{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:00:39Z","timestamp":1743062439140,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":8,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461482666"},{"type":"electronic","value":"9781461482659"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-1-4614-8265-9_272","type":"book-chapter","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T12:14:31Z","timestamp":1544098471000},"page":"2801-2804","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Metrics"],"prefix":"10.1007","author":[{"given":"Chris","family":"Clifton","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"272_CR16416","doi-asserted-by":"crossref","unstructured":"Agrawal D, Aggarwal CC. On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems; 2001. p. 247\u201355.","DOI":"10.1145\/375551.375602"},{"key":"272_CR16417","doi-asserted-by":"crossref","unstructured":"Agrawal R, Srikant R. Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2000. p. 439\u201350.","DOI":"10.1145\/335191.335438"},{"key":"272_CR16418","doi-asserted-by":"crossref","unstructured":"Li N, Li T. T-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd International Conference on Data Engineering; 2007.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"272_CR16419","doi-asserted-by":"crossref","unstructured":"Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M. l-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data. 2007;1(1): No.3.","DOI":"10.1145\/1217299.1217302"},{"key":"272_CR16420","doi-asserted-by":"crossref","unstructured":"Nergiz M, Atzori M, Clifton C. Hiding the presence of individuals from shared databases. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2007. p. 665\u201376.","DOI":"10.1145\/1247480.1247554"},{"issue":"3","key":"272_CR16421","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1016\/j.datak.2007.03.009","volume":"63","author":"ME Nergiz","year":"2007","unstructured":"Nergiz ME, Clifton C. Thoughts on k-anonymization. Data Knowl Eng. 2007;63(3):622\u201345.","journal-title":"Data Knowl Eng"},{"issue":"3","key":"272_CR16422","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/S0933-3657(98)00056-6","volume":"15","author":"A \u00d8hrn","year":"1999","unstructured":"\u00d8hrn A, Ohno-Machado L. Using boolean reasoning to anonymize databases. Artif Intell Med. 1999;15(3):235\u201354.","journal-title":"Artif Intell Med"},{"issue":"5","key":"272_CR16423","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertainty Fuzziness Knowledge Based Syst. 2002;10(5):557\u201370.","journal-title":"Int J Uncertainty Fuzziness Knowledge Based Syst"}],"container-title":["Encyclopedia of Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-8265-9_272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T22:06:23Z","timestamp":1591049183000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-8265-9_272"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9781461482666","9781461482659"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-8265-9_272","relation":{},"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"7 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}