{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:54:08Z","timestamp":1764996848592,"version":"3.35.0"},"publisher-location":"Boston, MA","reference-count":50,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387709918"},{"type":"electronic","value":"9780387709925"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-0-387-70992-5_4","type":"book-chapter","created":{"date-parts":[[2008,6,9]],"date-time":"2008-06-09T04:04:54Z","timestamp":1212984294000},"page":"81-103","source":"Crossref","is-referenced-by-count":10,"title":["Measures of Anonymity"],"prefix":"10.1007","author":[{"given":"Suresh","family":"Venkatasubramanian","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1_1","unstructured":"Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, April 15-20, 2007, The Marmara Hotel, Istanbul, Turkey (2007), IEEE."},{"key":"4_CR2_1","doi-asserted-by":"crossref","unstructured":"Agrawal, D., and Aggarwal, C. C. On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of Database Systems (Santa Barbara, CA, 2001), pp. 247\u2013255.","DOI":"10.1145\/375551.375602"},{"key":"4_CR3_1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., and Srikant, R. Privacy preserving data mining. In Proceedings of the ACM SIGMOD Conference on Management of Data (Dallas, TX, May 2000), pp. 439\u2013450.","DOI":"10.1145\/335191.335438"},{"key":"4_CR4_1","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/ICDE.2005.8","volume-title":"ICDE \u201905: Proceedings of the 21st International Conference on Data Engineering (ICDE\u201905)","author":"S Agrawal","year":"2005","unstructured":"Agrawal, S., and Haritsa, J. R. FRAPP: A framework for high-accuracy privacy-preserving mining. In ICDE \u201905: Proceedings of the 21st International Conference on Data Engineering (ICDE\u201905) (Washington, DC, USA, 2005), IEEE Computer Society, pp. 193\u2013204."},{"key":"4_CR5_1","unstructured":"Bayardo, Jr., R. J., and Agrawal, R. Data privacy through optimal k-anonymization. In ICDE (2005), IEEE Computer Society, pp. 217\u2013228."},{"key":"4_CR6_1","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/1065167.1065184","volume-title":"PODS \u201905: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems","author":"A Blum","year":"2005","unstructured":"Blum, A., Dwork, C., McSherry, F., and Nissim, K. Practical privacy: the sulq framework. In PODS \u201905: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (New York, NY, USA, 2005), ACM Press, pp. 128\u2013138."},{"key":"4_CR7_1","unstructured":"Byun, J.-W., Kamra, A., Bertino, E., and Li, N. Efficient -anonymization using clustering techniques. In DASFAA (2007), K. Ramamohanarao, P. R. Krishna, M. K. Mohania, and E. Nantajeewarawat, Eds., vol. 4443 of Lecture Notes in Computer Science, Springer, pp. 188\u2013200."},{"key":"4_CR8_1","unstructured":"Chawla, S., Dwork, C., McSherry, F., Smith, A., and Wee, H. Toward privacy in public databases. In TCC (2005), J. Kilian, Ed., vol. 3378 of Lecture Notes in Computer Science, Springer, pp. 363\u2013385."},{"key":"4_CR9_1","unstructured":"Chawla, S., Dwork, C., McSherry, F., and Talwar, K. On privacy-preserving histograms. In UAI (2005), AUAI Press."},{"issue":"1","key":"4_CR10_1","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/319830.319834","volume":"8","author":"W de Jonge","year":"1983","unstructured":"de Jonge, W. Compromising statistical databases responding to queries about means. ACM Trans. Database Syst. 8, 1 (1983), 60\u201380.","journal-title":"ACM Trans. Database Syst."},{"key":"4_CR11_1","unstructured":"DeCew, J. Privacy. In The Stanford Encyclopedia of Philosophy, E. N. Zalta, Ed. Fall 2006."},{"issue":"1","key":"4_CR12_1","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/320064.320069","volume":"4","author":"DE Denning","year":"1979","unstructured":"Denning, D. E., Denning, P. J., and Schwartz, M. D. The tracker: A threat to statistical database security. ACM Trans. Database Syst. 4, 1 (1979), 76\u201396.","journal-title":"ACM Trans. Database Syst."