{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T21:56:36Z","timestamp":1767650196407,"version":"3.43.0"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2003,10,1]],"date-time":"2003-10-01T00:00:00Z","timestamp":1064966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2003,10,1]],"date-time":"2003-10-01T00:00:00Z","timestamp":1064966400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Statistics and Computing"],"published-print":{"date-parts":[[2003,10]]},"DOI":"10.1023\/a:1025671023941","type":"journal-article","created":{"date-parts":[[2003,9,23]],"date-time":"2003-09-23T18:47:08Z","timestamp":1064342828000},"page":"363-370","source":"Crossref","is-referenced-by-count":29,"title":["Preserving confidentiality of high-dimensional tabulated data: Statistical and computational issues"],"prefix":"10.1007","volume":"13","author":[{"given":"Adrian","family":"Dobra","sequence":"first","affiliation":[]},{"given":"Alan F.","family":"Karr","sequence":"additional","affiliation":[]},{"given":"Ashish P.","family":"Sanil","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5142530_CR1","volume-title":"Discrete Multivariate Analyses: Theory and Practice","author":"Y.M.M. Bishop","year":"1975","unstructured":"Bishop Y.M.M., Fienberg S.E., and Holland P.W. 1975. Discrete Multivariate Analyses: Theory and Practice. MIT Press, Cambridge, MA."},{"key":"5142530_CR2","first-page":"131","volume-title":"Statistical Data Protection (SDP'98) Proceedings","author":"L. Buzzigoli","year":"1999","unstructured":"Buzzigoli L. and Giusti A. 1999.Analgorithm to calculate the lower and upper bounds of the elements of an array given its marginals. In: Statistical Data Protection (SDP'98) Proceedings, Luxembourg, Eurostat. pp. 131\u2013147."},{"key":"5142530_CR3","unstructured":"Cormen T.H., Leiserson C.E., and Rivest R.L. 1990. Introduction to Algorithms. MIT Press\/McGraw-Hill."},{"key":"5142530_CR4","unstructured":"Dobra A. 2002. Statistical Tools for Disclosure Limitation in Multiway Contingency Tables. PhD thesis, Department of Statistics, Carnegie Mellon University."},{"key":"5142530_CR5","doi-asserted-by":"crossref","first-page":"11885","DOI":"10.1073\/pnas.97.22.11885","volume":"97","author":"A. Dobra","year":"2000","unstructured":"Dobra A. and FienbergS.E. 2000. Bounds for cell entries in contingency tables given marginal totals and decomposable graphs. Proc. Nat. Acad. Sciences 97: 11885\u201311892.","journal-title":"Proc. Nat. Acad. Sciences"},{"key":"5142530_CR6","first-page":"363","volume":"18","author":"A. Dobra","year":"2001","unstructured":"Dobra A. and Fienberg S.E. 2001. Bounds for cell entries in contingency tables induced by fixed marginal totals with applications to disclosure limitation. Statist. J. United Nations ECE 18: 363\u2013371, 2001. Presented at the 2nd Joint ECE\/Eurostat Work Session on Statistical Data Confidentiality, 14-16 March, Skopje, Macedonia.","journal-title":"Statist. J. United Nations ECE"},{"issue":"5","key":"5142530_CR7","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1142\/S0218488502001624","volume":"10","author":"A. Dobra","year":"2002","unstructured":"Dobra A., Karr A.F., Fienberg S.E., and Sanil A.P. 2002. Software systems for tabular data releases. Int. J. Uncertainty, Fuzziness and Knowledge Based Systems 10(5): 529\u2013544.","journal-title":"Int. J. Uncertainty, Fuzziness and Knowledge Based Systems"},{"key":"5142530_CR8","unstructured":"Fienberg S.E. 1999. Fr\u00e9chet and bonferroni bounds for multi-way tables of counts with applications to dis-closure limitation. In: Statistical Data Protection (SDP'98) Proceedings, Luxembourg, Eurostat. pp. 115\u2013129."},{"key":"5142530_CR9","first-page":"205","volume-title":"Proceedings of theACMSIGMODInternational Conference on Management of Data, Vol. 25(2) of ACM SIGMOD Record, June 4-6","author":"V. Harinarayan","year":"1996","unstructured":"Harinarayan V., Rajaraman A., and Ullman, J.D. 1996. Implementing data cubes efficiently. In: Proceedings of theACMSIGMODInternational Conference on Management of Data, Vol. 25(2) of ACM SIGMOD Record, June 4-6, ACM Press, New York, pp. 205\u2013216."},{"issue":"1","key":"5142530_CR10","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/602421.602451","volume":"46","author":"A.F. Karr","year":"2003","unstructured":"Karr A.F., Dobra A., and Sanil A.P. 2003. Table servers protect confidentiality in tabular data releases. Comm. ACM 46(1): 57\u201358.","journal-title":"Comm. ACM"},{"key":"5142530_CR11","volume-title":"Fundamental Algorithms, Vol. 1 of The Art of Computer Programming","author":"D.E. Knuth","year":"1997","unstructured":"Knuth D.E. 1997. Fundamental Algorithms, Vol. 1 of The Art of Computer Programming, 3rd edn. Addison-Wesley, Reading, Massachusetts.","edition":"3rd edn."},{"key":"5142530_CR12","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198522195.001.0001","volume-title":"Graphical Models","author":"S.L. Lauritzen","year":"1996","unstructured":"Lauritzen S.L. 1996. Graphical Models. Clarendon Press, Oxford, UK."},{"key":"5142530_CR13","doi-asserted-by":"crossref","first-page":"215","DOI":"10.2307\/1403615","volume":"63","author":"D. Madigan","year":"1995","unstructured":"Madigan D. and York J. 1995. Bayesian graphical models for discrete data. Internat. Statis. Rev. 63: 215\u2013232.","journal-title":"Internat. Statis. Rev."},{"key":"5142530_CR14","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1613\/jair.453","volume":"8","author":"A.W. Moore","year":"1998","unstructured":"Moore A.W. and Lee M.S. 1998. Cached sufficient statistics for efficient machine learning with large datasets. J. Artificial Intell. Res. 8: 67\u201391.","journal-title":"J. Artificial Intell. Res."},{"key":"5142530_CR15","volume-title":"The C++ Programming Language","author":"S. Bjarne","year":"1997","unstructured":"Bjarne Stroustrup. 1997. The C++ Programming Language, 3rd edn. Addison-Wesley, Reading, MA.","edition":"3rd edn."},{"key":"5142530_CR16","unstructured":"Sun Microsystems. Java programming language. http:\/\/java.sun.com, 2002."},{"key":"5142530_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-0121-9","volume-title":"Elements of Statistical Disclosure Control","author":"L.C.R.J. Willenborg","year":"2001","unstructured":"Willenborg L.C.R.J. and de Waal T. 2001. Elements of Statistical Disclosure Control. Springer-Verlag, New York."}],"container-title":["Statistics and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1025671023941.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1025671023941\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1025671023941.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T05:16:04Z","timestamp":1754630164000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1025671023941"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,10]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2003,10]]}},"alternative-id":["5142530"],"URL":"https:\/\/doi.org\/10.1023\/a:1025671023941","relation":{},"ISSN":["0960-3174","1573-1375"],"issn-type":[{"type":"print","value":"0960-3174"},{"type":"electronic","value":"1573-1375"}],"subject":[],"published":{"date-parts":[[2003,10]]}}}