2014
DOI: 10.1287/opre.2014.1293
|View full text |Cite
|
Sign up to set email alerts
|

Perspective Reformulations of the CTA Problem with L2 Distances

Abstract: Any institution that disseminates data in aggregated form has the duty to ensure that individual confidential information is not disclosed, either by not releasing data or by perturbing the released data, while maintaining data utility. Controlled tabular adjustment (CTA) is a promising technique of the second type where a protected table that is close to the original one in some chosen distance is constructed. We attempt, for the first time, to solve CTA with Euclidean distances; this gives rise to difficult … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
8
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3

Relationship

4
3

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 30 publications
1
8
0
Order By: Relevance
“…Two symmetric tables exceeded the one hour time limit for CSP, so the final gap reached (in brackets) is notably higher than the required one. From Table 2, CTA is clearly more efficient for asymmetric than for symmetric instances; this is consistent with the results of [9], albeit they were for a quadratic version of CTA (i.e., using the 2 Euclidean instead of the 1 distance in the objective function). For CSP the pattern is not so definitive: asymmetric instances 4, 5 and, specially, 6 were slower than the corresponding symmetric variants.…”
Section: Computational Experiencesupporting
confidence: 81%
See 2 more Smart Citations
“…Two symmetric tables exceeded the one hour time limit for CSP, so the final gap reached (in brackets) is notably higher than the required one. From Table 2, CTA is clearly more efficient for asymmetric than for symmetric instances; this is consistent with the results of [9], albeit they were for a quadratic version of CTA (i.e., using the 2 Euclidean instead of the 1 distance in the objective function). For CSP the pattern is not so definitive: asymmetric instances 4, 5 and, specially, 6 were slower than the corresponding symmetric variants.…”
Section: Computational Experiencesupporting
confidence: 81%
“…A priori, asymmetric intervals could benefit the solution of mixed integer linear optimization problems, such as CTA and CSP. Indeed, some results along these lines were obtained in [9] for CTA with quadratic objectives. Another objective of this work is to check if such behaviour is observed for CTA and CSP in the solution of a set of hierarchical tables.…”
Section: Introductionmentioning
confidence: 85%
See 1 more Smart Citation
“…Among the recent literature on CTA variants we find [9,18]. Although CTA is not as widely used as cell suppression, it has been applied as one of the steps of other wider protection schemes, such as the pre-tabular protection method of [16].…”
Section: Introductionmentioning
confidence: 99%
“…This CTA software is included in the tauArgus package [25] (http://neon.vb.cbs.nl/casc/tau.htm), used for many European national statistical institutes for the protection of tabular data. Among the recent literature on CTA variants we find [8,24]. In recent specialized workshops on statistical disclosure control, some NSAs stated that perturbative methods, like CTA, are gaining acceptance [31], and perturbative approaches are being used for the protection of national census tables (e.g., [21] for Germany).…”
Section: Introductionmentioning
confidence: 99%