{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:44:16Z","timestamp":1725565456108},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642158377"},{"type":"electronic","value":"9783642158384"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15838-4_1","type":"book-chapter","created":{"date-parts":[[2010,9,14]],"date-time":"2010-09-14T08:57:53Z","timestamp":1284454673000},"page":"1-16","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data"],"prefix":"10.1007","author":[{"given":"Bing","family":"Liang","sequence":"first","affiliation":[]},{"given":"Kevin","family":"Chiew","sequence":"additional","affiliation":[]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yanjiang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"1_CR1","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1145\/320613.320617","volume":"5","author":"L.L. Beck","year":"1980","unstructured":"Beck, L.L.: A security mechanism for statistical databases. ACM Transactions on Database Systems\u00a05(3), 316\u2013338 (1980)","journal-title":"ACM Transactions on Database Systems"},{"issue":"6","key":"1_CR2","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/69.895801","volume":"12","author":"A. Brodsky","year":"2000","unstructured":"Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: constraints, inference channels, and monitoring disclosures. IEEE Transactions on Knowledge and Data Engineering\u00a012(6), 900\u2013919 (2000)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1_CR3","unstructured":"Chen, K., Liu, L.: Privacy preserving data classification with rotation perturbation. In: Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), Houston, TX, USA, November\u00a027-30, pp. 589\u2013592 (2005)"},{"issue":"12","key":"1_CR4","doi-asserted-by":"publisher","first-page":"1710","DOI":"10.1287\/mnsc.45.12.1710","volume":"45","author":"S.D. Chowdhury","year":"1999","unstructured":"Chowdhury, S.D., Duncan, G.T., Krishnan, R., Roehrig, S.F., Mukherjee, S.: Disclosure detection in multivariate categorical databases: auditing confidentiality protection through two new matrix operators. Management Science\u00a045(12), 1710\u20131723 (1999)","journal-title":"Management Science"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Ciriani, V., di Vimercati, S.D.C., Foresti, S., Samarati, P.: K-anonymity. Security in Decentralized Data Management, 323\u2013353 (2007)","DOI":"10.1007\/978-0-387-27696-0_10"},{"issue":"23","key":"1_CR6","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/S0378-3758(02)00392-0","volume":"117","author":"L.H. Cox","year":"2003","unstructured":"Cox, L.H.: On properties of multi-dimensional statistical tables. Journal of Statistical Planning and Inference\u00a0117(23), 251\u2013273 (2003)","journal-title":"Journal of Statistical Planning and Inference"},{"issue":"1","key":"1_CR7","first-page":"363","volume":"18","author":"A. Dobra","year":"2001","unstructured":"Dobra, A., Fienberg, S.E.: Bounds for cell entries in contingency tables induced by fixed marginal totals with applications to disclosure limitation. Statistical Journal of the United States\u00a018(1), 363\u2013371 (2001)","journal-title":"Statistical Journal of the United States"},{"issue":"1","key":"1_CR8","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J. Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J.M.: Practical data-oriented microaggregation for statistical disclosure control. IEEE Transactions on Knowledge and Data Engineering\u00a014(1), 189\u2013201 (2002)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"2","key":"1_CR9","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/772862.772864","volume":"4","author":"C. Farkas","year":"2002","unstructured":"Farkas, C., Jajodia, S.: The inference problem: a survey. SIGKDD Explorations\u00a04(2), 6\u201311 (2002)","journal-title":"SIGKDD Explorations"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, Baltimore, MD, USA, June\u00a014-16, pp. 37\u201348 (2005)","DOI":"10.1145\/1066157.1066163"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), Melbourne, FL, USA, December\u00a019-22, pp. 99\u2013106 (2003)","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, Baltimore, MD, USA, June\u00a014-16, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and \u2113-diversity. In: Proceedings of the 23rd IEEE International Conference on Data Engineering, Istanbul, Turkey, April\u00a015-20, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"1","key":"1_CR14","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TKDE.2006.14","volume":"18","author":"K. Liu","year":"2006","unstructured":"Liu, K., Kargupta, H., Ryan, J.: Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Transactions on Knowledge and Data Engineering\u00a018(1), 92\u2013106 (2006)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","first-page":"146","volume-title":"Computer Security - ESORICS 2008","author":"H. Lu","year":"2008","unstructured":"Lu, H., Li, Y.: Disclosure analysis and control in statistical databases. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 146\u2013160. Springer, Heidelberg (2008)"},{"issue":"2","key":"1_CR16","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/TDSC.2007.70217","volume":"5","author":"H. Lu","year":"2008","unstructured":"Lu, H., Li, Y.: Practical inference control for data cubes. IEEE Transactions on Dependable Secure Computing\u00a05(2), 87\u201398 (2008)","journal-title":"IEEE Transactions on Dependable Secure Computing"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Lu, H., Li, Y., Wu, X.: On the disclosure risk in dynamic two-dimensional contingency tables (extended abstract). In: Proceedings of the 2nd International Conference on Information System Security (ICISS 2006), Kolkata, India, December\u00a017-21, pp. 349\u2013352 (2006)","DOI":"10.1007\/11961635_25"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Lui, S.M., Qiu, L.: Individual privacy and organizational privacy in business analytics. In: Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS 2007), Waikoloa, Big Island, Hawaii, USA, January\u00a03-6, p. 216b (2007)","DOI":"10.1109\/HICSS.2007.268"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: \u2113-diversity: privacy beyond k-anonymity. In: Proceedins of the 22nd International Conference on Data Engineering (ICDE 2006), Atlanta, GA, USA, April\u00a03-8, pp. 24\u201335 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"issue":"10","key":"1_CR20","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.1287\/mnsc.45.10.1399","volume":"45","author":"K. Muralidhar","year":"1999","unstructured":"Muralidhar, K., Sarathy, R.: A general aditive data perturbation method for database security. Management Science\u00a045(10), 1399\u20131415 (1999)","journal-title":"Management Science"},{"issue":"1","key":"1_CR21","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/319540.319555","volume":"6","author":"J. Schl\u00f6rer","year":"1981","unstructured":"Schl\u00f6rer, J.: Security of statistical databases: multidimensional transformation. ACM Transactions on Database Systems\u00a06(1), 95\u2013112 (1981)","journal-title":"ACM Transactions on Database Systems"},{"issue":"3","key":"1_CR22","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1093\/comjnl\/26.3.218","volume":"26","author":"J. Schl\u00f6rer","year":"1983","unstructured":"Schl\u00f6rer, J.: Information loss in partitioned statistical databases. Computer Journal\u00a026(3), 218\u2013223 (1983)","journal-title":"Computer Journal"},{"issue":"5","key":"1_CR23","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweene","year":"2002","unstructured":"Sweene, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010(5), 571\u2013588 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"1_CR24","unstructured":"Wang, L., Jajodia, S., Wijesekera, D.: Securing OLAP data cubes against privacy breaches. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P 2004), Berkeley, CA, USA, May\u00a09-12, pp. 161\u2013175 (2004)"},{"key":"1_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-540-39650-5_6","volume-title":"Computer Security \u2013 ESORICS 2003","author":"L. Wang","year":"2003","unstructured":"Wang, L., Li, Y., Wijesekera, D., Jajodia, S.: Precisely answering multi-dimensional range queries without privacy breaches. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 100\u2013115. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Privacy in Statistical Databases"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15838-4_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:41:32Z","timestamp":1606185692000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15838-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642158377","9783642158384"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15838-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}