{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T22:06:30Z","timestamp":1744149990879,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":90,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387098227"},{"type":"electronic","value":"9780387098234"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-0-387-09823-4_35","type":"book-chapter","created":{"date-parts":[[2010,9,9]],"date-time":"2010-09-09T15:02:00Z","timestamp":1284044520000},"page":"687-716","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Privacy in Data Mining"],"prefix":"10.1007","author":[{"given":"Vicen\u00e7","family":"Torra","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,7,7]]},"reference":[{"key":"35_CR1","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N. R. Adam","year":"1989","unstructured":"Adam, N. R.,Wortmann, J. C. (1989) Security-control for statistical databases: a comparative study, ACM Computing Surveys, Volume: 21, 515-556.","journal-title":"ACM Computing Surveys"},{"key":"35_CR2","unstructured":"Aggarwal, C. (2005) On k-anonymity and the curse of dimensionality, Proceedings of the 31st International Conference on Very Large Databases, pages 901-909."},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Aggarwal, C. C., Yu, P. S. (2008) Privacy-Preserving Data Mining: Models and Algorithms, Springer.","DOI":"10.1007\/978-0-387-70992-5"},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R. (2000) Privacy Preserving Data Mining, Proc. of the ACM SIGMOD Conference on Management of Data, 439-450.","DOI":"10.1145\/335191.335438"},{"key":"35_CR5","unstructured":"Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V. (1999) Disclosure limitation of sensitive rules, Proc. of IEEE Knowledge and Data Engineering Exchange Workshop (KDEX)."},{"key":"35_CR6","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1007\/s00778-006-0034-x","volume":"17","author":"M. Atzori","year":"2008","unstructured":"Atzori, M., Bonchi, F., Giannotti, F., Pedreschi, D. (2008) Anonymity preserving pattern discovery, The VLDB Journal 17 703-727.","journal-title":"The VLDB Journal"},{"issue":"5","key":"35_CR7","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1142\/S0218488502001661","volume":"10","author":"J. Bacher","year":"2002","unstructured":"Bacher, J., Brand, R., Bender, S. (2002) Re-identifying register data by survey data using cluster analysis: an empirical study, Int. J. of Unc., Fuzz. and Knowledge Based Systems 10:5 589-607.","journal-title":"Int. J. of Unc., Fuzz. and Knowledge Based Systems"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Bertino, E., Lin, D., Jiang, W. (2008) A survey of quantification of privacy preserving data mining algorithms, in C. C. Aggarwal, P. S. Yu (eds.) Privacy-Preserving Data Mining: Models and Algorithms, Springer, 183-205.","DOI":"10.1007\/978-0-387-70992-5_8"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Brand, R. (2002) Microdata protection through noise addition, in J. Domingo-Ferrer (ed.) Inference Control in Statistical Databases, Lecture Notes in Computer Science 2316 97- 116.","DOI":"10.1007\/3-540-47804-3_8"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Bunn, P., Ostrovsky, R. (2007) Secure two-party k-means clustering, Proc. of CCS\u201907, ACM Press, 486-497.","DOI":"10.1145\/1315245.1315306"},{"key":"35_CR11","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1023\/A:1025658621216","volume":"13","author":"J. Burridge","year":"2003","unstructured":"Burridge, J. (2003) Information preserving statistical obfuscation, Statistics and Computing, 13:321\u2013327.","journal-title":"Statistics and Computing"},{"issue":"2","key":"35_CR12","first-page":"35","volume":"5","author":"M. Carlson","year":"2002","unstructured":"Carlson, M., Salabasis, M. (2002) A data swapping technique using ranks: a method for disclosure control, Research on Official Statistics 5:2 35-64.","journal-title":"Research on Official Statistics"},{"key":"35_CR13","first-page":"429","volume":"5","author":"T. Dalenius","year":"1977","unstructured":"Dalenius, T. (1977) Towards a methodology for statistical disclosure