Abstract is missing.
- Using a Mathematical Programming Modeling Language for Optimal CTAJordi Castro, Daniel Baena. 1-12 [doi]
- A Data Quality and Data Confidentiality Assessment of Complementary Cell SuppressionLawrence H. Cox. 13-23 [doi]
- Pre-processing Optimisation Applied to the Classical Integer Programming Model for Statistical Disclosure ControlMartin Serpell, Alistair Clark, Jim Smith, Andrea Staggemeier. 24-36 [doi]
- How to Make the T-ARGUS Modular Method Applicable to Linked TablesPeter-Paul de Wolf, Sarah Giessing. 37-49 [doi]
- Bayesian Assessment of Rounding-Based Disclosure ControlJon J. Forster, Roger C. Gill. 50-63 [doi]
- Cell Bounds in Two-Way Contingency Tables Based on Conditional FrequenciesByran Smucker, Aleksandra B. Slavkovic. 64-76 [doi]
- Invariant Post-tabular Protection of Census Frequency CountsNatalie Shlomo, Caroline Young. 77-89 [doi]
- A Practical Approach to Balancing Data Confidentiality and Research Needs: The NHIS Linked Mortality FilesKimberly Lochner, Stephanie Bartee, Gloria Wheatcroft, Christine Cox. 90-99 [doi]
- From t-Closeness to PRAM and Noise Addition Via Information TheoryDavid Rebollo-Monedero, Jordi Forné, Josep Domingo-Ferrer. 100-112 [doi]
- Robustification of Microdata Masking Methods and the Comparison with Existing MethodsMatthias Templ, Bernhard Meindl. 113-126 [doi]
- A Preliminary Investigation of the Impact of Gaussian Versus t-Copula for Data PerturbationMario Trottini, Krishnamurty Muralidhar, Rathindra Sarathy. 127-138 [doi]
- Anonymisation of Panel Enterprise Microdata - Survey of a German ProjectMaurice Brandt, Rainer Lenz, Martin Rosemann. 139-151 [doi]
- Towards a More Realistic Disclosure Risk AssessmentJordi Nin, Javier Herranz, Vicenç Torra. 152-165 [doi]
- Assessing Disclosure Risk for Record LinkageChris Skinner. 166-176 [doi]
- Robust Statistics Meets SDC: New Disclosure Risk Measures for Continuous Microdata MaskingMatthias Templ, Bernhard Meindl. 177-189 [doi]
- Parallelizing Record Linkage for Disclosure Risk AssessmentJoan Guisado-Gámez, Arnau Prat-Pérez, Jordi Nin, Victor Muntés-Mulero, Josep-Lluis Larriba-Pey. 190-202 [doi]
- Extensions of the Re-identification Risk Measures Based on Log-Linear ModelsDaniela Ichim. 203-212 [doi]
- Use of Auxiliary Information in Risk EstimationLoredana Di Consiglio, Silvia Polettini. 213-226 [doi]
- Accounting for Intruder Uncertainty Due to Sampling When Estimating Identification Disclosure Risks in Partially Synthetic DataJörg Drechsler, Jerome P. Reiter. 227-238 [doi]
- How Protective Are Synthetic Data?John M. Abowd, Lars Vilhuber. 239-246 [doi]
- Auditing Categorical SUM, MAX and MIN QueriesFrancesco M. Malvestuto. 247-256 [doi]
- Reasoning under Uncertainty in On-Line AuditingGerardo Canfora, Bice Cavallo. 257-269 [doi]
- A Remote Analysis Server - What Does Regression Output Look Like?Christine M. O Keefe, Norm M. Good. 270-283 [doi]
- Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic ElectionsEmmanouil Magkos, Manolis Maragoudakis, Vassilios Chrissikopoulos, Stefanos Gridzalis. 284-297 [doi]
- A Privacy-Preserving Framework for Integrating Person-Specific DatabasesMurat Kantarcioglu, Wei Jiang, Bradley Malin. 298-314 [doi]
- Peer-to-Peer Private Information RetrievalJosep Domingo-Ferrer, Maria Bras-Amorós. 315-323 [doi]
- Legal, Political and Methodological Issues in Confidentiality in the European Statistical SystemJean-Marc Museux, Martine Peeters, Maria João Santos. 324-334 [doi]