{"title":"Computational issues connected with the protection of sensitive statistics by auditing sum-queries","authors":"F. M. Malvestuto, M. Moscarini","doi":"10.1109/SSDM.1998.688118","DOIUrl":null,"url":null,"abstract":"An implementation of the auditing strategy is presented to avoid both exact and approximate disclosure. The key data structure is a query map, which is a graphical summary of answered queries. Since the size of a query map may be exponential in the number of answered queries, a query-restriction criterion is introduced to make every query map a graph. An auditing procedure on such a graph is presented and the computational issues connected with its implementation are discussed. All the computational tasks can be carried out efficiently but one, which is a provably intractable problem.","PeriodicalId":120937,"journal":{"name":"Proceedings. Tenth International Conference on Scientific and Statistical Database Management (Cat. No.98TB100243)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. Tenth International Conference on Scientific and Statistical Database Management (Cat. No.98TB100243)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSDM.1998.688118","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
An implementation of the auditing strategy is presented to avoid both exact and approximate disclosure. The key data structure is a query map, which is a graphical summary of answered queries. Since the size of a query map may be exponential in the number of answered queries, a query-restriction criterion is introduced to make every query map a graph. An auditing procedure on such a graph is presented and the computational issues connected with its implementation are discussed. All the computational tasks can be carried out efficiently but one, which is a provably intractable problem.