{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T05:14:33Z","timestamp":1736486073629,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540352259"},{"type":"electronic","value":"9783540352266"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11775300_13","type":"book-chapter","created":{"date-parts":[[2006,6,14]],"date-time":"2006-06-14T07:51:04Z","timestamp":1150271464000},"page":"146-157","source":"Crossref","is-referenced-by-count":2,"title":["An Effective Approach for Hiding Sensitive Knowledge in Data Publishing"],"prefix":"10.1007","author":[{"given":"Zhihui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Bing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Haofeng","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Baile","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules in Large Databases. In: VLDB 1994, pp. 487\u2013499 (1994)"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Haritsa, J.R.: Maintaining Data Privacy in Association Rule Mining. In: VLDB 2002, pp. 682\u2013693 (2002)","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure Limitation of Sensitive Rules. In: KDEX 1999, pp. 45\u201352 (1999)","DOI":"10.1109\/KDEX.1999.836532"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-45496-9_27","volume-title":"Information Hiding","author":"E. Dasseni","year":"2001","unstructured":"Dasseni, E., Verykios, V.S., Elmagarmid, A.K., Bertino, E.: Hiding Association Rules by Using Confidence and Support. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 369\u2013383. Springer, Heidelberg (2001)"},{"issue":"4","key":"13_CR5","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/604264.604271","volume":"30","author":"Y. Saygin","year":"2001","unstructured":"Saygin, Y., Verykios, V.S., Clifton, C.: Using Unknowns to Prevent Discovery of Association Rules. SIGMOD Record\u00a030(4), 45\u201354 (2001)","journal-title":"SIGMOD Record"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Saygin, Y., Verykios, V.S., Elmagarmid, A.K.: Privacy Preserving Association Rule Mining. In: RIDE 2002, pp. 151\u2013158 (2002)","DOI":"10.1109\/RIDE.2002.995109"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-540-30570-5_17","volume-title":"Database Theory - ICDT 2005","author":"G. Aggarwal","year":"2005","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing tables. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol.\u00a03363, pp. 246\u2013258. Springer, Heidelberg (2005)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient Full- Domain K-Anonymity. In: SIGMOD Conference 2005, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Haritsa, J.R.: A Framework for High-Accuracy Privacy- Preserving Mining. In: ICDE 2005, pp. 193\u2013204 (2005)","DOI":"10.1109\/ICDE.2005.8"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Oliveira, S.R.M., Za\u00efane, O.R.: Protecting Sensitive Knowledge By Data Sanitization. In: ICDM 2003, pp. 613\u2013616 (2003)","DOI":"10.1109\/ICDM.2003.1250990"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: SIGMOD Conference 2000, pp. 439\u2013450 (2000)","DOI":"10.1145\/342009.335438"},{"key":"13_CR12","unstructured":"Oliveira, S.R.M., Za\u00efane, O.R.: Privacy Preserving Frequent Itemset Mining. In: IEEE ICDM Workshop on Privacy, Security and Data Mining (2002)"}],"container-title":["Lecture Notes in Computer Science","Advances in Web-Age Information Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11775300_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T10:35:58Z","timestamp":1736418958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11775300_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540352259","9783540352266"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11775300_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}