control, Statistisk Tidskrift 5 429-444.","journal-title":"Statistisk Tidskrift"},{"issue":"3","key":"35_CR14","first-page":"329","volume":"2","author":"T. Dalenius","year":"1986","unstructured":"Dalenius, T. (1986) Finding a needle in a haystack - or identifying anonymous census records, Journal of Official Statistics 2:3 329-336.","journal-title":"Journal of Official Statistics"},{"key":"35_CR15","unstructured":"Defays, D., Nanopoulos, P. (1993) Panels of enterprises and confidentiality: the small aggregates method, Proc. of 92 Symposium on Design and Analysis of Longitudinal Surveys, Statistics Canada, 195-204."},{"key":"35_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","volume":"39","author":"A. P. Dempster","year":"1977","unstructured":"Dempster, A. P., Laird, N. M., Rubin, D. B. (1977) Maximum Likelihood From Incomplete Data Via the EM Algorithm, Journal of the Royal Statistical Society 39 1-38.","journal-title":"Journal of the Royal Statistical Society"},{"issue":"1","key":"35_CR17","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J. Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J. M. (2002) Practical data-oriented microaggregation for statistical disclosure control, IEEE Trans. on Knowledge and Data Engineering 14:1 189-201.","journal-title":"IEEE Trans. on Knowledge and Data Engineering"},{"key":"35_CR18","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J. M., Torra, V. (2001) Comparing SDC methods for microdata on the basis of information loss and disclosure risk, Pre-proceedings of ETKNTTS\u2019 2001, (Eurostat, ISBN 92-894-1176-5), Vol. 2, 807-826, Creta, Greece."},{"key":"35_CR19","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-25955-8_12","volume":"3050","author":"J. Domingo-Ferrer","year":"2004","unstructured":"Domingo-Ferrer, J., Sebe, F., Castella-Roca, J. (2004) On the security of noise addition for privacy in statistical databases, PSD 2004, Lecture Notes in Computer Science 3050 149-161.","journal-title":"PSD 2004, Lecture Notes in Computer Science"},{"key":"35_CR20","unstructured":"Domingo-Ferrer, J., Torra, V. (2001) Disclosure Control Methods and Information Loss for Microdata, in P. Doyle, J. I. Lane, J. J. M. Theeuwes, L. Zayatz (eds.) Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies, Elsevier Science, 91-110."},{"key":"35_CR21","unstructured":"Domingo-Ferrer, J., Torra, V. (2001) A quantitative comparison of disclosure control methods for microdata, in P. Doyle, J. I. Lane, J. J. M. Theeuwes, L. Zayatz (eds.) Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, North-Holland, 111-134."},{"key":"35_CR22","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1023\/A:1025666923033","volume":"13","author":"J. Domingo-Ferrer","year":"2003","unstructured":"Domingo-Ferrer, J., Torra, V. (2003) Disclosure Risk Assessment in Statistical Microdata Protection via advanced record linkage, Statistics and Computing, 13 343-354.","journal-title":"Statistics and Computing"},{"issue":"2","key":"35_CR23","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s10618-005-0007-5","volume":"11","author":"J. Domingo-Ferrer","year":"2005","unstructured":"Domingo-Ferrer, J., Torra, V. (2005) Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation, Data Mining and Knowledge Discovery 11:2 195-212.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"35_CR24","unstructured":"Duncan, G. T., Keller-McNulty, S. A., Stokes, S. L. (2001) Disclosure risk vs. data utility: The R-U confidentiality map, Technical Report 121, National Institute of Statistical Sciences."},{"key":"35_CR25","unstructured":"Duncan, G. T., Keller-McNulty, S. A., Stokes, S. L. (2001) Database security and confidentiality: examining disclosure risk vs. data utility through the R-U confidentiality map, Technical Report 142, National Institute of Statistical Sciences."