{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T22:02:04Z","timestamp":1773093724085,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540377368","type":"print"},{"value":"9783540377375","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11823728_39","type":"book-chapter","created":{"date-parts":[[2006,9,18]],"date-time":"2006-09-18T15:25:35Z","timestamp":1158593135000},"page":"405-416","source":"Crossref","is-referenced-by-count":55,"title":["Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures"],"prefix":"10.1007","author":[{"given":"Jiuyong","family":"Li","sequence":"first","affiliation":[]},{"given":"Raymond Chi-Wing","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Ada Wai-Chee","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Pei","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","unstructured":"Aggarwal, C.C.: On k-anonymity and the curse of dimensionality. In: VLDB 2005: Proceedings of the 31st international conference on Very large data bases, VLDB Endowment, pp. 901\u2013909 (2005)"},{"key":"39_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-540-30570-5_17","volume-title":"Database Theory - ICDT 2005","author":"G. Aggarwal","year":"2004","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing tables. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol.\u00a03363, pp. 246\u2013258. Springer, Heidelberg (2004)"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Zhu, A., Panigrahy, R., Thomas, D.: Achieving anonymity via clustering in a metric space. In: PODS 2006: Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (2006)","DOI":"10.1145\/1142351.1142374"},{"key":"39_CR4","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1145\/375551.375602","volume-title":"PODS 2001: Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems","author":"D. Agrawal","year":"2001","unstructured":"Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: PODS 2001: Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pp. 247\u2013255. ACM Press, New York (2001)"},{"key":"39_CR5","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/342009.335438","volume-title":"Proc. of the ACM SIGMOD Conference on Management of Data","author":"R. Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proc. of the ACM SIGMOD Conference on Management of Data, May 2000, pp. 439\u2013450. ACM Press, New York (2000)"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE 2005: The 21st International Conference on Data Engineering, pp. 217\u2013228 (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"39_CR7","unstructured":"Blake, E.K.C., Merz, C.J.: UCI repository of machine learning databases (1998), http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html"},{"issue":"1","key":"39_CR8","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J. Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J.M.: Practical data-oriented microaggregation for statistical disclosure control. IEEE Transactions on Knowledge and Data Engineering\u00a014(1), 189\u2013201 (2002)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"2","key":"39_CR9","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s10618-005-0007-5","volume":"11","author":"J. Domingo-Ferrer","year":"2005","unstructured":"Domingo-Ferrer, J., Torra, V.: Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Mining and Knowledge Discovery\u00a011(2), 195\u2013212 (2005)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Wang, K., Yu, P.S.: Top-down specialization for information and privacy preservation. In: ICDE 2005: The 21st International Conference on Data Engineering, pp. 205\u2013216 (2005)","DOI":"10.1109\/ICDE.2005.143"},{"key":"39_CR11","unstructured":"Hundepool, A., Willenborg, L.: \u03bc-and \u03c4- argus: software for statistical disclosure control. In: Third international seminar on statsitcal confidentiality, Bled (1996)"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: KDD 2002: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 279\u2013288 (2002)","DOI":"10.1145\/775047.775089"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D., Ramakrishnan, R.: Multidimensional k-anonymity. In M. Technical Report 1521, University of Wisconsin (2005)","DOI":"10.1109\/ICDE.2006.101"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient full-domain k-anonymity. In: SIGMOD 2005: Proceedings of the 2005 ACM SIGMOD international conference on Management of data, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"issue":"3","key":"39_CR15","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s00145-001-0019-2","volume":"15","author":"Y. Lindell","year":"2002","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. Journal of Cryptology\u00a015(3), 177\u2013206 (2002)","journal-title":"Journal of Cryptology"},{"key":"39_CR16","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D.: l-diversity: privacy beyond k-anonymity. In: The 22st International Conference on Data Engineering (ICDE 2006) (to appear, 2006)"},{"key":"39_CR17","doi-asserted-by":"crossref","unstructured":"Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: PODS 2004: Proceedings of the twenty fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pp. 223\u2013228 (2004)","DOI":"10.1145\/1055558.1055591"},{"key":"39_CR18","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Haritsa, J.: Maintaining data privacy in association rule mining. In: Proceedings of the 28th Conference on Very Large Data Base (VLDB 2002), pp. 682\u2013693. VLDB Endowment (2002)","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"issue":"6","key":"39_CR19","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Transactions on Knowledge and Data Engineering\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"5","key":"39_CR20","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International journal on uncertainty, Fuzziness and knowldege based systems\u00a010(5), 571\u2013588 (2002)","journal-title":"International journal on uncertainty, Fuzziness and knowldege based systems"},{"issue":"5","key":"39_CR21","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. International journal on uncertainty, Fuzziness and knowldege based systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International journal on uncertainty, Fuzziness and knowldege based systems"},{"key":"39_CR22","first-page":"24","volume-title":"The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"J. Vaidya","year":"2003","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over vertically partitioned data. In: The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, pp. 24\u201327. ACM Press, New York (2003)"},{"key":"39_CR23","doi-asserted-by":"crossref","unstructured":"Wang, K., Yu, P.S., Chakraborty, S.: Bottom-up generalization: A data mining solution to privacy protection. In: ICDM 2004: The fourth IEEE International Conference on Data Mining, pp. 249\u2013256 (2004)","DOI":"10.1109\/ICDM.2004.10110"},{"key":"39_CR24","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1145\/1014052.1014145","volume-title":"KDD 2004: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining","author":"R. Wright","year":"2004","unstructured":"Wright, R., Yang, Z.: Privacy-preserving bayesian network structure computation on distributed heterogeneous data. In: KDD 2004: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 713\u2013718. ACM Press, New York (2004)"}],"container-title":["Lecture Notes in Computer Science","Data Warehousing and Knowledge Discovery"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11823728_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:17:16Z","timestamp":1605644236000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11823728_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540377368","9783540377375"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11823728_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}