},{"issue":"1","key":"4_CR13_1","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/320128.320138","volume":"5","author":"DE Denning","year":"1980","unstructured":"Denning, D. E., and Schl\u00f6rer, J. A fast procedure for finding a tracker in a statistical database. ACM Trans. Database Syst. 5, 1 (1980), 88\u2013102.","journal-title":"ACM Trans. Database Syst"},{"key":"4_CR14_1","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1145\/773153.773173","volume-title":"PODS \u201903: Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems","author":"I Dinur","year":"2003","unstructured":"Dinur, I., and Nissim, K. Revealing information while preserving privacy. In PODS \u201903: Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (New York, NY, USA, 2003), ACM Press, pp. 202\u2013210."},{"key":"4_CR15_1","doi-asserted-by":"publisher","first-page":"451","DOI":"10.2307\/2669452","volume":"95","author":"GT Duncan","year":"2000","unstructured":"Duncan, G. T., and Mukherjee, S. Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise. Journal of the American Statistical Association 95, 451 (2000), 720.","journal-title":"Journal of the American Statistical Association"},{"key":"4_CR16_1","doi-asserted-by":"crossref","unstructured":"Dwork, C. Differential privacy. In Proc. 33rd Intnl. Conf. Automata, Languages and Programming (ICALP) (2006), pp. 1\u201312. Invited paper.","DOI":"10.1007\/11787006_1"},{"key":"4_CR17_1","unstructured":"Dwork, C., McSherry, F., Nissim, K., and Smith, A. Calibrating noise to sensitivity in private data analysis. In TCC (2006), S. Halevi and T. Rabin, Eds., vol. 3876 of Lecture Notes in Computer Science, Springer, pp. 265\u2013284."},{"key":"4_CR18_1","unstructured":"Dwork, C., and Nissim, K. Privacy-preserving datamining on vertically partitioned databases. In CRYPTO (2004), M. K. Franklin, Ed., vol. 3152 of Lecture Notes in Computer Science, Springer, pp. 528\u2013544."},{"key":"4_CR19_1","doi-asserted-by":"crossref","unstructured":"Evfimevski, A., Gehrke, J., and Srikant, R. Limiting privacy breaches in privacy preserving data mining. In Proceedings of the ACM SIGMOD\/PODS Conference (San Diego, CA, June 2003), pp. 211\u2013222.","DOI":"10.1145\/773153.773174"},{"key":"4_CR20_1","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1145\/775047.775080","volume-title":"KDD \u201902: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining","author":"A Evfimievski","year":"2002","unstructured":"Evfimievski, A., Srikant, R., Agrawal, R., and Gehrke, J. Privacy preserving mining of association rules. In KDD \u201902: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining (New York, NY, USA, 2002), ACM Press, pp. 217\u2013228."},{"issue":"337","key":"4_CR21_1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.2307\/2284695","volume":"67","author":"IP Fellegi","year":"1972","unstructured":"Fellegi, I. P. On the question of statistical confidentiality. J. Am. Stat. Assoc 67, 337 (1972), 7\u201318.","journal-title":"J. Am. Stat. Assoc"},{"key":"4_CR22_1","doi-asserted-by":"crossref","unstructured":"Friedman, A. D., and Hoffman, L. J. Towards a fail-safe approach to secure databases. In Proc. IEEE Symp. Security and Privacy (1980).","DOI":"10.1109\/SP.1980.10018"},{"issue":"3","key":"4_CR23_1","doi-asserted-by":"publisher","first-page":"421","DOI":"10.2307\/795891","volume":"89","author":"R Gavison","year":"1980","unstructured":"Gavison, R. Privacy and the limits of the law. The Yale Law Journal 89, 3 (January 1980), 421\u2013471.","journal-title":"The Yale Law Journal"},{"key":"4_CR24_1","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1307\/mmj\/1029003026","volume":"31","author":"CR Givens","year":"1984","unstructured":"Givens, C. R., and Shortt, R. M. A class of Wasserstein metrics for probability distributions. Michigan Math J. 31 (1984), 231\u2013240.","journal-title":"Michigan Math J."},{"issue":"5","key":"4_CR25_1","first-page":"74","volume":"16","author":"LJ Hoffman","year":"1970","unstructured":"Hoffman, L. J., and Miller, W. F. Getting a personal dossier from a statistical data bank. Datamation 16, 5 (1970), 74\u201375.","journal-title":"Datamation"},{"key":"4_CR26_1","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1145\/775047.775089","volume-title":"KDD \u201902: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining","author":"VS Iyengar","year":"2002","unstructured":"Iyengar, V. S. Transforming data to satisfy privacy constraints. In KDD \u201902: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining (New York, NY, USA, 2002), ACM Press, pp. 279\u2013288."