Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/45003
DC Field | Value | |
---|---|---|
dc.title | Confidentiality control of tabulated data: Some practical network models | |
dc.contributor.author | George, J.A. | |
dc.contributor.author | Kuan, C.J. | |
dc.contributor.author | Ring, B.J. | |
dc.date.accessioned | 2013-10-10T04:39:51Z | |
dc.date.available | 2013-10-10T04:39:51Z | |
dc.date.issued | 1995 | |
dc.identifier.citation | George, J.A.,Kuan, C.J.,Ring, B.J. (1995). Confidentiality control of tabulated data: Some practical network models. European Journal of Operational Research 85 (3) : 454-472. ScholarBank@NUS Repository. | |
dc.identifier.issn | 03772217 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/45003 | |
dc.description.abstract | The problem of confidentiality control is a significant issue for statistics gathering organisations. Most existing methods suffer from a variety of difficulties for practical implementation. This paper presents techniques for confidentiality control of tabulated data using network formulations to overcome many of the weaknesses of the current methods. These techniques are based on the established methodology of controlled rounding, which preserves additivity in the resulting solution, while adding a number of pieces of new material. Firstly, a controlled rounding formulation is introduced that is designed to provide an unbiased solution. Then we construct three variations of a controlled perturbation technique using different forms of bounds on the cells. Finally, a methodology is explained for disturbing only the small-valued cells of the table using each of the four basic methods. A simple example of the methods and results from experimentation on the use of the methods show that they satisfy the needs of confidentiality and are computationally viable. © 1995. | |
dc.source | Scopus | |
dc.subject | Confidentiality control | |
dc.subject | Controlled perturbation | |
dc.subject | Controlled rounding | |
dc.subject | Networks | |
dc.type | Article | |
dc.contributor.department | DECISION SCIENCES | |
dc.description.sourcetitle | European Journal of Operational Research | |
dc.description.volume | 85 | |
dc.description.issue | 3 | |
dc.description.page | 454-472 | |
dc.description.coden | EJORD | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.