{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:38:11Z","timestamp":1742971091185,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540883128"},{"type":"electronic","value":"9783540883135"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88313-5_10","type":"book-chapter","created":{"date-parts":[[2008,10,4]],"date-time":"2008-10-04T00:41:44Z","timestamp":1223080904000},"page":"146-160","source":"Crossref","is-referenced-by-count":1,"title":["Disclosure Analysis and Control in Statistical Databases"],"prefix":"10.1007","author":[{"given":"Yingjiu","family":"Li","sequence":"first","affiliation":[]},{"given":"Haibing","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"10_CR1","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N.R. Adam","year":"1989","unstructured":"Adam, N.R., Wortmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Computing Surveys\u00a021(4), 515\u2013556 (1989)","journal-title":"ACM Computing Surveys"},{"doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: SIGMOD Conference, pp. 439\u2013450 (2000)","key":"10_CR2","DOI":"10.1145\/335191.335438"},{"issue":"3","key":"10_CR3","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1145\/320613.320617","volume":"5","author":"L.L. Beck","year":"1980","unstructured":"Beck, L.L.: A security mechanism for statistical databases. ACM Trans. Database Syst.\u00a05(3), 316\u2013338 (1980)","journal-title":"ACM Trans. Database Syst."},{"issue":"6","key":"10_CR4","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/69.895801","volume":"12","author":"A. Brodsky","year":"2000","unstructured":"Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl. Data Eng.\u00a012(6), 900\u2013919 (2000)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"unstructured":"Buzzigoli, L., Giusti, A.: An algorithm to calculate the lower and upper bounds of the elements of an array given its marginals. In: Proceedings of the conference for statistical data protection, pp. 131\u2013147 (1999)","key":"10_CR5"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1080\/01621459.1985.10478201","volume":"80","author":"B.D. Causey","year":"1985","unstructured":"Causey, B.D., Cox, L.H., Ernst, L.R.: Applications of transportation theory to statistical problems. Journal of the American Statistical Association\u00a080, 903\u2013909 (1985)","journal-title":"Journal of the American Statistical Association"},{"unstructured":"Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: ICDM, pp. 589\u2013592 (2005)","key":"10_CR7"},{"issue":"6","key":"10_CR8","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TSE.1982.236161","volume":"8","author":"F.Y.L. Chin","year":"1982","unstructured":"Chin, F.Y.L., \u00d6zsoyoglu, G.: Auditing and inference control in statistical databases. IEEE Trans. Software Eng.\u00a08(6), 574\u2013582 (1982)","journal-title":"IEEE Trans. Software Eng."},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"1710","DOI":"10.1287\/mnsc.45.12.1710","volume":"45","author":"S. Chowdhury","year":"1999","unstructured":"Chowdhury, S., Duncan, G., Krishnan, R., Roehrig, S., Mukherjee, S.: Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators. Management Sciences\u00a045, 1710\u20131723 (1999)","journal-title":"Management Sciences"},{"issue":"2","key":"10_CR10","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/S0378-3758(02)00392-0","volume":"117","author":"L.H. Cox","year":"2003","unstructured":"Cox, L.H.: On properties of multi-dimensional statistical tables. Journal of Statistical Planning and Inference\u00a0117(2), 251\u2013273 (2003)","journal-title":"Journal of Statistical Planning and Inference"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1080\/01621459.1980.10477481","volume":"75","author":"L.H. Cox","year":"1980","unstructured":"Cox, L.H.: Suppression methodology and statistical disclosure control. Journal of American Statistical Association\u00a075, 377\u2013385 (1980)","journal-title":"Journal of American Statistical Association"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1080\/01621459.1987.10478456","volume":"82","author":"L.H. Cox","year":"1987","unstructured":"Cox, L.H.: A constructive procedure for unbiased controlled rounding. Journal of the American Statistical Association\u00a082, 