2007
DOI: 10.1287/ijoc.1060.0185
|View full text |Cite
|
Sign up to set email alerts
|

A Shortest-Paths Heuristic for Statistical Data Protection in Positive Tables

Abstract: i ' N ational statistical agencies (NSAs) routinely release large amounts of tabular information. Prior to dissemination, tabular data need to be processed to avoid disclosure of individual corifidential information. Cell suppression is one of the most widely used techniques by NSAs. Optimal procedures for cell suppression are computationally expensive with large real-world data sets, so heuristic procedures are used. Most heuristics for positive tables (i.e., cell values are normegative) rely on the solution … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
45
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
6
1

Relationship

5
2

Authors

Journals

citations
Cited by 21 publications
(45 citation statements)
references
References 21 publications
0
45
0
Order By: Relevance
“…Hierarchical instances were obtained with a generator of 1H2D synthetic tables [4] that was retrieved from http://www-eio.upc.es/~jcastro/generators_csp.html. This is a relevant class of instances, since a significant fraction of the tables released by NSAs are 1H2D.…”
Section: Test Instancesmentioning
confidence: 99%
See 1 more Smart Citation
“…Hierarchical instances were obtained with a generator of 1H2D synthetic tables [4] that was retrieved from http://www-eio.upc.es/~jcastro/generators_csp.html. This is a relevant class of instances, since a significant fraction of the tables released by NSAs are 1H2D.…”
Section: Test Instancesmentioning
confidence: 99%
“…Clearly, nonperturbative approaches are more rigid than perturbative ones. Furthermore, the most widely used nonperturbative approach, cell suppression [23,10,4], requires the solution of large-scale optimization problems to identify the optimal set of cells to be suppressed. It is perhaps not surprising, therefore, that perturbative approaches are being considered as emerging technologies for tabular data protection.…”
Section: Introductionmentioning
confidence: 99%
“…he is not aware which suppressed cells are primary nor secondary but he knows that there is a number of suppressed cells in the table and their location (disclosure pattern). As each table has row and column totals, often referred to as marginals, the external attacker is able to calculate lower and upper bounds, feasibility range, for each of the suppressed cells by solving a set of linear constraint equations [1] [6].…”
Section: Definitionsmentioning
confidence: 99%
“…A statistical table with marginal totals can be represented as a set of cells, please see details of the model in [1] and [6], a i , i = 1, ..., n, satisfying m linear constraint equations such that M a = 0, where M ij has one of the values…”
Section: Definitionsmentioning
confidence: 99%
See 1 more Smart Citation