{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:45:05Z","timestamp":1742913905685,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":27,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441912794"},{"type":"electronic","value":"9781441912800"}],"license":[{"start":{"date-parts":[[2009,10,15]],"date-time":"2009-10-15T00:00:00Z","timestamp":1255564800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,10,15]],"date-time":"2009-10-15T00:00:00Z","timestamp":1255564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-1-4419-1280-0_16","type":"book-chapter","created":{"date-parts":[[2009,11,9]],"date-time":"2009-11-09T17:43:55Z","timestamp":1257788635000},"page":"353-373","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Avoiding Attribute Disclosure with the (Extended) p-Sensitive k-Anonymity Model"],"prefix":"10.1007","author":[{"given":"Traian Marius","family":"Truta","sequence":"first","affiliation":[]},{"given":"Alina","family":"Campan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,10,15]]},"reference":[{"issue":"4","key":"16_CR1","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N.R. Adam","year":"1989","unstructured":"N.R. Adam and J.C. Wortmann, Security Control Methods for Statistical Databases: A Comparative Study, ACM Computing Surveys 21(4) (1989), pp. 515\u2013556.","journal-title":"ACM Computing Surveys"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu, Anonymizing Tables, in: Proceedings of the International Conference on Database Theory, 2005, pp. 246\u2013258.","DOI":"10.1007\/978-3-540-30570-5_17"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"R. Agrawal, J. Kiernan, R. Srikant, R. and Y. Xu. Hippocratic Databases, in: Proceedings of the Very Large Data Base Conference, 2002, pp. 143\u2013154.","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"R.J. Bayardo and R. Agrawal, Data Privacy through Optimal k-Anonymization, in: Proceedings of the IEEE International Conference on Data Engineering, 2005, pp. 217\u2013228.","DOI":"10.1109\/ICDE.2005.42"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"J.W. Byun, A. Kamra, E. Bertino and N. Li, Efficient k-Anonymity using Clustering Techniques, in: Proceedings of Database Systems for Advanced Applications, 2006, pp. 188\u2013200.","DOI":"10.1007\/978-3-540-71703-4_18"},{"issue":"2","key":"16_CR6","first-page":"19","volume":"51","author":"A. Campan","year":"2006","unstructured":"A. Campan and T.M. Truta, Extended P-Sensitive K-Anonymity, Studia Universitatis Babes-Bolyai Informatica 51(2) (2006), pp. 19\u201330.","journal-title":"Studia Universitatis Babes-Bolyai Informatica"},{"key":"16_CR7","unstructured":"A. Campan, T.M. Truta, J. Miller and R.A. Sinca, Clustering Approach for Achieving Data Privacy, in: Proceedings of the International Data Mining Conference, 2007, pp. 321\u2013327."},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"A. Campan and T.M. Truta, A Clustering Approach for Data and Structural Anonymity in Social Networks, in: Proceedings of the Privacy, Security, and Trust in KDD Workshop, 2008.","DOI":"10.1007\/978-3-642-01718-6_4"},{"key":"16_CR9","first-page":"313","volume":"9","author":"D. Lambert","year":"1993","unstructured":"D. Lambert, Measures of Disclosure Risk and Harm, Journal of Official Statistics 9 (1993), pp. 313\u2013331.","journal-title":"Journal of Official Statistics"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"K. LeFevre, D. DeWitt and R. Ramakrishnan, Incognito: Efficient Full-Domain K-Anonymity, in: Proceedings of the ACM SIGMOD, 2005, pp. 49\u201360.","DOI":"10.1145\/1066157.1066164"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"K. LeFevre, D. DeWitt and R. Ramakrishnan, Mondrian Multidimensional K-Anonymity, in: Proceedings of the IEEE International Conference on Data Engineering, 2006, 25.","DOI":"10.1109\/ICDE.2006.101"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"N. Li, T. Li and S. Venkatasubramanian, T-Closeness: Privacy Beyond k-Anonymity and l-Diversity, in: Proceedings of the IEEE International Conference on Data Engineering, 2007, pp. 106\u2013115.