520\u2013524 (1987)","journal-title":"Journal of the American Statistical Association"},{"issue":"1-4","key":"10_CR13","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/BF02216926","volume":"20","author":"L.H. Cox","year":"1989","unstructured":"Cox, L.H., George, J.A.: Controlled rounding for tables with subtotals. Annuals of operations research\u00a020(1-4), 141\u2013157 (1989)","journal-title":"Annuals of operations research"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"1453","DOI":"10.1080\/01621459.1995.10476652","volume":"90","author":"L.H. Cox","year":"1995","unstructured":"Cox, L.H.: Network models for complementary cell suppression. Journal of the American Statistical Association\u00a090, 1453\u20131462 (1995)","journal-title":"Journal of the American Statistical Association"},{"unstructured":"Dandekar, R.A., Cox, L.H.: Synthetic tabular data: An alternative to complementary cell suppression (manuscript, 2002), \n                    \n                      http:\/\/mysite.verizon.net\/vze7w8vk\/syn_tab.pdf","key":"10_CR15"},{"issue":"7","key":"10_CR16","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MC.1983.1654444","volume":"16","author":"D.E. Denning","year":"1983","unstructured":"Denning, D.E., Schlorer, J.: Inference controls for statistical databases. IEEE Computer\u00a016(7), 69\u201382 (1983)","journal-title":"IEEE Computer"},{"doi-asserted-by":"crossref","unstructured":"Denning, D.E., Schl\u00f6rer, J., Wehrle, E.: Memoryless inference controls for statistical databases. In: IEEE Symposium on Security and Privacy, pp. 38\u201345 (1982)","key":"10_CR17","DOI":"10.1109\/SP.1982.10016"},{"issue":"1","key":"10_CR18","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/320064.320068","volume":"4","author":"D.P. Dobkin","year":"1979","unstructured":"Dobkin, D.P., Jones, A.K., Lipton, R.J.: Secure databases: Protection against user influence. ACM Trans. Database Syst.\u00a04(1), 97\u2013106 (1979)","journal-title":"ACM Trans. Database Syst."},{"issue":"22","key":"10_CR19","doi-asserted-by":"publisher","first-page":"11885","DOI":"10.1073\/pnas.97.22.11885","volume":"97","author":"A. Dobra","year":"2000","unstructured":"Dobra, A., Fienberg, S.E.: Bounds for cell entries in contingency tables given fixed marginal totals and decomposable graphs. Proceedings of the National Academy of Sciences of the United States of America\u00a097(22), 11885\u201311892 (2000)","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer, J.: Advances in inference control in statistical databases: An overview. In: Inference Control in Statistical Databases, pp. 1\u20137 (2002)","key":"10_CR20","DOI":"10.1007\/3-540-47804-3_1"},{"issue":"1","key":"10_CR21","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J. Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J.M.: Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans. Knowl. Data Eng.\u00a014(1), 189\u2013201 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"10_CR22","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/772862.772864","volume":"4","author":"C. Farkas","year":"2002","unstructured":"Farkas, C., Jajodia, S.: The inference problem: A survey. SIGKDD Explorations\u00a04(2), 6\u201311 (2002)","journal-title":"SIGKDD Explorations"},{"issue":"7","key":"10_CR23","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1287\/mnsc.47.7.1008.9805","volume":"47","author":"M. Fischetti","year":"2001","unstructured":"Fischetti, M., Salazar, J.J.: Solving the cell suppression problem on tabular data with linear constraints. Management sciences\u00a047(7), 1008\u20131027 (2001)","journal-title":"Management sciences"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1287\/mnsc.47.7.1008.9805","volume":"47","author":"M. Fischetti","year":"2000","unstructured":"Fischetti, M., Salazar, J.J.: Solving the cell suppression problem on tabular data with linear constraints. Management Sciences\u00a047, 1008\u20131026 (2000)","journal-title":"Management Sciences"},{"key":"10_CR25","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1023\/A:1021927424942","volume":"13","author":"M. Fischetti","year":"2003","unstructured":"Fischetti, M., Salazar, J.J.: Partial cell suppression: a new methodology for statistical