},{"key":"4_CR27_1","unstructured":"Kargupta, H., Datta, S., Wang, Q., and Sivakumar, K. On the privacy preserving properties of random data perturbation techniques. In Proceedings of the IEEE International Conference on Data Mining (Melbourne, FL, November 2003), p. 99."},{"key":"4_CR28_1","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1145\/1142473.1142499","volume-title":"SIGMOD \u201906: Proceedings of the 2006 ACM SIGMOD international conference on Management of data","author":"D Kifer","year":"2006","unstructured":"Kifer, D., and Gehrke, J. Injecting utility into anonymized datasets. In SIGMOD \u201906: Proceedings of the 2006 ACM SIGMOD international conference on Management of data (New York, NY, USA, 2006), ACM Press, pp. 217\u2013228."},{"key":"4_CR29_1","unstructured":"Koch, C., Gehrke, J., Garofalakis, M. N., Srivastava, D., Aberer, K., Deshpande, A., Florescu, D., Chan, C. Y., Ganti, V., Kanne, C.-C., Klas, W., and Neuhold, E. J., Eds. Proceedings of the 33rd International Conference on Very Large Data Bases, University of Vienna, Austria, September 23-27, 2007 (2007), ACM."},{"key":"4_CR30_1","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/ICDE.2006.101","volume-title":"ICDE \u201906: Proceedings of the 22nd International Conference on Data Engineering (ICDE\u201906)","author":"K LeFevre","year":"2006","unstructured":"LeFevre, K., DeWitt, D. J., and Ramakrishnan, R. Mondrian multidimensional k-anonymity. In ICDE \u201906: Proceedings of the 22nd International Conference on Data Engineering (ICDE\u201906) (Washington, DC, USA, 2006), IEEE Computer Society, p. 25."},{"key":"4_CR31_1","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., and Venkatasubramanian, S. t-closeness: Privacy beyond k-anonymity and \u2113-diversity. In IEEE International Conference on Data Engineering (this proceedings) (2007).","DOI":"10.1109\/ICDE.2007.367856"},{"key":"4_CR32_1","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., and Venkitasubramaniam, M. l-diversity: Privacy beyond k-anonymity. In Proceedings of the 22nd International Conference on Data Engineering (ICDE\u201906) (2006), p. 24."},{"key":"4_CR33_1","doi-asserted-by":"crossref","unstructured":"Martin, D. J., Kifer, D., Machanavajjhala, A., Gehrke, J., and Halpern, J. Y. Worst-case background knowledge for privacy-preserving data publishing. In ICDE [1], pp. 126\u2013135.","DOI":"10.1109\/ICDE.2007.367858"},{"key":"4_CR34_1","unstructured":"Nakashima, E. AOL Search Queries Open Window Onto Users\u2019 Worlds. The Washington Post (August 17 2006)."},{"key":"4_CR35_1","unstructured":"Nergiz, M. E., and Clifton, C. Thoughts on k-anonymization. In ICDE Workshops (2006), R. S. Barga and X. Zhou, Eds., IEEE Computer Society, p. 96."},{"key":"4_CR36_1","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/1250790.1250803","volume-title":"STOC \u201907: Proceedings of the thirty-ninth annual ACM symposium on Theory of computing","author":"K Nissim","year":"2007","unstructured":"Nissim, K., Raskhodnikova, S., and Smith, A. Smooth sensitivity and sampling in private data analysis. In STOC \u201907: Proceedings of the thirty-ninth annual ACM symposium on Theory of computing (New York, NY, USA, 2007), ACM Press, pp. 75\u201384."},{"key":"4_CR37_1","unstructured":"Rastogi, V., Hong, S., and Suciu, D. The boundary between privacy and utility in data publishing. In Koch et al. [29], pp. 531\u2013542."},{"key":"4_CR38_1","unstructured":"Rizvi, S. J., and Haritsa, J. R. Maintaining data privacy in association rule mining. In VLDB \u20192002: Proceedings of the 28th international conference on Very Large Data Bases (2002), VLDB Endowment, pp. 682\u2013693."