},{"key":"35_CR26","doi-asserted-by":"publisher","first-page":"10","DOI":"10.2307\/2287959","volume":"81","author":"G. T. Duncan","year":"1986","unstructured":"Duncan, G. T., Lambert, D. (1986) Disclosure-limited data dissemination, Journal of the American Statistical Association, 81 10-18.","journal-title":"Journal of the American Statistical Association"},{"key":"35_CR27","doi-asserted-by":"publisher","first-page":"207","DOI":"10.2307\/1391438","volume":"7","author":"G. T. Duncan","year":"1989","unstructured":"Duncan, G. T., Lambert, D. (1989) The risk disclosure for microdata, Journal of Business and Economic Statistics 7 207-217.","journal-title":"Journal of Business and Economic Statistics"},{"key":"35_CR28","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-540-25955-8_21","volume":"3050","author":"E. A. H. Elamir","year":"2004","unstructured":"Elamir, E. A. H. (2004) Analysis of re-identification risk based on log-linear models, PSD 2004, Lecture Notes in Computer Science 3050 273-281.","journal-title":"PSD 2004, Lecture Notes in Computer Science"},{"key":"35_CR29","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/3-540-47804-3_10","volume":"2316","author":"M. Elliot","year":"2002","unstructured":"Elliot, M. (2002) Integrating file and record level disclosure risk assessment, in J. Domingo- Ferrer, Inference Control in Statistical Databases, Lecture Notes in Computer Science 2316 126-134.","journal-title":"Lecture Notes in Computer Science"},{"issue":"2","key":"35_CR30","first-page":"53","volume":"1","author":"M. J. Elliot","year":"1998","unstructured":"Elliot, M. J. Skinner, C. J., Dale, A. (1998) Special Uniqueness, Random Uniques and Sticky Populations: Some Counterintuitive Effects of Geographical Detail on Disclosure Risk, Research in Official Statistics 1:2 53-67.","journal-title":"Research in Official Statistics"},{"issue":"328","key":"35_CR31","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.2307\/2286061","volume":"64","author":"I. P. Fellegi","year":"1969","unstructured":"Fellegi, I. P., Sunter, A. B. (1969) A theory for record linkage, Journal of the American Statistical Association 64:328 1183-1210.","journal-title":"Journal of the American Statistical Association"},{"key":"35_CR32","unstructured":"Fels\u00f6, F., Theeuwes, J.,Wagner, G., (2001) Disclosure Limitation in Use: Results of a Survey, in P. Doyle, J. I. Lane, J. J. M. Theeuwes, L. Zayatz (eds.) Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies, Elsevier Science, 17-42."},{"key":"35_CR33","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-540-25955-8_20","volume":"3050","author":"L. Franconi","year":"2004","unstructured":"Franconi, L., Polettini, S. (2004) Individual risk estimation in \u03bc-Argus: a review, PSD 2004, Lecture Notes in Computer Science 3050 262-272.","journal-title":"Lecture Notes in Computer Science"},{"key":"35_CR34","unstructured":"Gouweleeuw, J. M., Kooiman, P., Willenborg, L. C. R. J., De Wolf, P.-P. (1998) Post Randomisation for Statistical Disclosure Control: Theory and Implementation\u2019, Journal of Official Statistics 14:4 463-478. Also as Research Paper No. 9731, Voorburg: Statistics Netherlands (1997)."},{"key":"35_CR35","unstructured":"Gross, B., Guiblin, P., Merrett, K. (2004) Implementing the Post Randomisation method to the individual sample of anonymised records (SAR) from the 2001 Census, paper presented at \u201cThe Samples of Anonymised Records, An Open Meeting on the Samples of Anonymised Records from the 2001 Census\u201d. http:\/\/www.ccsr.ac.uk\/sars\/events\/2004-09-30\/gross.pdf"},{"issue":"4","key":"35_CR36","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.1109\/TKDE.2003.1209020","volume":"15","author":"S. Hansen","year":"2003","unstructured":"Hansen, S., Mukherjee, S. (2003) A Polynomial Algorithm for Optimal Univariate Microaggregation, IEEE Trans. on Knowledge and Data Engineering 15:4 1043-1044.","journal-title":"IEEE Trans. on Knowledge and Data Engineering"},{"key":"35_CR37","doi-asserted-by":"crossref","unstructured":"Haritsa, J. R. (2008) Mining association rules under privacy constraints, in C. C. Aggarwal, P. S. Yu (eds.) Privacy-Preserving Data Mining: Models and Algorithms, Springer, 239- 266.","DOI":"10.1007\/978-0-387-70992-5_10"},{"key":"35_CR38","unstructured":"Hundepool, A., van de Wetering, A., Ramaswamy, R., Franconi, L., Capobianchi, C., de Wolf, P.