{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:39:28Z","timestamp":1725550768762},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540292449"},{"type":"electronic","value":"9783540316657"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11564126_7","type":"book-chapter","created":{"date-parts":[[2005,11,4]],"date-time":"2005-11-04T10:24:55Z","timestamp":1131099895000},"page":"10-21","source":"Crossref","is-referenced-by-count":17,"title":["k-Anonymous Patterns"],"prefix":"10.1007","author":[{"given":"Maurizio","family":"Atzori","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Bonchi","sequence":"additional","affiliation":[]},{"given":"Fosca","family":"Giannotti","sequence":"additional","affiliation":[]},{"given":"Dino","family":"Pedreschi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the twentieth ACM PODS (2001)","DOI":"10.1145\/375551.375602"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imielinski, T., Swami, A.N.: Mining association rules between sets of items in large databases. In: Proceedings of the ACM SIGMOD (1993)","DOI":"10.1145\/170035.170072"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD on Management of Data (2000)","DOI":"10.1145\/342009.335438"},{"key":"7_CR4","unstructured":"Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules in Large Databases. In: Proceedings of the Twentieth VLDB (1994)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Atzori, M., Bonchi, F., Giannotti, F., Pedreschi, D.: k-anonymous patterns. Technical Report 2005-TR-17, ISTI - C.N.R (2005)","DOI":"10.1007\/11564126_7"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Calders, T., Goethals, B.: Mining all non-derivable frequent itemsets. In: Proceedings of the 6th PKDD (2002)","DOI":"10.1007\/3-540-45681-3_7"},{"key":"7_CR7","unstructured":"Fule, P., Roddick, J.F.: Detecting privacy and ethical sensitivity in data mining results. In: Proc. of the 27th conference on Australasian computer science (2004)"},{"key":"7_CR8","volume-title":"Principles of Data Mining","author":"D. Hand","year":"2001","unstructured":"Hand, D., Mannila, H., Smyh, P.: Principles of Data Mining. MIT Press, Cambridge (2001)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Kantarcioglu, M., Jin, J., Clifton, C.: When do data mining results violate privacy? In: Proceedings of the tenth ACM SIGKDD (2004)","DOI":"10.1145\/1014052.1014126"},{"key":"7_CR10","volume-title":"Fundamental Algorithms","author":"D. Knuth","year":"1997","unstructured":"Knuth, D.: Fundamental Algorithms. Addison-Wesley, Reading (1997)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Oliveira, S.R.M., Zaiane, O.R., Saygin, Y.: Secure association rule sharing. In: Proc.of the 8th PAKDD (2004)","DOI":"10.1007\/978-3-540-24775-3_10"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-49257-7_25","volume-title":"Database Theory - ICDT\u201999","author":"N. Pasquier","year":"1998","unstructured":"Pasquier, N., Bastide, Y., Taouil, R., Lakhal, L.: Discovering frequent closed itemsets for association rules. In: Beeri, C., Bruneman, P. (eds.) ICDT 1999. LNCS, vol.\u00a01540, pp. 398\u2013416. Springer, Heidelberg (1998)"},{"key":"7_CR13","unstructured":"Pei, J., Han, J., Wang, J.: Closet+: Searching for the best strategies for mining frequent closed itemsets. In: SIGKDD 2003 (2003)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty Fuzziness and Knowledge-based Systems\u00a010(5) (2002)","DOI":"10.1142\/S0218488502001648"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty Fuzziness and Knowledge-based Systems\u00a010(5) (2002)","DOI":"10.1142\/S021848850200165X"},{"issue":"1","key":"7_CR16","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/974121.974131","volume":"33","author":"V.S. Verykios","year":"2004","unstructured":"Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. SIGMOD Rec.\u00a033(1), 50\u201357 (2004)","journal-title":"SIGMOD Rec"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Zaki, M.J., Hsiao, C.-J.: Charm: An efficient algorithm for closed itemsets mining. In: 2nd SIAM International Conference on Data Mining (2002)","DOI":"10.1137\/1.9781611972726.27"}],"container-title":["Lecture Notes in Computer Science","Knowledge Discovery in Databases: PKDD 2005"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11564126_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T17:40:05Z","timestamp":1558287605000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11564126_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540292449","9783540316657"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11564126_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}