2002
DOI: 10.1007/3-540-47804-3_15
|View full text |Cite
|
Sign up to set email alerts
|

Tools and Strategies to Protect Multiple Tables with the GHQUAR Cell Suppression Engine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2004
2004
2012
2012

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 1 publication
0
10
0
Order By: Relevance
“…However, most of them have been included in the τ -Argus software (Hundepool et al, 2008), freely available from http://neon.vb.cbs.nl/casc/tau.htm, and being used by several European NSAs. In particular, this package includes the Benders decomposition of Fischetti and Salazar-González (2001), the shortest paths heuristic of Castro (2007a), and the two (infeasible) heuristics of deWolf (2002) and Giessing and Repsilber (2002). These four approaches can be tested with the same set of tables, generated within the τ -Argus common interface.…”
Section: Computational Evaluation Of Approaches For Cspmentioning
confidence: 99%
“…However, most of them have been included in the τ -Argus software (Hundepool et al, 2008), freely available from http://neon.vb.cbs.nl/casc/tau.htm, and being used by several European NSAs. In particular, this package includes the Benders decomposition of Fischetti and Salazar-González (2001), the shortest paths heuristic of Castro (2007a), and the two (infeasible) heuristics of deWolf (2002) and Giessing and Repsilber (2002). These four approaches can be tested with the same set of tables, generated within the τ -Argus common interface.…”
Section: Computational Evaluation Of Approaches For Cspmentioning
confidence: 99%
“…The method was designed to guarantee a sliding protection range for each confidential cell: a lower bound is calculated for the width of the cell's protection range, resulting from the suppression of the corner points of each hypercube, and that suppression is considered feasible if it turns out that the bound is sufficiently large. Suggestions on how to set the width of the protection ranges, to obtain a feasible set of suppressions, can be found in [17]. The adaptation of the hypercube method to the a priori fixed interval protection criterion has no theoretical difficulty.…”
Section: Other Heuristicsmentioning
confidence: 99%
“…The hypercube method, as described in [17], is a fast heuristic developed to find sets of complementary suppressions to protect confidential data in large complex tables. It decomposes complex tables into subtables, without substructure, and iteratively protects the subtables.…”
Section: Other Heuristicsmentioning
confidence: 99%
“…The hypercube [25], initially developed for k-dimensional tables, is a simple and fast procedure. For two-dimensional tables it can be seen as a network flows approach that only considers a subset of the flows (thus providing less quality solutions than heuristics based on network optimization).…”
Section: Cell Suppressionmentioning
confidence: 99%
“…However, they can be run with the same table from the τ-Argus package, which implements four of them: the optimal approach of [24], the shortest paths heuristic of [9], and the two (infeasible) heuristics of [19] and [25]. To compare them, in [26] a toy table 1H2D was generated with τ-Argus.…”
Section: Cell Suppressionmentioning
confidence: 99%