Guest editorial
Spatial and non-spatial model-based protection procedures for the release of business microdata
Maximum entropy simulation for microdata protection
Information preserving statistical obfuscation
A theoretical basis for perturbation methods
A comment on “A theoretical basis for perturbation methods” by Krishnamurty Muralidhar and Rathindra Sarathy
A rejoinder to the comments by Polettini and Stander
Disclosure risk assessment in statistical microdata protection via advanced record linkage
Source Data Perturbation and consistent sets of safe tables
Preserving confidentiality of high-dimensional tabulated data
Model Diagnostics for Remote Access Regression Servers
Remote access systems for statistical analysis of microdata