{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T09:44:57Z","timestamp":1773308697078,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540297703","type":"print"},{"value":"9783540321156","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11576259_68","type":"book-chapter","created":{"date-parts":[[2005,10,24]],"date-time":"2005-10-24T14:17:00Z","timestamp":1130163420000},"page":"627-636","source":"Crossref","is-referenced-by-count":1,"title":["A K-Anonymizing Approach for Preventing Link Attacks in Data Publishing"],"prefix":"10.1007","author":[{"given":"Xiaochun","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiangyu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ge","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"68_CR1","doi-asserted-by":"crossref","unstructured":"Yang, X., Li, C.: Secure XML Publishing without Information Leakage in the Presence of Data Inference. In: Proc. of the 30th Int. Conf. on Very Large Database (VLDB), Toronto, Canada, pp. 96\u2013107 (2004)","DOI":"10.1016\/B978-012088469-8.50012-7"},{"key":"68_CR2","unstructured":"Yang, X., Li, C., Yu, G., Shi, L.: XGuard: A System for Publishing XML Documents without Information Leakage in the Presence of Data Inference. In: Proc. of the 21st Int. Conf. on Data Engineering (ICDE), Tokyo, Japan, pp. 1124\u20131125 (2005)"},{"key":"68_CR3","unstructured":"Sweeney, L.: Uniqueness of Simple Demographics in the U.S. Population. In: LIDAP-WP4. Carnegie Mellon University, Laboratory for Int. Data Privacy, Pittsburgh, PA (2000)"},{"key":"68_CR4","unstructured":"Sweeney, L.: Guaranteeing Anonymity when Sharing Medical Data, the Datafly System. J. of the American Medical Informatics Association (1997)"},{"key":"68_CR5","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: Achieving K-anonymity Privacy Protection using Generalization and Suppression. Int. J. on Uncertainty, Fuzziness and Knowledge-based Systems, 571\u2013588 (2002)","DOI":"10.1142\/S021848850200165X"},{"key":"68_CR6","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D., Ramakrishnan, R.: Incognito: Efficient Full-Domain K-Anonymity. In: SIGMOD (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"68_CR7","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J., Agrawal, R.: Data Privacy Through Optimal K-Anonymization. In: Proc. of the 21st Int. Conf. on Data Engineering (ICDE), Tokyo, Japan, pp. 217\u2013229 (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"68_CR8","doi-asserted-by":"crossref","unstructured":"Fung, B., Wang, K., Yu, P.: Top-Down Specialization for Information and Privacy Preservation. In: Proc. of the 21st Int. Conf. on Data Engineering (ICDE), Tokyo, Japan, pp. 205\u2013216 (2005)","DOI":"10.1109\/ICDE.2005.143"},{"key":"68_CR9","doi-asserted-by":"crossref","unstructured":"Iyengar, V.: Transforming Data to Satisfy Privacy Constraints. In: Proc. of the Eighth ACM SIGKDD, pp. 279\u2013288 (2002)","DOI":"10.1145\/775047.775089"},{"key":"68_CR10","unstructured":"Winkler, W.E.: Using Simulated Annealing for K-anonymity. Research Report Series (Statistics #2002-7), U.S. Census Bureau (2002)"},{"key":"68_CR11","unstructured":"Hundepool, A., Willenborg, L.: \u03bc- and \u03c4-argus: Software for Statistical Disclosure Control. In: The 3rd Int. Seminar on Statistical Confidentiality, Bled (1996)"},{"key":"68_CR12","unstructured":"Sweeney, L.: Towards the Optimal Suppression of Details when Disclosing Medical Data, the Use of Sub-combination Analysis. In: Proc. of MEDINFO 1998. International Medical Informatics Association, Seoul, Korea. North-Holland, Amsterdam (1998)"}],"container-title":["Lecture Notes in Computer Science","Parallel and Distributed Processing and Applications - ISPA 2005 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11576259_68.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:59:27Z","timestamp":1605643167000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11576259_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540297703","9783540321156"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11576259_68","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}