Although Artificial Intelligent (AI) techniques have been used in various applications, their use in maintaining security in Statistical DataBases (SDBs) has not been reported. This paper presents results, that to the best of our knowledge is pioneering, by which concepts from causal networks are used to secure SDBs. We consider the Micro-Aggregation Problem (MAP) in secure SDBs which involves partitioning a set of individual records in a micro-data file into a number of mutually exclusive and exhaustive groups. This problem, which seeks for the best partition of the micro-data file, is known to be NP-hard, and has been tackled using many heuristic solutions. In this paper, we would like to demonstrate that in the process of developing Micr...
This article gives a survey of combinatorial algorithms and methods for database security related to...
The security problem of statistical databases containing anonymous but individual records which may ...
This article gives a survey of combinatorial algorithms and methods for database security related to...
We consider the Micro-Aggregation Problem (MAP) in secure statistical databases which involves parti...
We consider the micro-aggregation problem which involves partitioning a set of individual records in...
We1 consider the problem of micro-aggregation in secure statistical databases, by enhancing the prim...
We consider the problem of securing a statistical database by utilizing the well-known micro-aggrega...
This paper surveys the fields of Statistical Disclosure Control (SDC) and Micro-Aggregation Techniqu...
We consider the microaggregation problem (MAP) that involves partitioning a set of individual record...
Published version of an article in the journal: IEEE Transactions on Systems, Man, and Cybernetics, ...
This paper presents a possibly pioneering endeavor to tackle the Microaggregation Techniques (MATs) ...
Microdata protection in statistical databases has recently become a major societal concern and has b...
Microdata protection in statistical databases has recently become a major societal concern and has b...
Research in Controlling Inference in statistical databases (SDBs) has been under way for over 20 yea...
Microaggregation is an effective means of protecting the microdata in the statistical databases. Mic...
This article gives a survey of combinatorial algorithms and methods for database security related to...
The security problem of statistical databases containing anonymous but individual records which may ...
This article gives a survey of combinatorial algorithms and methods for database security related to...
We consider the Micro-Aggregation Problem (MAP) in secure statistical databases which involves parti...
We consider the micro-aggregation problem which involves partitioning a set of individual records in...
We1 consider the problem of micro-aggregation in secure statistical databases, by enhancing the prim...
We consider the problem of securing a statistical database by utilizing the well-known micro-aggrega...
This paper surveys the fields of Statistical Disclosure Control (SDC) and Micro-Aggregation Techniqu...
We consider the microaggregation problem (MAP) that involves partitioning a set of individual record...
Published version of an article in the journal: IEEE Transactions on Systems, Man, and Cybernetics, ...
This paper presents a possibly pioneering endeavor to tackle the Microaggregation Techniques (MATs) ...
Microdata protection in statistical databases has recently become a major societal concern and has b...
Microdata protection in statistical databases has recently become a major societal concern and has b...
Research in Controlling Inference in statistical databases (SDBs) has been under way for over 20 yea...
Microaggregation is an effective means of protecting the microdata in the statistical databases. Mic...
This article gives a survey of combinatorial algorithms and methods for database security related to...
The security problem of statistical databases containing anonymous but individual records which may ...
This article gives a survey of combinatorial algorithms and methods for database security related to...