{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T10:18:34Z","timestamp":1770632314960,"version":"3.49.0"},"reference-count":21,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[1994,3,1]],"date-time":"1994-03-01T00:00:00Z","timestamp":762480000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Database Syst."],"published-print":{"date-parts":[[1994,3]]},"abstract":"<jats:p>\n            The random data perturbation (RDP) method of preserving the privacy of individual records in a statistical database is discussed. In particular, it is shown that if confidential attributes are allowed as query-defining variables, severe biases may result in responses to queries. It is also shown that even if query definition through confidential variables is\n            <jats:italic>not<\/jats:italic>\n            allowed, biases can still occur in responses to queries such as those involving proportions or counts. In either case, serious distortions may occur in user statistical analyses. A modified version of RDP is presented, in the form of a query adjustment procedure and specialized perturbation structure which will produce unbiased results.\n          <\/jats:p>","DOI":"10.1145\/174638.174641","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T11:29:00Z","timestamp":1027769340000},"page":"47-63","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["A modified random perturbation method for database security"],"prefix":"10.1145","volume":"19","author":[{"given":"Patrick","family":"Tendick","sequence":"first","affiliation":[{"name":"Univ. of California, Davis"}]},{"given":"Norman","family":"Matloff","sequence":"additional","affiliation":[{"name":"Univ. of California, Davis"}]}],"member":"320","published-online":{"date-parts":[[1994,3]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/76894.76895"},{"key":"e_1_2_1_2_1","unstructured":"COCHRAN W. 1977. Sampling Techntques. 3rd ed. Wiley New York.  COCHRAN W. 1977. Sampling Techntques. 3rd ed. Wiley New York."},{"key":"e_1_2_1_3_1","volume-title":"Proceedzngs of the ACM Annual Conference. ACM","author":"CONWA~ R","year":"1976"},{"key":"e_1_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Cox L. 1980 Suppression methodology and statistical disclosure control J Amer Star. Assoc. 75 370 377 385.  Cox L. 1980 Suppression methodology and statistical disclosure control J Amer Star. Assoc. 75 370 377 385.","DOI":"10.1080\/01621459.1980.10477481"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/319830.319834"},{"key":"e_1_2_1_6_1","unstructured":"DENNING n. 1982. Cryptography and Data Secztr~(~ Addison-Wesley Reading Mass.   DENNING n. 1982. Cryptography and Data Secztr~(~ Addison-Wesley Reading Mass."},{"issue":"7","key":"e_1_2_1_7_1","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MC.1983.1654444","article-title":"Inference controls for statistical databases","volume":"16","author":"DENNING D.","year":"1983","journal-title":"Computer"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/320064.320069"},{"key":"e_1_2_1_9_1","unstructured":"JOHNSON R. AND WICHEM D. 1982. Applzed Mult~vartate Statistical Analysis. Prentice-Hall Englewood Chffs N.J   JOHNSON R. AND WICHEM D. 1982. Applzed Mult~vartate Statistical Analysis. Prentice-Hall Englewood Chffs N.J"},{"key":"e_1_2_1_10_1","unstructured":"KAM J. 1986 A method for limiting disclosure m microdata based on random noise and transformation In Proceedllzgs of the American Stattstlcal AssocLatlon Survey Research Methods Section. ASA Washington D C. 370-374  KAM J. 1986 A method for limiting disclosure m microdata based on random noise and transformation In Proceedllzgs of the American Stattstlcal AssocLatlon Survey Research Methods Section. ASA Washington D C. 370-374"},{"key":"e_1_2_1_11_1","volume-title":"DATABASE SECURITY. Status and Prospects. North-Holland Pubhshers","author":"MATLOFF N."},{"key":"e_1_2_1_12_1","first-page":"180","article-title":"Another look at the use of noise addition for database security. In Proceedzngs of the 1986 IEEE Symposzum on Securzty and Przvacy. IEEE","volume":"173","author":"MATLOFF N.","year":"1986","journal-title":"New York"},{"issue":"1","key":"e_1_2_1_13_1","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/0167-7152(84)90033-6","article-title":"Use of covariates in randomized response settings","volume":"2","author":"MATLOFF N.","year":"1984","journal-title":"Prob Stat. Lett."},{"key":"e_1_2_1_14_1","first-page":"187","article-title":"The \"curse of dimensionahty' in database security In Procee&amp;ngs of the Workshop on Database Security IFIP, Washington","volume":"179","author":"MATI F?, N","year":"1988","journal-title":"D.C."},{"key":"e_1_2_1_15_1","unstructured":"NOBLE B. AND DANIEL J. 1988. Applied Ltnear Algebra. 3rd ed. Prentice-Hall Englewood Cliffs N.J.  NOBLE B. AND DANIEL J. 1988. Applied Ltnear Algebra. 3rd ed. Prentice-Hall Englewood Cliffs N.J."},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"RAO C. 1973. Linear Statisttcal Inference and Its Applications. 2nd ed. Wiley New York.  RAO C. 1973. Linear Statisttcal Inference and Its Applications. 2nd ed. Wiley New York.","DOI":"10.1002\/9780470316436"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/320610.320645"},{"key":"e_1_2_1_18_1","unstructured":"SEBER G. 1977. Linear Regression Analysis. Wiley New York.  SEBER G. 1977. Linear Regression Analysis. Wiley New York."},{"key":"e_1_2_1_19_1","unstructured":"TENDICK P. 1988. Bias avoidance and measures of confidentiality for the noise addition method of database disclosure control. Ph.D. dissertation Univ. of California Davis Calif.   TENDICK P. 1988. Bias avoidance and measures of confidentiality for the noise addition method of database disclosure control. Ph.D. dissertation Univ. of California Davis Calif."},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the 1987 Joint Meettngs, American Statistical Association\/Institute of Mathematzcal Statistics. ASA\/IMA, Washington, D.C.","author":"TENDICK P.","year":"1987"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1994.383392"}],"container-title":["ACM Transactions on Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/174638.174641","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/174638.174641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:17Z","timestamp":1750278377000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/174638.174641"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,3]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1994,3]]}},"alternative-id":["10.1145\/174638.174641"],"URL":"https:\/\/doi.org\/10.1145\/174638.174641","relation":{},"ISSN":["0362-5915","1557-4644"],"issn-type":[{"value":"0362-5915","type":"print"},{"value":"1557-4644","type":"electronic"}],"subject":[],"published":{"date-parts":[[1994,3]]},"assertion":[{"value":"1994-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}