{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:20:30Z","timestamp":1743157230024,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030116798"},{"type":"electronic","value":"9783030116804"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11680-4_25","type":"book-chapter","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T02:05:34Z","timestamp":1549505134000},"page":"257-264","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Thought Off-line Sanitization Methods for Bank Transactions"],"prefix":"10.1007","author":[{"given":"Isaias","family":"Hoyos","sequence":"first","affiliation":[]},{"given":"Miguel","family":"Nunez-del-Prado","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,8]]},"reference":[{"key":"25_CR1","unstructured":"Brand, R.: Tests of the applicability of sullivan algorithm to synthetic data and real business data in official statistics. European Project IST-2000-25069 CASC (2002)"},{"key":"25_CR2","unstructured":"DeWaal, A., Willenborg, L.: Global recodings and local suppressions in microdata sets. In: Proceedings of Statistics Canada Symposium, vol. 95, pp. 121\u2013132 (1995)"},{"issue":"1","key":"25_CR3","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J.M.: Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans. Knowl. Data Eng. 14(1), 189\u2013201 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/S0377-0427(03)00643-5","volume":"164","author":"J Domingo-Ferrer","year":"2004","unstructured":"Domingo-Ferrer, J., Torra, V.: Disclosure risk assessment in statistical data protection. J. Comput. Appl. Math. 164, 285\u2013293 (2004)","journal-title":"J. Comput. Appl. Math."},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-25955-8_12","volume-title":"Privacy in Statistical Databases","author":"J Domingo-Ferrer","year":"2004","unstructured":"Domingo-Ferrer, J., Seb\u00e9, F., Castell\u00e0-Roca, J.: On the security of noise addition for privacy in statistical databases. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 149\u2013161. Springer, Heidelberg (2004). \n                  https:\/\/doi.org\/10.1007\/978-3-540-25955-8_12"},{"issue":"4","key":"25_CR6","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1016\/j.camwa.2007.04.034","volume":"55","author":"J Domingo-Ferrer","year":"2008","unstructured":"Domingo-Ferrer, J., Seb\u00e9, F., Solanas, A.: A polynomial-time approximation to optimal multivariate microaggregation. Comput. Math. Appl. 55(4), 714\u2013732 (2008)","journal-title":"Comput. Math. Appl."},{"key":"25_CR7","unstructured":"Domingo-Ferrer, J., Torra, V.: A quantitative comparison of disclosure control methods for microdata. In: Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, pp. 111\u2013134 (2001)"},{"key":"25_CR8","doi-asserted-by":"publisher","DOI":"10.1002\/9781118348239","volume-title":"Statistical Disclosure Control","author":"A Hundepool","year":"2012","unstructured":"Hundepool, A., et al.: Statistical Disclosure Control. Wiley, Hoboken (2012)"},{"key":"25_CR9","unstructured":"Kim, J.: A method for limiting disclosure in microdata based on random noise and transformation (2002)"},{"issue":"7","key":"25_CR10","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1109\/TKDE.2005.112","volume":"17","author":"M Laszlo","year":"2005","unstructured":"Laszlo, M., Mukherjee, S.: Minimum spanning tree partitioning algorithm for microaggregation. IEEE Trans. Knowl. Data Eng. 17(7), 902\u2013911 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Leo, Y., Karsai, M., Sarraute, C., Fleury, E.: Correlations of consumption patterns in social-economic networks. In: 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 493\u2013500. IEEE (2016)","DOI":"10.1109\/ASONAM.2016.7752280"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Leoni, D.: Non-interactive differential privacy: a survey. In: Proceedings of the First International Workshop on Open Data, WOD 2012. ACM, New York, pp. 40\u201352 (2012)","DOI":"10.1145\/2422604.2422611"},{"key":"25_CR13","first-page":"1","volume":"8","author":"N Li","year":"2016","unstructured":"Li, N., Lyu, M., Su, D., Yang, W.: Differential privacy: from theory to practice. Synth. Lect. Inf. Secur. Priv. Trust. 8, 1\u2013138 (2016)","journal-title":"Synth. Lect. Inf. Secur. Priv. Trust."},{"issue":"5","key":"25_CR14","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1287\/mnsc.1050.0503","volume":"52","author":"K Muralidhar","year":"2006","unstructured":"Muralidhar, K., Sarathy, R.: Data shufflinga new masking approach for numerical data. Manag. Sci. 52(5), 658\u2013670 (2006)","journal-title":"Manag. Sci."