{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:11:45Z","timestamp":1771701105748,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,6,11]],"date-time":"2007-06-11T00:00:00Z","timestamp":1181520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,6,11]]},"DOI":"10.1145\/1265530.1265569","type":"proceedings-article","created":{"date-parts":[[2007,9,14]],"date-time":"2007-09-14T16:07:37Z","timestamp":1189786057000},"page":"273-282","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":258,"title":["Privacy, accuracy, and consistency too"],"prefix":"10.1145","author":[{"given":"Boaz","family":"Barak","sequence":"first","affiliation":[{"name":"Princeton University"}]},{"given":"Kamalika","family":"Chaudhuri","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]},{"given":"Cynthia","family":"Dwork","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Satyen","family":"Kale","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Frank","family":"McSherry","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Kunal","family":"Talwar","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]}],"member":"320","published-online":{"date-parts":[[2007,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Special Issue on Statistical Disclosure Control volume 14(4) of Journal of Official Statistics. 1998.  Special Issue on Statistical Disclosure Control volume 14(4) of Journal of Official Statistics. 1998."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066187"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.12.9.732"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065184"},{"key":"e_1_3_2_1_7_1","volume-title":"Quadratic interior-point methods in statistical disclosure control. Computational Management Science, 2:pages 107--121","author":"Castro J.","year":"2005","unstructured":"J. Castro . Quadratic interior-point methods in statistical disclosure control. Computational Management Science, 2:pages 107--121 , 2005 . J. Castro. Quadratic interior-point methods in statistical disclosure control. Computational Management Science, 2:pages 107--121, 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2004.08.034"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_20"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 21th Annual Conference on Uncertainty in Artificial Intelligence (UAI-05)","author":"Chawla S.","year":"2005","unstructured":"S. Chawla , C. Dwork , F. McSherry , and K. Talwar . On privacy-preserving histograms . In Proceedings of the 21th Annual Conference on Uncertainty in Artificial Intelligence (UAI-05) , Arlington, Virginia , 2005 . AUAI Press. S. Chawla, C. Dwork, F. McSherry, and K. Talwar. On privacy-preserving histograms. In Proceedings of the 21th Annual Conference on Uncertainty in Artificial Intelligence (UAI-05), Arlington, Virginia, 2005. AUAI Press."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25955-8_7"},{"key":"e_1_3_2_1_12_1","first-page":"213","article-title":"Towards a methodology for statistical disclosure control","volume":"3","author":"Dalenius T.","year":"1977","unstructured":"T. Dalenius . Towards a methodology for statistical disclosure control . Statistisk. tidskrift , 3 : 213 -- 225 , 1977 . T. Dalenius. Towards a methodology for statistical disclosure control. Statistisk. tidskrift, 3:213--225, 1977.","journal-title":"Statistisk. tidskrift"},{"key":"e_1_3_2_1_13_1","volume-title":"Synthetic tabular data: An alternative to complementary cell suppression","author":"Dandekar R. A.","year":"2002","unstructured":"R. A. Dandekar and L. Cox . Synthetic tabular data: An alternative to complementary cell suppression , 2002 . manuscript, energy Information Administration, US Department of Energy . R. A. Dandekar and L. Cox. Synthetic tabular data: An alternative to complementary cell suppression, 2002. manuscript, energy Information Administration, US Department of Energy."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of Conference on Foundation of Statistical Inference and its Applicaitons.","author":"Dobra A.","unstructured":"A. Dobra and S. Fienberg . Bounding entries in multi-way contingency tables given a set of marginal totals, 2002 . Proceedings of Conference on Foundation of Statistical Inference and its Applicaitons. A. Dobra and S. Fienberg. Bounding entries in multi-way contingency tables given a set of marginal totals, 2002. Proceedings of Conference on Foundation of Statistical Inference and its Applicaitons."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001636"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/B0-08-043076-7\/00402-2"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_19_1","volume-title":"Privacy preserving histogram case study","author":"Dwork C.","year":"2007","unstructured":"C. Dwork , D. Lee , and F. McSherry . Privacy preserving histogram case study , 2007 . Manuscript . C. Dwork, D. Lee, and F. McSherry. Privacy preserving histogram case study, 2007. Manuscript."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250804"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"C.\n      Dwork\n     and \n      K.\n      Nissim\n  . \n  Privacy-preserving datamining on vertically partitioned databases\n  . In M. K. Franklin editor CRYPTO volume \n  3152\n   of \n  Lecture Notes in Computer Science pages \n  528\n  --\n  544\n  . \n  Springer 2004\n  .  C. Dwork and K. Nissim. Privacy-preserving datamining on vertically partitioned databases. In M. K. Franklin editor CRYPTO volume 3152 of Lecture Notes in Computer Science pages 528--544. Springer 2004.","DOI":"10.1007\/978-3-540-28628-8_32"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1972.10481199"},{"key":"e_1_3_2_1_25_1","volume-title":"Geometric Algorithms and Combinatorial Optimization (Algorithms and Combinatorics)","author":"Gr\u00f6tschel M.","year":"1994","unstructured":"M. Gr\u00f6tschel , L. Lov\u00e1sz , and A. Schrijver . Geometric Algorithms and Combinatorial Optimization (Algorithms and Combinatorics) . Springer , December 1994 . M. Gr\u00f6tschel, L. Lov\u00e1sz, and A. Schrijver. Geometric Algorithms and Combinatorial Optimization (Algorithms and Combinatorics). Springer, December 1994."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the Twenty-Second ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 9--12, 2003","author":"Milo T.","year":"2003","unstructured":"T. Milo , editor. Proceedings of the Twenty-Second ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 9--12, 2003 , San Diego, CA, USA. ACM , 2003 . T. Milo, editor. Proceedings of the Twenty-Second ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 9--12, 2003, San Diego, CA, USA. ACM, 2003."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01719708"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107049949","volume-title":"Fourier Analysis","author":"K\u00f6rner T. W.","year":"1988","unstructured":"T. W. K\u00f6rner . Fourier Analysis . Cambridge University Press , Cambridge, UK , 1988 . T. W. K\u00f6rner. Fourier Analysis. Cambridge University Press, Cambridge, UK, 1988."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25960-2_26"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539702403803"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsc.2005.04.010"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/645539.657845"},{"key":"e_1_3_2_1_34_1","first-page":"461","article-title":"Statistical disclosure limitation","volume":"9","author":"Rubin D.","year":"1993","unstructured":"D. Rubin . Discussion : Statistical disclosure limitation . Journal of Official Statistics , 9 : 461 -- 469 , 1993 . D. Rubin. Discussion: Statistical disclosure limitation. Journal of Official Statistics, 9:461--469, 1993.","journal-title":"Journal of Official Statistics"},{"key":"e_1_3_2_1_35_1","unstructured":"P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression.  P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"}],"event":{"name":"SIGMOD\/PODS07: International Conference on Management of Data","location":"Beijing China","acronym":"SIGMOD\/PODS07","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1265530.1265569","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1265530.1265569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:24Z","timestamp":1750278144000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1265530.1265569"}},"subtitle":["a holistic solution to contingency table release"],"short-title":[],"issued":{"date-parts":[[2007,6,11]]},"references-count":37,"alternative-id":["10.1145\/1265530.1265569","10.1145\/1265530"],"URL":"https:\/\/doi.org\/10.1145\/1265530.1265569","relation":{},"subject":[],"published":{"date-parts":[[2007,6,11]]},"assertion":[{"value":"2007-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}