{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T02:44:12Z","timestamp":1648608252368},"reference-count":25,"publisher":"Elsevier BV","issue":"1-3","license":[{"start":{"date-parts":[[2006,10,1]],"date-time":"2006-10-01T00:00:00Z","timestamp":1159660800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":2481,"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Theoretical Computer Science"],"published-print":{"date-parts":[[2006,10]]},"DOI":"10.1016\/j.tcs.2006.06.005","type":"journal-article","created":{"date-parts":[[2006,7,21]],"date-time":"2006-07-21T18:46:43Z","timestamp":1153507603000},"page":"140-161","source":"Crossref","is-referenced-by-count":1,"title":["Minimal invariant sets in a vertex-weighted graph"],"prefix":"10.1016","volume":"362","author":[{"given":"Francesco M.","family":"Malvestuto","sequence":"first","affiliation":[]},{"given":"Mauro","family":"Mezzini","sequence":"additional","affiliation":[]},{"given":"Marina","family":"Moscarini","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.tcs.2006.06.005_bib1","series-title":"Network Flows","author":"Ahuja","year":"1993"},{"key":"10.1016\/j.tcs.2006.06.005_bib2","series-title":"Hypergraphs","author":"Berge","year":"1989"},{"key":"10.1016\/j.tcs.2006.06.005_bib3","series-title":"Graph Theory With Applications","author":"Bondy","year":"1976"},{"key":"10.1016\/j.tcs.2006.06.005_bib4","first-page":"354","article-title":"A model of summary data and its applications to statistical databases","volume":"Vol. 339","author":"Chen","year":"1989"},{"key":"10.1016\/j.tcs.2006.06.005_bib5","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1109\/69.43426","article-title":"On the data model and access method of summary data management","volume":"1","author":"Chen","year":"1989","journal-title":"IEEE Trans. Knowledge Data Eng."},{"key":"10.1016\/j.tcs.2006.06.005_bib6","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1109\/TSE.1982.236161","article-title":"Auditing and inference control in statistical databases","volume":"8","author":"Chin","year":"1982","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/j.tcs.2006.06.005_bib7","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1287\/moor.12.2.193","article-title":"Some new matroids on graphs: cut sets and the max cut problem","volume":"12","author":"Conforti","year":"1987","journal-title":"Math. Oper. Res."},{"key":"10.1016\/j.tcs.2006.06.005_bib8","first-page":"205","article-title":"An agenda for research on statistical disclosure limitation","volume":"11","author":"Cox","year":"1995","journal-title":"J. Official Statist."},{"key":"10.1016\/j.tcs.2006.06.005_bib9","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/0095-8956(74)90027-6","article-title":"Generalization of magic graphs","volume":"17","author":"Doob","year":"1974","journal-title":"J. Combin. Theory B"},{"key":"10.1016\/j.tcs.2006.06.005_bib10","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/S0022-0000(02)00033-8","article-title":"On the content of materialized aggregate views","volume":"66","author":"Grumbach","year":"2003","journal-title":"J. Comput. System Sci."},{"key":"10.1016\/j.tcs.2006.06.005_bib11","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1137\/0217034","article-title":"A graph-theoretic approach to statistical data security","volume":"17","author":"Gusfield","year":"1988","journal-title":"SIAM J. Comput."},{"key":"10.1016\/j.tcs.2006.06.005_bib12","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1007\/s007780100054","article-title":"Answering queries using views: a survey","volume":"10","author":"Halevy","year":"2001","journal-title":"VLDB J."},{"key":"10.1016\/j.tcs.2006.06.005_bib13","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1016\/S0195-6698(88)80066-0","article-title":"Magic graphs, a characterization","volume":"9","author":"Jeurissen","year":"1988","journal-title":"European J. Combin."},{"key":"10.1016\/j.tcs.2006.06.005_bib14","first-page":"23","article-title":"Minimal linear invariants","volume":"Vol. 1023","author":"Kao","year":"1995"},{"key":"10.1016\/j.tcs.2006.06.005_bib15","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1137\/S0895480193243274","article-title":"Data security equals graph connectivity","volume":"9","author":"Kao","year":"1996","journal-title":"SIAM J. Discrete Math."},{"key":"10.1016\/j.tcs.2006.06.005_bib16","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1023\/A:1009712000657","article-title":"Efficient detection and protection of information in cross-tabulated tables II: minimal linear invariant sets","volume":"1","author":"Kao","year":"1997","journal-title":"J. Combin. Optim."},{"key":"10.1016\/j.tcs.2006.06.005_bib17","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1137\/S0097539793253589","article-title":"Total protection of analytic-invariant set information in cross-tabulated tables","volume":"26","author":"Kao","year":"1997","journal-title":"SIAM J. Comput."},{"key":"10.1016\/j.tcs.2006.06.005_bib18","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1137\/0406037","article-title":"Efficient detection and protection of information in cross tabulated tables I: linear invariant test","volume":"6","author":"Kao","year":"1993","journal-title":"SIAM J. Discrete Math."},{"key":"10.1016\/j.tcs.2006.06.005_bib19","doi-asserted-by":"crossref","first-page":"678","DOI":"10.1145\/169725.169712","article-title":"A universal-scheme approach to statistical databases containing homogeneous summary tables","volume":"18","author":"Malvestuto","year":"1993","journal-title":"ACM Trans. Database Systems"},{"key":"10.1016\/j.tcs.2006.06.005_bib20","doi-asserted-by":"crossref","first-page":"1438","DOI":"10.1137\/S0097539700376068","article-title":"A linear algorithm for finding the invariant edges of an edge-weighted graph","volume":"31","author":"Malvestuto","year":"2002","journal-title":"SIAM J. Comput."},{"key":"10.1016\/j.tcs.2006.06.005_bib21","unstructured":"F.M. Malvestuto, M. Mezzini, M. Moscarini, Answering statistical sum-queries using materialised sum-queries: an analytic approach, unpublished manuscript, 2005."},{"key":"10.1016\/j.tcs.2006.06.005_bib22","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1127345.1127347","article-title":"Auditing sum-queries to make a statistical database secure","volume":"9","author":"Malvestuto","year":"2006","journal-title":"ACM Trans. Inform. System Security"},{"key":"10.1016\/j.tcs.2006.06.005_bib23","series-title":"Proc. Tenth Internat. Conf. on \u201cScientific & Statistical Database Management\u201d","first-page":"134","article-title":"Computational issues connected with the protection of sensitive statistics by auditing sum-queries","author":"Malvestuto","year":"1998"},{"key":"10.1016\/j.tcs.2006.06.005_bib24","series-title":"Statistical Data Protection","first-page":"29","article-title":"An audit expert for large statistical databases","author":"Malvestuto","year":"1999"},{"key":"10.1016\/j.tcs.2006.06.005_bib25","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1109\/TCS.1976.1084251","article-title":"On the incidence matrix of a graph","volume":"23","author":"Van Nuffelen","year":"1976","journal-title":"IEEE Trans. Circuits Systems"}],"container-title":["Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0304397506003495?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0304397506003495?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,1,15]],"date-time":"2019-01-15T00:20:03Z","timestamp":1547511603000},"score":1,"resource":{"primary":{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S0304397506003495"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10]]},"references-count":25,"journal-issue":{"issue":"1-3","published-print":{"date-parts":[[2006,10]]}},"alternative-id":["S0304397506003495"],"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1016\/j.tcs.2006.06.005","relation":{},"ISSN":["0304-3975"],"issn-type":[{"value":"0304-3975","type":"print"}],"subject":[],"published":{"date-parts":[[2006,10]]}}}