-P., Domingo-Ferrer, J., Torra, V., Brand, R., Giessing, S. (2003) \u03bc-ARGUS version 3.2 Software and User\u2019s Manual, Voorburg NL,Statistics Netherlands, February, 2003; version 4.0 published on may 2005. http:\/\/neon.vb.cbs.nl\/casc."},{"issue":"406","key":"35_CR39","doi-asserted-by":"publisher","first-page":"414","DOI":"10.2307\/2289924","volume":"84","author":"M. A. Jaro","year":"1989","unstructured":"Jaro, M. A. (1989) Advances in record-linkage methodology as applied to matching the 1985 Census of Tampa, Florida, Journal of the American Statistical Association 84:406 414- 420.","journal-title":"Journal of the American Statistical Association"},{"key":"35_CR40","doi-asserted-by":"crossref","unstructured":"Jim\u00b4enez, J., Torra, V. (2009) Utility and risk of JPEG-based continuous microdata protection methods, Proc. Int. Conf. on Availability, Reliability and Security (ARES 2009), 929- 934.","DOI":"10.1109\/ARES.2009.60"},{"key":"35_CR41","doi-asserted-by":"crossref","unstructured":"Kantarcioglu, M. (2008) A survey of privacy-preserving methods across horizontally partitioned data, in C. C. Aggarwal, P. S. Yu (eds.) Privacy-Preserving Data Mining: Models and Algorithms, Springer, 313-335.","DOI":"10.1007\/978-0-387-70992-5_13"},{"key":"35_CR42","unstructured":"Kim, J., Winkler, W. (2003) Multiplicative noise for masking continuous data, Research Report Series (Statistics 2003-01), U. S. Bureau of the Census."},{"issue":"3","key":"35_CR43","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TKDE.2009.91","volume":"22","author":"S. Kisilevich","year":"2010","unstructured":"Kisilevich S., Rokach L., Elovici Y., Shapira B., Efficient Multidimensional Suppression for K-Anonymity, IEEE Transactions on Knowledge and Data Engineering, vol. 22, no. 3, pp. 334-347, Mar. 2010","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"1","key":"35_CR44","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1142\/S0218488508005273","volume":"16","author":"S. Ladra","year":"2008","unstructured":"Ladra, S., Torra, V. (2008) On the comparison of generic information loss measures and cluster-specific ones, Intl. J. of Unc., Fuzz. and Knowledge-Based Systems, 16:1 107- 120.","journal-title":"Intl. J. of Unc., Fuzz. and Knowledge-Based Systems"},{"key":"35_CR45","first-page":"313","volume":"9","author":"D. Lambert","year":"1993","unstructured":"Lambert, D. (1993) Measures of Disclosure Risk and Harm, Journal of Official Statistics 9 313-331.","journal-title":"Journal of Official Statistics"},{"key":"35_CR46","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D. J., Ramakrishnan, R. (2005) Multidimensional k-anonymity, Technical Report 1521, University of Wisconsin.","DOI":"10.1109\/ICDE.2006.101"},{"key":"35_CR47","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D. J., Ramakrishnan, R. (2005) Incognito: Efficient Full-Domain KAnonymity, SIGMOD 2005.","DOI":"10.1145\/1066157.1066164"},{"key":"35_CR48","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S. (2007) T-closeness: privacy beyond k-anonymity and l-diversity, Proc. of the IEEE ICDE 2007.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"35_CR49","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1145\/3979.4017","volume":"10","author":"C. K. Liew","year":"1985","unstructured":"Liew, C. K., Choi, U. J., Liew, C. J. (1985) A data distortion by probability distribution, ACM Transactions on Database Systems 10 395-411.","journal-title":"ACM Transactions on Database Systems"},{"key":"35_CR50","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s00145-001-0019-2","volume":"15","author":"Y. Lindell","year":"2002","unstructured":"Lindell, Y., Pinkas, B. (2002) Privacy Preserving Data Mining, Journal of Cryptology, 15:3.","journal-title":"Journal of Cryptology"},{"key":"35_CR51","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/3-540-44598-6_2","volume":"1880","author":"Y. Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B. (2000) Privacy Preserving Data Mining, Crypto\u201900, Lecture Notes in Computer Science 1880 20-24.","journal-title":"Lecture Notes in Computer Science"},{"issue":"1","key":"35_CR52","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TKDE.2006.14","volume":"18","author":"K. Liu","year":"2006","unstructured":"Liu, K., Kargupta, H., Ryan, J. (2006) Random projection based multiplicative data perturbation for privacy preserving data mining, IEEE Trans. on Knowledge and Data Engineering 18:1 92-106.","journal-title":"IEEE Trans. on Knowledge and Data Engineering"},{"key":"35_CR53","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kiefer, D., Venkitasubramanian, M. (2006) L-diversity: privacy beyond k-anonymity, Proc. of the IEEE ICDE.","DOI":"10.1109\/ICDE.2006.1"},{"issue":"2","key":"35_CR54","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10618-005-0011-9","volume":"11","author":"J. M. Mateo-Sanz","year":"2005","unstructured":"Mateo-Sanz, J. M., Domingo-Ferrer, J. Seb\u00b4e, F. (2005) Probabilistic information loss measures in confidentiality protection of continuous microdata, Data Mining and Knowledge Discovery, 11:2 181-193.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"35_CR55","unstructured":"Moore, R. (1996) Controlled data swapping techniques for masking public use microdata sets, U. S. Bureau of the Census (unpublished manuscript)."},{"issue":"1","key":"35_CR56","first-page":"17","volume":"1","author":"K. Muralidhar","year":"2008","unstructured":"Muralidhar, K., Sarathy, R. (2008) Generating Sufficiency-based Non-Synthetic Perturbed Data, Transactions on Data Privacy 1:1 17 - 33","journal-title":"Transactions on Data Privacy"},{"issue":"1","key":"35_CR57","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.datak.2007.07.006","volume":"64","author":"J. Nin","year":"2007","unstructured":"Nin, J., Herranz, J., Torra, V. (2007) Rethinking Rank Swapping to Decrease Disclosure Risk, Data and Knowledge Engineering, 64:1 346-364.","journal-title":"Data and Knowledge Engineering"},{"issue":"1","key":"35_CR58","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1142\/S0218488508005285","volume":"16","author":"J. Nin","year":"2008","unstructured":"Nin, J., Herranz, J., Torra, V. (2008) How to Group Attributes in Multivariate Microaggregation, Intl. J. of Unc., Fuzz. and Knowledge-Based Systems, 16:1 121-138.","journal-title":"Intl. J. of Unc., Fuzz. and Knowledge-Based Systems"},{"issue":"3","key":"35_CR59","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.datak.2008.06.014","volume":"67","author":"J. Nin","year":"2008","unstructured":"Nin, J., Herranz, J., Torra, V. (2008) On the Disclosure Risk of Multivariate Microaggregation, Data and Knowledge Engineering, 67:3 399-412.","journal-title":"Data and Knowledge Engineering"},{"key":"35_CR60","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-540-87471-3_13","volume":"5262","author":"J. Nin","year":"2008","unstructured":"Nin, J., Herranz, J., Torra, V. (2008) Towards a More Realistic Disclosure Risk Assessment, Lecture Notes in Computer Science, 5262 152-165.","journal-title":"Lecture Notes in Computer Science"},{"key":"35_CR61","first-page":"899","volume":"4259","author":"J. Nin","year":"2006","unstructured":"Nin, J. Torra, V. (2006) Extending microaggregation procedures for time series protection, Lecture Notes in Artificial Intelligence, 4259 899-908.","journal-title":"Lecture Notes in Artificial Intelligence"},{"key":"35_CR62","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s00354-007-0061-1","volume":"27","author":"J. Nin","year":"2009","unstructured":"Nin, J., Torra, V. (2009) Analysis of the Univariate Microaggregation Disclosure Risk, New Generation Computing, 27 177-194.","journal-title":"New Generation Computing"},{"issue":"4","key":"35_CR63","doi-asserted-by":"crossref","first-page":"345","DOI":"10.3233\/SJU-2001-18409","volume":"18","author":"A. Oganian","year":"2000","unstructured":"Oganian, A., Domingo-Ferrer, J. (2000) On the Complexity of Optimal Microaggregation for Statistical Disclosure Control, Statistical J. United Nations Economic Commission for Europe, 18, 4, 345-354.","journal-title":"Statistical J. United Nations Economic Commission for Europe"},{"key":"35_CR64","doi-asserted-by":"publisher","first-page":"487","DOI":"10.2307\/1391468","volume":"6","author":"G. Paass","year":"1985","unstructured":"Paass, G. (1985) Disclosure risk and disclosure avoidance for microdata, Journal of Business and Economic Statistics 6 487-500.","journal-title":"Journal of Business and Economic Statistics"},{"key":"35_CR65","unstructured":"Paass, G., Wauschkuhn, U. (1985) Datenzugang, Datenschutz und Anonymisierung - Analysepotential und Identifizierbarkeit von Anonymisierten Individualdaten, Oldenbourg Verlag."