},{"issue":"1","key":"25_CR15","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.datak.2007.07.006","volume":"64","author":"J Nin","year":"2008","unstructured":"Nin, J., Herranz, J., Torra, V.: Rethinking rank swapping to decrease disclosure risk. Data Knowl. Eng. 64(1), 346\u2013364 (2008)","journal-title":"Data Knowl. Eng."},{"key":"25_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-642-15838-4_10","volume-title":"Privacy in Statistical Databases","author":"A Oganian","year":"2010","unstructured":"Oganian, A.: Multiplicative noise protocols. In: Domingo-Ferrer, J., Magkos, E. (eds.) PSD 2010. LNCS, vol. 6344, pp. 107\u2013117. Springer, Heidelberg (2010). \n                  https:\/\/doi.org\/10.1007\/978-3-642-15838-4_10"},{"key":"25_CR17","first-page":"99","volume":"35","author":"A Oganian","year":"2011","unstructured":"Oganian, A.: Multiplicative noise for masking numerical microdata with constraints. SORT 35, 99\u2013112 (2011)","journal-title":"SORT"},{"issue":"1","key":"25_CR18","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/348.349","volume":"9","author":"SP Reiss","year":"1984","unstructured":"Reiss, S.P.: Practical data-swapping: the first steps. ACM Trans. Database Syst. (TODS) 9(1), 20\u201337 (1984)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Reiss, S.P., Post, M.J., Dalenius, T.: Non-reversible privacy transformations. In: Proceedings of the 1st ACM SIGACT-SIGMOD Symposium on Principles of Database Systems. ACM, pp. 139\u2013146 (1982)","DOI":"10.1145\/588131.588134"},{"key":"25_CR20","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1016\/j.cose.2017.08.011","volume":"70","author":"DM Rodr\u00edguez","year":"2017","unstructured":"Rodr\u00edguez, D.M., Nin, J., Nu\u00f1ez-del Prado, M.: Towards the adaptation of SDC methods to stream mining. Comput. Secur. 70, 702\u2013722 (2017)","journal-title":"Comput. Secur."},{"key":"25_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/3-540-47804-3_13","volume-title":"Inference Control in Statistical Databases","author":"F Seb\u00e9","year":"2002","unstructured":"Seb\u00e9, F., Domingo-Ferrer, J., Mateo-Sanz, J.M., Torra, V.: Post-Masking optimization of the tradeoff between information loss and disclosure risk in masked microdata sets. In: Domingo-Ferrer, J. (ed.) Inference Control in Statistical Databases. LNCS, vol. 2316, pp. 163\u2013171. Springer, Heidelberg (2002). \n                  https:\/\/doi.org\/10.1007\/3-540-47804-3_13"},{"key":"25_CR22","unstructured":"Sullivan, G.R.: The use of added error to avoid disclosure in microdata releases. Iowa State University, Unpublished Ph.D. dissertation (1989)"},{"key":"25_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50272-4","volume-title":"Statistical Disclosure Control for Microdata: Methods and Applications in R","author":"M Templ","year":"2017","unstructured":"Templ, M.: Statistical Disclosure Control for Microdata: Methods and Applications in R. Springer, Cham (2017). \n                  https:\/\/doi.org\/10.1007\/978-3-319-50272-4"},{"key":"25_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-540-87471-3_15","volume-title":"Privacy in Statistical Databases","author":"M Templ","year":"2008","unstructured":"Templ, M., Meindl, B.: Robust statistics meets SDC: new disclosure risk measures for continuous microdata masking. In: Domingo-Ferrer, J., Sayg\u0131n, Y. (eds.) PSD 2008. LNCS, vol. 5262, pp. 177\u2013189. Springer, Heidelberg (2008). \n                  https:\/\/doi.org\/10.1007\/978-3-540-87471-3_15"},{"key":"25_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4028-0","volume-title":"Statistical Disclosure Control in Practice","author":"L Willenborg","year":"1996","unstructured":"Willenborg, L., De Waal, T.: Statistical Disclosure Control in Practice, vol. 111. Springer, New York (1996). \n                  https:\/\/doi.org\/10.1007\/978-1-4612-4028-0"}],"container-title":["Communications in Computer and Information Science","Information Management and Big Data"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11680-4_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:12:45Z","timestamp":1558397565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-11680-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030116798","9783030116804"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11680-4_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIMBig","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Symposium on Information Management and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lima","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Peru","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"simbig2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/simbig.org\/SIMBig2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}