},{"issue":"2","key":"4_CR39_1","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1023\/A:1026543900054","volume":"40","author":"Y Rubner","year":"2000","unstructured":"Rubner, Y., Tomasi, C., and Guibas, L. J. The earth mover\u2019s distance as a metric for image retrieval. Int. J. Comput. Vision 40, 2 (2000), 99\u2013121.","journal-title":"Int. J. Comput. Vision"},{"issue":"1","key":"4_CR40_1","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1055\/s-0038-1635690","volume":"14","author":"J Schl\u00f6rer","year":"1975","unstructured":"Schl\u00f6rer, J. Identification and retrieval of personal records from a statistical data bank. Methods Info. Med. 14, 1 (1975), 7\u201313.","journal-title":"Methods Info. Med."},{"issue":"2","key":"4_CR41_1","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1145\/320071.320073","volume":"4","author":"MD Schwartz","year":"1979","unstructured":"Schwartz, M. D., Denning, D. E., and Denning, P. J. Linear queries in statistical databases. ACM Trans. Database Syst. 4, 2 (1979), 156\u2013167.","journal-title":"ACM Trans. Database Syst."},{"issue":"5","key":"4_CR42_1","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L. Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10, 5 (2002), 571\u2013588.","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"4_CR43_1","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/ICDEW.2006.116","volume-title":"ICDEW \u201906: Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW\u201906)","author":"TM Truta","year":"2006","unstructured":"Truta, T. M., and Vinay, B. Privacy protection: p-sensitive k-anonymity property. In ICDEW \u201906: Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW\u201906) (Washington, DC, USA, 2006), IEEE Computer Society, p. 94."},{"key":"4_CR44_1","unstructured":"U. S. Department of Health and Human Services. Office for Civil Rights - HIPAA. http:\/\/www.hhs.gov\/ocr\/hipaa \/."},{"issue":"3","key":"4_CR45_1","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s10115-006-0035-5","volume":"11","author":"K Wang","year":"2007","unstructured":"Wang, K., Fung, B. C. M., and Yu, P. S. Handicapping attacker\u2019s confidence: an alternative to k-anonymization. Knowl. Inf. Syst. 11, 3 (2007), 345\u2013368.","journal-title":"Knowl. Inf. Syst."},{"key":"4_CR46_1","unstructured":"Wong, R. C.-W., Fu, A. W.-C., Wang, K., and Pei, J. Minimality attack in privacy preserving data publishing. In Koch et al. [29], pp. 543\u2013554."},{"key":"4_CR47_1","doi-asserted-by":"crossref","first-page":"754","DOI":"10.1145\/1150402.1150499","volume-title":"KDD \u201906: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining","author":"RC-W Wong","year":"2006","unstructured":"Wong, R. C.-W., Li, J., Fu, A. W.-C., and Wang, K. (\u03b1, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In KDD \u201906: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining (New York, NY, USA, 2006), ACM Press, pp. 754\u2013759."},{"key":"4_CR48_1","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1145\/1142473.1142500","volume-title":"SIGMOD \u201906: Proceedings of the 2006 ACM SIGMOD international conference on Management of data","author":"X Xiao","year":"2006","unstructured":"Xiao, X., and Tao, Y. Personalized privacy preservation. In SIGMOD \u201906: Proceedings of the 2006 ACM SIGMOD international conference on Management of data (New York, NY, USA, 2006), ACM Press, pp. 229\u2013240."},{"key":"4_CR49_1","unstructured":"Yao, A. C. Protocols for secure computations. In Proc. IEEE Foundations of Computer Science (1982), pp. 160\u2013164."},{"key":"4_CR50_1","unstructured":"Zhang, Q., Koudas, N., Srivastava, D., and Yu, T. Aggregate query answering on anonymized tables. In ICDE [1], pp. 116\u2013125."}],"container-title":["Advances in Database Systems","Privacy-Preserving Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-70992-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T17:08:50Z","timestamp":1738256930000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-70992-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9780387709918","9780387709925"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-70992-5_4","relation":{},"ISSN":["1386-2944"],"issn-type":[{"type":"print","value":"1386-2944"}],"subject":[],"published":{"date-parts":[[2008]]}}}