},{"key":"35_CR66","unstructured":"Pagliuca, D., Seri, G. (1999) Some results of individual ranking method on the system of enterprise accounts annual survey, Esprit SDC Project, Deliverable MI-3\/D2."},{"key":"35_CR67","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/772862.772865","volume":"4","author":"B. Pinkas","year":"2002","unstructured":"Pinkas, B. (2002) Cryptographic techniques for privacy-preserving data mining, ACM SIGKDD Explorations 4:2.","journal-title":"ACM SIGKDD Explorations"},{"key":"35_CR68","unstructured":"Ravikumar, P., Cohen,W.W. (2004) A hierarchical graphical model for record linkage, Proc. of UAI 2004."},{"issue":"5","key":"35_CR69","doi-asserted-by":"publisher","first-page":"1676","DOI":"10.1016\/j.patcog.2007.10.013","volume":"41","author":"L. Rokach","year":"2008","unstructured":"Rokach L., Genetic algorithm-based feature set partitioning for classification problems, Pattern Recognition, 41(5):1676\u20131700, 2008.","journal-title":"Pattern Recognition"},{"key":"35_CR70","doi-asserted-by":"crossref","unstructured":"Rokach L., Maimon O. and Lavi I., Space Decomposition In Data Mining: A Clustering Approach, Proceedings of the 14th International Symposium On Methodologies For Intelligent Systems, Maebashi, Japan, Lecture Notes in Computer Science, Springer-Verlag, 2003, pp. 24\u201331.","DOI":"10.1007\/978-3-540-39592-8_5"},{"issue":"6","key":"35_CR71","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P. (2001) Protecting Respondents\u2019 Identities in Microdata Release, IEEE Trans. on Knowledge and Data Engineering, 13:6 1010-1027.","journal-title":"IEEE Trans. on Knowledge and Data Engineering"},{"key":"35_CR72","unstructured":"Samarati, P., Sweeney, L. (1998) Protecting privacy when disclosing information: kanonymity and its enforcement through generalization and suppression, SRI Intl. Tech. Rep."},{"key":"35_CR73","unstructured":"Spruill, N. L. (1983) The confidentiality and analytic usefulness of masked business microdata, Proc. of the Section on Survery Research Methods 1983, American Statistical Association, 602-610."},{"issue":"5","key":"35_CR74","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L. (2002) Achieving k-anonymity privacy protection using generalization and suppression, Int. J. of Unc., Fuzz. and Knowledge Based Systems 10:5 571-588.","journal-title":"Int. J. of Unc., Fuzz. and Knowledge Based Systems"},{"issue":"5","key":"35_CR75","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L. (2002) k-anonymity: a model for protecting privacy, Int. J. of Unc., Fuzz. and Knowledge Based Systems 10:5 557-570.","journal-title":"Int. J. of Unc., Fuzz. and Knowledge Based Systems"},{"key":"35_CR76","unstructured":"Takemura, A. (2002) Local recoding and record swapping by maximum weight matching for disclosure control of microdata sets, Journal of Official Statistics 18 275-289. Preprint (1999) Local recoding by maximum weight matching for disclosure control of microdata sets."