1980
DOI: 10.1080/01621459.1980.10477481
|View full text |Cite
|
Sign up to set email alerts
|

Suppression Methodology and Statistical Disclosure Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
64
0

Year Published

1995
1995
2014
2014

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 160 publications
(65 citation statements)
references
References 3 publications
1
64
0
Order By: Relevance
“…In technical terms disclosure limitation involves manipulating or masking a data matrix. Following important work by Cox (1980), Dalenius and Reiss (1982), Roberts (1986), Dalenius (1986), and Duncan and Lambert (1986), Duncan and Pearson (1991) provide a clear and accessible description of the methods available for the reduction of disclosure risk. More recent monographic treatments by de Waal (1996, 2001) and Doyle et al (2001) update the framework to emphasize disclosure risk assessment and administrative alternatives to statistical solutions.…”
Section: Disclosure Limitation Basicsmentioning
confidence: 99%
“…In technical terms disclosure limitation involves manipulating or masking a data matrix. Following important work by Cox (1980), Dalenius and Reiss (1982), Roberts (1986), Dalenius (1986), and Duncan and Lambert (1986), Duncan and Pearson (1991) provide a clear and accessible description of the methods available for the reduction of disclosure risk. More recent monographic treatments by de Waal (1996, 2001) and Doyle et al (2001) update the framework to emphasize disclosure risk assessment and administrative alternatives to statistical solutions.…”
Section: Disclosure Limitation Basicsmentioning
confidence: 99%
“…Ernst (1989) demonstrated some general problems with network formulations when N Ն 3. (See also Cox 1980, 1987, Cox et al 1986, Gusfield 1988, Sullivan and Zayatz 1991, Rowe 1991.) Cox (1992) identifies the case of N Ն 3 as an important research problem.…”
Section: Two-dimensional Views: Network and Matricesmentioning
confidence: 99%
“…Mathematical optimization methods are used to assess upper and lower possible values in confidential two-way tables by Cox (1987) and Sande (1984). The upper and lower bounds for a sensitive cell are called the ambiguity width by Robertson (1994) and feasibility interval by Willenborg and de Waal (1996, p. 101).…”
Section: Linear Programming Formulationmentioning
confidence: 99%
See 2 more Smart Citations