach, M. (eds.) PSD 2016. LNCS, vol. 9867, pp. 3\u201314. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45381-1_1"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1287\/opre.2014.1293","volume":"62","author":"J Castro","year":"2014","unstructured":"Castro, J., Frangioni, A., Gentile, C.: Perspective reformulations of the CTA problem with $$L_2$$ distances. Oper. Res. 62, 891\u2013909 (2014)","journal-title":"Oper. Res."},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1287\/mnsc.47.7.1008.9805","volume":"47","author":"M Fischetti","year":"2001","unstructured":"Fischetti, M., Salazar, J.J.: Solving the cell suppression problem on tabular data with linear constraints. Manage. Sci. 47, 1008\u20131026 (2001)","journal-title":"Manage. Sci."},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1023\/A:1021927424942","volume":"13","author":"M Fischetti","year":"2003","unstructured":"Fischetti, M., Salazar, J.J.: Partial cell suppression: a new methodology for statistical disclosure control. Stat. Comput. 13, 13\u201321 (2003)","journal-title":"Stat. Comput."},{"key":"1_CR12","volume-title":"AMPL: A Modeling Language for Mathematical Programming","author":"R Fourer","year":"2002","unstructured":"Fourer, R., Gay, D.M., Kernighan, D.W.: AMPL: A Modeling Language for Mathematical Programming. Duxbury Press, Duxbury (2002)"},{"key":"1_CR13","doi-asserted-by":"publisher","first-page":"1826","DOI":"10.1016\/j.cor.2011.02.008","volume":"38","author":"JA Gonz\u00e1lez","year":"2011","unstructured":"Gonz\u00e1lez, J.A., Castro, J.: A heuristic block coordinate descent approach for controlled tabular adjustment. Comput. Oper. Res. 38, 1826\u20131835 (2011)","journal-title":"Comput. Oper. Res."},{"key":"1_CR14","doi-asserted-by":"publisher","DOI":"10.1002\/9781118348239","volume-title":"Statistical Disclosure Control","author":"A Hundepool","year":"2012","unstructured":"Hundepool, A., et al.: Statistical Disclosure Control. Wiley, Chichester (2012)"},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1002\/net.3230220407","volume":"22","author":"JP Kelly","year":"1992","unstructured":"Kelly, J.P., Golden, B.L., Assad, A.A.: Cell suppression: disclosure protection for sensitive tabular data. Networks 22, 28\u201355 (1992)","journal-title":"Networks"},{"key":"1_CR16","unstructured":"Robertson, D.: Automated disclosure control at Statistics Canada. In: Paper presented at the second international seminar on statistical confidentiality, Luxembourg (1994)"},{"key":"1_CR17","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611971453","volume-title":"Primal-Dual Interior-Point Methods","author":"SJ Wright","year":"1997","unstructured":"Wright, S.J.: Primal-Dual Interior-Point Methods. SIAM, Philadelphia (1997)"}],"container-title":["Lecture Notes in Computer Science","Privacy in Statistical Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99771-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T16:28:17Z","timestamp":1709828897000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-99771-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319997704","9783319997711"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99771-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"25 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Privacy in Statistical Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valencia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"psd2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/unescoprivacychair.urv.cat\/psd2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}