},{"key":"35_CR77","first-page":"67","volume":"1","author":"M. Templ","year":"2008","unstructured":"Templ, M. (2008) Statistical Disclosure Control for Microdata Using the R-Package sdcMicro, Transactions on Data Privacy 1 67-85.","journal-title":"Transactions on Data Privacy"},{"key":"35_CR78","first-page":"162","volume":"3050","author":"V. Torra","year":"2004","unstructured":"Torra, V. (2004) Microaggregation for categorical variables: a median based approach, Proc. Privacy in Statistical Databases (PSD 2004), Lecture Notes in Computer Science 3050 162-174.","journal-title":"Proc. Privacy in Statistical Databases (PSD 2004), Lecture Notes in Computer Science"},{"issue":"5","key":"35_CR79","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1109\/TFUZZ.2004.834814","volume":"12","author":"V. Torra","year":"2004","unstructured":"Torra, V. (2004) OWA operators in data modeling and reidentification, IEEE Trans. on Fuzzy Systems 12:5 652-660.","journal-title":"IEEE Trans. on Fuzzy Systems"},{"issue":"2","key":"35_CR80","first-page":"86","volume":"1","author":"V. Torra","year":"2008","unstructured":"Torra, V. (2008) Constrained Microaggregation: Adding Constraints for Data Editing, Transactions on Data Privacy 1:2 86-104.","journal-title":"Transactions on Data Privacy"},{"key":"35_CR81","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/11930242_20","volume":"4302","author":"V. Torra","year":"2006","unstructured":"Torra, V., Abowd, J. M., Domingo-Ferrer, J. (2006) Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk Assessment, Lecture Notes in Computer Science 4302 233-242.","journal-title":"Lecture Notes in Computer Science"},{"key":"35_CR82","doi-asserted-by":"crossref","unstructured":"Torra, V., Domingo-Ferrer, J. (2003) Record linkage methods for multidatabase data mining, in V. Torra (ed.) Information Fusion in Data Mining, Springer, 101-132.","DOI":"10.1007\/978-3-540-36519-8_7"},{"key":"35_CR83","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-540-25955-8_14","volume":"3050","author":"V. Torra","year":"2004","unstructured":"Torra, V., Miyamoto, S. (2004) Evaluating fuzzy clustering algorithms for microdata protection, PSD 2004, Lecture Notes in Computer Science 3050 175-186.","journal-title":"Lecture Notes in Computer Science"},{"key":"35_CR84","unstructured":"Trottini, M. (2003) Decision models for data disclosure limitation, PhD Dissertation, Carnegie Mellon University. http:\/\/www.niss.org\/dgii\/TR\/Thesis-Trottini-final.pdf"},{"key":"35_CR85","doi-asserted-by":"crossref","unstructured":"Truta, T. M., Vinay, B. (2006) Privacy protection: p-sensitive k-anonymity property. Proc. 2nd Int. Workshop on Privacy Data management (PDM 2006) p. 94.","DOI":"10.1109\/ICDEW.2006.116"},{"key":"35_CR86","doi-asserted-by":"crossref","unstructured":"Willenborg, L., deWaal, T. (2001) Elements of Statistical Disclosure Control, Lecture Notes in Statistics, Springer-Verlag.","DOI":"10.1007\/978-1-4613-0121-9"},{"key":"35_CR87","unstructured":"Winkler, W. E. (1993) Matching and record linkage, Statistical Research Division, U. S. Bureau of the Census (USA), RR93\/08."},{"key":"35_CR88","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-540-25955-8_17","volume":"3050","author":"W. E. Winkler","year":"2004","unstructured":"Winkler, W. E. (2004) Re-identification methods for masked microdata, PSD 2004, Lecture Notes in Computer Science 3050 216-230.","journal-title":"Lecture Notes in Computer Science"},{"key":"35_CR89","doi-asserted-by":"crossref","unstructured":"Yancey, W. E., Winkler, W. E., Creecy, R. H. (2002) Disclosure risk assessment in perturbative microdata protection, in J. Domingo-Ferrer (ed.) Inference Control in Statistical Databases, Lecture Notes in Computer Science 2316 135-152.","DOI":"10.1007\/3-540-47804-3_11"},{"key":"35_CR90","doi-asserted-by":"crossref","unstructured":"Yao, A. C. (1982) Protocols for Secure Computations, Proc. of 23rd IEEE Symposium on Foundations of Computer Science, Chicago, Illinois, 160-164. http:\/\/www.census.gov","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["Data Mining and Knowledge Discovery Handbook"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09823-4_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T17:33:46Z","timestamp":1740504826000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-0-387-09823-4_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9780387098227","9780387098234"],"references-count":90,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09823-4_35","relation":{},"subject":[],"published":{"date-parts":[[2009]]},"assertion":[{"value":"7 July 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}