Proceedings of the Thirtieth Hawaii International Conference on System Sciences
DOI: 10.1109/hicss.1997.661699
|View full text |Cite
|
Sign up to set email alerts
|

Cell suppression to limit content-based disclosure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…For example, a particular contingency table cell may be too sensitive to be released if the number of respondents is smaller than a threshold. In such a case, we should protect privacy by combined use of the TM 2 method and other disclosure limitation techniques, including cell suppression, rounding, sampling, data swapping, and other sampling and simulation techniques (for more details see Duncan et al, 2001; Oganian and Domingo-Ferrer, 2003; Domingo-Ferrer and Saygin, 2008; Fienberg and Slavkovic, 2008; and Slavkovic, 2010). The TM 2 method makes sure that the data collectors do not see the raw patient data ( Z 1 and Z 2 ) but they can still derive the correct contingency table ( a , b , c and d ).…”
Section: Properties Of Matrix Masked Datamentioning
confidence: 99%
“…For example, a particular contingency table cell may be too sensitive to be released if the number of respondents is smaller than a threshold. In such a case, we should protect privacy by combined use of the TM 2 method and other disclosure limitation techniques, including cell suppression, rounding, sampling, data swapping, and other sampling and simulation techniques (for more details see Duncan et al, 2001; Oganian and Domingo-Ferrer, 2003; Domingo-Ferrer and Saygin, 2008; Fienberg and Slavkovic, 2008; and Slavkovic, 2010). The TM 2 method makes sure that the data collectors do not see the raw patient data ( Z 1 and Z 2 ) but they can still derive the correct contingency table ( a , b , c and d ).…”
Section: Properties Of Matrix Masked Datamentioning
confidence: 99%
“…Inference control methods proposed in statistical databases are usually classified into two main categories: restriction based techniques and perturbation based techniques. Restriction based techniques [25] include restricting the size of a query set (that is, the values aggregated by a single query), overlap control [21] in query sets, auditing all queries in order to determine when inferences are possible [13,10,29,33,6], suppressing sensitive data in released statistical tables [14,22], partitioning data into blocks and treating each block as a single value in answering queries [11,12,34]. Perturbation based technique includes adding noise to source data [39], outputs [5], database structure [36], or size of query sets (that is, answering queries using sampled data) [16].…”
Section: Related Workmentioning
confidence: 99%
“…Some variations of the inference problem have been studied lately, such as the inference caused by arithmetic constraints [8,7], the inference of approximate values instead of exact values [32] and the inference of small intervals enclosing exact values [30]. Finally, techniques similar to suppression and partitioning are being developed to protect the sensitive information in released census data [37,43,14,22,42,34].…”
Section: Related Workmentioning
confidence: 99%
“…This approach is called randomization. Another possibility is to decrease precision of the transmitted data by rounding, suppressing certain values, replacing values with intervals, or replacing categorical values by more general categories up the taxonomic hierarchy, see [19,31,40,41].…”
Section: Privacy-preserving Data Miningmentioning
confidence: 99%