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"A. Machanavajjhala, J. Gehrke and D. Kifer, L-Diversity: Privacy beyond K-Anonymity, in: Proceedings of the IEEE International Conference on Data Engineering, 2006, 24.","DOI":"10.1109\/ICDE.2006.1"},{"key":"16_CR14","unstructured":"J. Miller, A. Campan and T.M. Truta, Constrained K-Anonymity: Privacy with Generalization Boundaries, in: Proceedings of the Practical Preserving Data Mining Workshop, 2008."},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"M.C. Mont, S. Pearson and R. Thyne, A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises, in: Proceedings of the Trust and Privacy in Digital Business Conference, 2006, pp. 91\u2013102.","DOI":"10.1007\/11824633_10"},{"key":"16_CR16","unstructured":"MSNBC, Privacy Lost, 2006, Available online at http:\/\/www.msnbc.msn.com\/id\/15157222."},{"key":"16_CR17","unstructured":"D.J. Newman, S. Hettich, C.L. Blake and C.J. Merz, UCI Repository of Machine Learning Databases, UC Irvine, 1998, Available online at www.ics.uci.edu\/mlearn\/MLRepository.html."},{"issue":"6","key":"16_CR18","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"P. Samarati, Protecting Respondents Identities in Microdata Release, IEEE Transactions on Knowledge and Data Engineering 13(6) (2001), pp. 1010\u20131027.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"5","key":"16_CR19","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"L. Sweeney, k-Anonymity: A Model for Protecting Privacy, International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems 10(5) (2002), pp. 557\u2013570.","journal-title":"International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems"},{"issue":"5","key":"16_CR20","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"L. Sweeney, Achieving k-Anonymity Privacy Protection Using Generalization and Suppression, International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems 10(5) (2002), pp. 571\u2013588.","journal-title":"International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"T.M. Truta and V. Bindu, Privacy Protection: P-Sensitive K-Anonymity Property, in: Proceedings of the ICDE Workshop on Privacy Data Management, 2006, 94.","DOI":"10.1109\/ICDEW.2006.116"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"T.M. Truta, A. Campan and P. Meyer, Generating Microdata with P-Sensitive K-Anonymity Property, in: Proceedings of the VLDB Workshop on Secure data Management, 2007, pp. 124\u2013141.","DOI":"10.1007\/978-3-540-75248-6_9"},{"volume-title":"Elements of Statistical Disclosure Control","year":"2001","key":"16_CR23","unstructured":"L. Willemborg and T. Waal (ed), Elements of Statistical Disclosure Control, Springer Verlag, New York, 2001."},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"R.C.W. Wong, J. Li, A.W.C. Fu and K. Wang, (\u03b1, k)-Anonymity: An Enhanced k-Anonymity Model for Privacy-Preserving Data Publishing, in: Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining, 2006, pp. 754\u2013759.","DOI":"10.1145\/1150402.1150499"},{"key":"16_CR25","unstructured":"R.C.W. Wong, J. Li, A.W.C. Fu and J. Pei, Minimality Attack in Privacy-Preserving Data Publishing, in: Proceedings of the Very Large Data Base Conference, 2007, pp. 543\u2013554."},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"X. Xiao and Y. Tao, Personalized Privacy Preservation, in: Proceedings of the ACM SIGMOD, 2006, pp. 229\u2013240.","DOI":"10.1145\/1142473.1142500"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"B. Zhou and J. Pei, Preserving Privacy in Social Networks against Neighborhood Attacks, in: Proceedings of the IEEE International Conference on Data Engineering, 2008, pp. 506\u2013515.","DOI":"10.1109\/ICDE.2008.4497459"}],"container-title":["Annals of Information Systems","Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-1280-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T04:20:57Z","timestamp":1739420457000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4419-1280-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,15]]},"ISBN":["9781441912794","9781441912800"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-1280-0_16","relation":{},"ISSN":["1934-3221","1934-3213"],"issn-type":[{"type":"print","value":"1934-3221"},{"type":"electronic","value":"1934-3213"}],"subject":[],"published":{"date-parts":[[2009,10,15]]},"assertion":[{"value":"15 October 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}