disclosure control. Statistics and Computing\u00a013, 13\u201321 (2003)","journal-title":"Statistics and Computing"},{"key":"10_CR26","first-page":"226","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"M.R. Garey","year":"1979","unstructured":"Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness, p. 226. W.H. Freeman, New York (1979)"},{"doi-asserted-by":"crossref","unstructured":"Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: SIGMOD Conference, pp. 37\u201348 (2005)","key":"10_CR27","DOI":"10.1145\/1066157.1066163"},{"doi-asserted-by":"crossref","unstructured":"Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: KDD, pp. 279\u2013288 (2002)","key":"10_CR28","DOI":"10.1145\/775047.775089"},{"unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: ICDM, pp. 99\u2013106 (2003)","key":"10_CR29"},{"doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: ICDE, pp. 106\u2013115 (2007)","key":"10_CR30","DOI":"10.1109\/ICDE.2007.367856"},{"unstructured":"Li, Y., Lu, H., Deng, R.H.: Practical inference control for data cubes (extended abstract). In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 115\u2013120 (2006)","key":"10_CR31"},{"issue":"1","key":"10_CR32","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TKDE.2006.14","volume":"18","author":"K. Liu","year":"2006","unstructured":"Liu, K., Kargupta, H., Ryan, J.: Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng.\u00a018(1), 92\u2013106 (2006)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: ICDE, p. 24 (2006)","key":"10_CR33","DOI":"10.1109\/ICDE.2006.1"},{"key":"10_CR34","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.1287\/mnsc.45.10.1399","volume":"45","author":"K. Muralidhar","year":"2002","unstructured":"Muralidhar, K., Sarathy, R.: A general aditive data perturbation method for database security. Management Sciences\u00a045, 1399\u20131415 (2002)","journal-title":"Management Sciences"},{"unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International (1998)","key":"10_CR35"},{"issue":"1","key":"10_CR36","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/319540.319555","volume":"6","author":"J. Schl\u00f6rer","year":"1981","unstructured":"Schl\u00f6rer, J.: Security of statistical databases: Multidimensional transformation. ACM Trans. Database Syst.\u00a06(1), 95\u2013112 (1981)","journal-title":"ACM Trans. Database Syst."},{"issue":"3","key":"10_CR37","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1093\/comjnl\/26.3.218","volume":"26","author":"J. Schl\u00f6rer","year":"1983","unstructured":"Schl\u00f6rer, J.: Information loss in partitioned statistical databases. Comput. J.\u00a026(3), 218\u2013223 (1983)","journal-title":"Comput. J."},{"unstructured":"Wang, K., Yu, P.S., Chakraborty, S.: Bottom-up generalization: A data mining solution to privacy protection. In: ICDM, pp. 249\u2013256 (2004)","key":"10_CR38"},{"unstructured":"Wang, L., Jajodia, S., Wijesekera, D.: Securing OLAP data cubes against privacy breaches. In: IEEE Symposium on Security and Privacy, pp. 161\u2013175 (2004)","key":"10_CR39"},{"key":"10_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-540-39650-5_6","volume-title":"Computer Security \u2013 ESORICS 2003","author":"L. Wang","year":"2003","unstructured":"Wang, L., Li, Y., Wijesekera, D., Jajodia, S.: Precisely answering multi-dimensional range queries without privacy breaches. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 100\u2013115. Springer, Heidelberg (2003)"},{"key":"10_CR41","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4028-0","volume-title":"Statistical Disclosure Control in Practice","author":"L. Willenborg","year":"1996","unstructured":"Willenborg, L., de Waal, T.: Statistical Disclosure Control in Practice. Springer, Heidelberg (1996)"}],"container-title":["Lecture Notes in Computer Science","Computer Security - ESORICS 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88313-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:15:12Z","timestamp":1559506512000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88313-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540883128","9783540883135"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88313-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}