{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:44:02Z","timestamp":1725493442129},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540432203"},{"type":"electronic","value":"9783540457589"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45758-5_10","type":"book-chapter","created":{"date-parts":[[2007,10,25]],"date-time":"2007-10-25T15:32:20Z","timestamp":1193326340000},"page":"148-159","source":"Crossref","is-referenced-by-count":15,"title":["A Privacy-Enhanced Microaggregation Method"],"prefix":"10.1007","author":[{"given":"Yingjiu","family":"Li","sequence":"first","affiliation":[]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Lingyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,2,5]]},"reference":[{"key":"10_CR1","unstructured":"Baeyens, Y., Defays, D.: Estimation of variance loss following microaggregation by the individual ranking method. Proc. of Statistical Data Protection (1998)"},{"key":"10_CR2","unstructured":"Chin, F.Y., \u00d6zsoyoglu, G.: Security in partitioned dynamic statistical databases. Proc. of the IEEE COMPSAC (1979) 594\u2013601"},{"issue":"1","key":"10_CR3","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1145\/319540.319558","volume":"6","author":"F.Y. Chin","year":"1981","unstructured":"Chin, F.Y., \u00d6zsoyoglu, G.: Statistical database design. ACM Trans. on Database Systems 6(1) (1981) 113\u2013139","journal-title":"ACM Trans. on Database Systems"},{"key":"10_CR4","unstructured":"Defays, D., Anwar, N.: Micro-aggregation: a generic method. Proc. of the 2nd Int\u2019l Symp. on Statistical Confidentiality (1995) 69\u201378"},{"key":"10_CR5","unstructured":"Defays, D., Nanopoulos, P.: Panels of enterprises and confidentiality: the small aggregates method. Proc. of Symp. on Design and Analysis of Longitudinal Surveys (1993) 195\u2013204"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J. M.: Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans. Knowledge and Data Engineering (to appear)","DOI":"10.1109\/69.979982"},{"key":"10_CR7","unstructured":"Kim, J., Winkler, W.: Masking Microdata Files. American Statistical Association, Proceedings of the Section on Survey Research Methods (1995) 114\u2013119"},{"issue":"3","key":"10_CR8","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1145\/3979.4017","volume":"10","author":"C.K. Liew","year":"1985","unstructured":"Liew, C.K., Choi, U.J., Liew, C.J.: A data distortion by probability distribution. ACM Trans. on Database Systems 10(3) (1985) 395\u2013441","journal-title":"ACM Trans. on Database Systems"},{"key":"10_CR9","unstructured":"Mateo-Sanz, J. M., Domingo-Ferrer, J.: A comparative study of microaggregation methods. Q\u00fcestii\u00f3 22 (1998)"},{"key":"10_CR10","unstructured":"Mateo-Sanz, J. M., Domingo-Ferrer, J.: A method for data-oriented multivariate microaggregation. Proc. of Statistical Data Protection (1998) 89\u201399"},{"key":"10_CR11","unstructured":"Moore Jr., R.A.: Controlled data-swapping techniques for masking public use microdata sets. Research Report, Statistical Research Division, U.S. Bureau of the Census (1996)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Nocedal, J., Wright, S.J.: Numerical Optimization. Springer (1999)","DOI":"10.1007\/b98874"},{"issue":"3","key":"10_CR13","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1093\/comjnl\/26.3.218","volume":"26","author":"J. Schl\u00f6rer","year":"1983","unstructured":"Schl\u00f6rer, J.: Information loss in partitioned statistical databases. Comput. J. 26(3) (1983) 218\u2013223","journal-title":"Comput. J."},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Sheela, B.V., Ramamoorthy, P.: SWIFT-a contrained optimization technique. Computer Methods in Applied Mechanics and Engineering 6 309\u2013318","DOI":"10.1016\/0045-7825(75)90023-7"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"236","DOI":"10.2307\/2282967","volume":"58","author":"J.H. Ward","year":"1963","unstructured":"Ward, J.H.: Hierarchial grouping to optimize an objective function. J. American Stat. Asso. 58 (1963) 236\u2013244","journal-title":"J. American Stat. Asso."},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Willenborg, L., Waal, T. de: Statistical disclosure control in practice. Springer Verlag. (1996)","DOI":"10.1007\/978-1-4612-4028-0"},{"key":"10_CR17","unstructured":"Yu, C.T., Chin, F.Y.: A study on the protection of statistical databases. Proc. of ACM SIGMOD Int\u2019l Conf. on Management of Data (1977) 169\u2013181"}],"container-title":["Lecture Notes in Computer Science","Foundations of Information and Knowledge Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45758-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T20:54:12Z","timestamp":1556916852000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45758-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540432203","9783540457589"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-45758-5_10","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}