Abstract is missing.
- A Method for Preserving Statistical Distributions Subject to Controlled Tabular AdjustmentLawrence H. Cox, Jean G. Orelien, Babubhai V. Shah. 1-11 [doi]
- Automatic Structure Detection in Constraints of Tabular DataJordi Castro, Daniel Baena. 12-24 [doi]
- A New Approach to Round Tabular DataJuan José Salazar González. 25-34 [doi]
- Harmonizing Table Protection: Results of a StudySarah Giessing, Stefan Dittrich. 35-47 [doi]
- Effects of Rounding on the Quality and Confidentiality of Statistical DataLawrence H. Cox, Jay J. Kim. 48-56 [doi]
- Disclosure Analysis for Two-Way Contingency TablesHaibing Lu, Yingjiu Li, Xintao Wu. 57-67 [doi]
- Statistical Disclosure Control Methods Through a Risk-Utility FrameworkNatalie Shlomo, Caroline Young. 68-81 [doi]
- A Generalized Negative Binomial Smoothing Model for Sample Disclosure Risk EstimationYosef Rinott, Natalie Shlomo. 82-93 [doi]
- Entry Uniqueness in Margined TablesShmuel Onn. 94-101 [doi]
- Combinations of SDC Methods for Microdata ProtectionAnna Oganian, Alan F. Karr. 102-113 [doi]
- A Fixed Structure Learning Automaton Micro-aggregation Technique for Secure Statistical DatabasesEbaa Fayyoumi, B. John Oommen. 114-128 [doi]
- Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-ApproximationJosep Domingo-Ferrer, Francesc Sebé. 129-138 [doi]
- Using the Jackknife Method to Produce Safe Plots of MicrodataJobst Heitzig. 139-151 [doi]
- Combining Blanking and Noise Addition as a Data Disclosure Limitation MethodAnton Flossmann, Sandra Lechner. 152-163 [doi]
- Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric DataKrishnamurty Muralidhar, Rathindra Sarathy, Ramesh A. Dandekar. 164-176 [doi]
- Adjusting Survey Weights When Altering Identifying Design Variables Via Synthetic DataRobin Mitra, Jerome P. Reiter. 177-188 [doi]
- Risk, Utility and PRAMPeter-Paul de Wolf. 189-204 [doi]
- Distance Based Re-identification for Time Series, Analysis of DistancesJordi Nin, Vicenç Torra. 205-216 [doi]
- Beyond ::::k::::-Anonymity: A Decision Theoretic Framework for Assessing Privacy RiskGuy Lebanon, Monica Scannapieco, Mohamed R. Fouad, Elisa Bertino. 217-232 [doi]
- Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk AssessmentVicenç Torra, John M. Abowd, Josep Domingo-Ferrer. 233-242 [doi]
- Improving Individual Risk EstimatorsLoredana Di Consiglio, Silvia Polettini. 243-256 [doi]
- Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical DatabasesCarlos Aguilar Melchor, Yves Deswarte. 257-265 [doi]
- Privacy-Preserving Data Set UnionAlberto Maria Segre, Andrew Wildenberg, Veronica J. Vieland, Ying Zhang. 266-276 [doi]
- Secure Log-Linear and Logistic Regression Analysis of Distributed DatabasesStephen E. Fienberg, William J. Fulp, Aleksandra B. Slavkovic, Tracey A. Wrobel. 277-290 [doi]
- Measuring the Impact of Data Protection Techniques on Data Utility: Evidence from the Survey of Consumer FinancesArthur Kennickell, Julia Lane. 291-303 [doi]
- Protecting the Confidentiality of Survey Tabular Data by Adding Noise to the Underlying Microdata: Application to the Commodity Flow SurveyPaul Massell, Laura Zayatz, Jeremy Funk. 304-317 [doi]
- Italian Household Expenditure Survey: A Proposal for Data DisseminationMario Trottini, Luisa Franconi, Silvia Polettini. 318-333 [doi]
- The ARGUS Software in CENEXAnco Hundepool. 334-346 [doi]
- Software Development for SDC inM. Templ. 347-359 [doi]
- On Secure e-Health SystemsMilan Markovic. 360-374 [doi]
- IPUMS-International High Precision Population Census Microdata Samples: Balancing the Privacy-Quality Tradeoff by Means of Restricted Access ExtractsRobert McCaa, Steven Ruggles, Michael J. Davern, Tami Swenson, Krishna Mohan Palipudi. 375-382 [doi]