Efficient Detection and Protection of Information in Cross Tabulated Tables I: Linear Invariant Test

@article{Kao1993EfficientDA,
  title={Efficient Detection and Protection of Information in Cross Tabulated Tables I: Linear Invariant Test},
  author={M. Kao and D. Gusfield},
  journal={SIAM J. Discret. Math.},
  year={1993},
  volume={6},
  pages={460-476}
}
  • M. Kao, D. Gusfield
  • Published 1993
  • Mathematics, Computer Science
  • SIAM J. Discret. Math.
  • To protect sensitive information in a cross tabulated table, it is a common practice to suppress some of the cells in the table. A linear combination of suppressed cells is called a linear invariant if the combination has a unique feasible value. Intuitively, the information contained in an invariant is not protected even though the values of the suppressed cells are not disclosed. This paper gives a surprisingly efficient algorithm for testing whether a linear combination of suppressed cells… CONTINUE READING
    21 Citations
    Total Protection of Analytic Invariant Information in Cross Tabulated Tables
    • M. Kao
    • Mathematics, Computer Science
    • STACS
    • 1994
    • 3
    Total Protection of Analytic-Invariant Information in Cross-Tabulated Tables
    • M. Kao
    • Computer Science, Mathematics
    • SIAM J. Comput.
    • 1997
    • 12
    • PDF
    Minimal Linear Invariants
    • M. Kao
    • Mathematics, Computer Science
    • ASIAN
    • 1995
    • 4
    Data Security Equals Graph Connectivity
    • M. Kao
    • Mathematics, Computer Science
    • SIAM J. Discret. Math.
    • 1996
    • 49
    • PDF
    Censoring statistical tables to protect sensitive information: easy and hard problems
    • F.M. Malvestuto, M. Moscarini
    • Computer Science
    • Proceedings of 8th International Conference on Scientific and Statistical Data Base Management
    • 1996
    • 6
    • PDF
    Suppressing marginal totals from a two-dimensional table to protect sensitive information
    • 10
    Security problems for statistical databases with general cell suppressions
    • T. Hsu, M. Kao
    • Computer Science, Mathematics
    • Proceedings. Ninth International Conference on Scientific and Statistical Database Management (Cat. No.97TB100150)
    • 1997
    • 12
    Finding a Nonempty Algebraic Subset of an Edge Set in Linear Time
    • M. Mezzini
    • Computer Science, Mathematics
    • J. Graph Algorithms Appl.
    • 2007
    • 1
    • PDF

    References

    The maximumflowproblem is log space completefor P , Theoret
    • Comput . Sci .
    • 1988