REFERENCES

REFERENCES

Adam, N.R., & Wortmann, J.C. (1989). Security control methods for statistical databases: A comparative study. ACM Computing Surveys, 21, 515–556.

Adam, N.R., Gangopadyay, A., & Holowczak, R.D. (1999). A survey of research on database protection. Statistical Data Protection. EUROSTAT, 29–43.

Ahuja, R.K., Magnanti, T.L., & Orlin, J.B. (1993). Network Flows. City, NJ: Prentice-Hall.

Björner, A., & Karlander, J. (1993). The mod p rank of incidence matrices for connected uniform hypergraphs. European Journal of Combinatorics, 14, 151–155.

Bondy, J.A., & Murty, U.S.R. (1976). Graph Theory with Applications. New York: North Holland.

Brankovic, L., Horak, P., & Miller, M. (2000). An optimization problem in statistical databases. SIAM Journal of Discrete Mathematics, 13, 346–353.

Carvalho, F.D. de, Dellaert, N.P., & Osorio, M. de S. (1994). Statistical disclosure in two-dimensional tables: general tables. Journal of the American Statistical Association, 89, 1547–1557.

Chin, F.Y. (1986). Security problems on inference control for sum, min, and max queries. Journal of the ACM, 33, 451–464.

Chin, F.Y., & Ozsoyoglu, G. (1982). Auditing and inference control in statistical databases. IEEE Transactions on Software Engineering, 8, 574–582.

Chu, P.C. (1997). Cell suppression methodology: The importance of suppressing marginal totals. IEEE Transactions on Knowledge and Data Engineering, 9, 513–523.

Conforti, M., & Rao, M.R. (1987). Some new matroids on graphs: Cutsets and the max cut problem. Mathematics of Operations Research, 12, 193–204.

Cox, L.H. (1980). Suppression methodology and statistical disclosure control. Journal of the American Statistics Association, Theory and Method Section, 75, 377–385.

Cox, L.H. (1981). Linear sensitivity measures in statistical disclosure control. Journal of Statistical Planning and Inference, 75, 153–164.

Cox, L.H., & Zayatz, L.V. (1995). An agenda for research in statistical disclosure limitation. Journal of Official Statistics, 11, 205–220.

Dantzig, G.B. (1963). Linear Programming and Extensions. Princeton, NJ: Princeton University Press.

Date, C.J. (1983). An Introduction to Database Systems: Vol. II. Reading, MA: Addison-Wesley.

Denning, D.E.R. (1982). Cryptography and Data Security. Reading, MA: Addison-Wesley.

Garfinkel, R.S., & Nemhauser, G.L. (1972). Integer Programming. New York: John Wiley & Sons.

Gusfield, D. (1988), A graph theoretic approach to statistical data security. SIAM Journal of Computing, 17, 552–571.

Horak, P., Brankovic, L., & Miller, M. (1999). A combinatorial problem in database security. Discrete Applied Mathematics, 91, 119–126.

Irving, R.W., & Jerrum, M.R. (1994). Three-dimensional statistical data security problems. SIAM Journal of Computing, 23, 170–184.

Kao, M.-Y. (1997). Efficient detection and protection of information in cross-tabulated tables II: Minimal linear invariants. Journal of Combinatorial Optimization, 1, 187–202.

Kelly, J.P., Golden, B.L., & Assad, A.A. (1992). Cell suppression: Disclosure protection for sensitive tabular data. Networks, 22, 397–417.

Kleinberg, J.M., Papadimitriou, C.H., & Raghavan, P. (2000). Auditing Boolean attributes. Proceedings of the 14th ACM Symposium on Principles of Database Systems, 86–91.

Malvestuto, F.M., & Moscarini, M. (1990). Query evaluability in statistical databases. IEEE Transactions on Knowledge and Data Engineering, 2, 425–430.

Malvestuto, F.M. (1993). A universal-scheme approach to statistical databases containing homogeneous summary tables. ACM Transactions on Database Systems, 18, 678–708.

Malvestuto, F.M., & Moscarini, M. (1996a). Suppressing marginal totals from a two-dimensional table to protect sensitive information. Statistics and Computing, 7, 101–114.

Malvestuto, F.M., & Moscarini, M. (1996b). Censoring statistical tables to protect sensitive information: Easy and hard problems. In Svenson, P., & French, J.C. (Eds.), Proceedings of the 8th International Conference on Scientific and Statistical Database Management, 12–21.

Malvestuto, F.M., & Moscarini, M. (1999). An audit expert for large statistical databases. Statistical Data Protection. EUROSTAT, 29–43.

Malvestuto, F.M., & Mezzini, M. (2002). A linear algorithm for finding the invariant edges of an edge-weighted graph. SIAM Journal of Computing (31, 1438–1455).

Malvestuto, F.M., & Mezzini, M. (2001). Minimal Linear and Sum Invariants of an Edge-Weighted Graph. Unpublished Manuscript.

Michalewicz, Z. (1991). Security of a statistical database. Chapter 13 of Michalewicz, Z. (Ed.), Statistical and Scientific Databases. New York: Ellis Horwood.

Roehrig, S.F. (2001). An overview of disclosure auditing in categorical databases. Proceedings of the World Multiconference on Systemics, Cybernetics, and Informatics. Volume XIV, 510–514.

Schackis D. (1993). Manual on disclosure control methods. EUROSTAT, Technical Report.

Ullman, J.D. (1983). Principles of Database Systems. Rockville, MD: Computer Science Press.

Willenborg, L., & de Waal, T. (1996). Statistical disclosure control in practice. Lecture Notes in Statistics, Volume 111. New York: Springer-Verlag.

Willenborg, L., & de Waal, T. (2000). Elements of statistical disclosure control. Lecture Notes in Statistics, Volume 155. New York: Springer-Verlag.



Multidimensional Databases(c) Problems and Solutions
Multidimensional Databases: Problems and Solutions
ISBN: 1591400538
EAN: 2147483647
Year: 2003
Pages: 150

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net