{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:13:33Z","timestamp":1742930013480,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030170646"},{"type":"electronic","value":"9783030170653"}],"license":[{"start":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T00:00:00Z","timestamp":1554854400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-17065-3_27","type":"book-chapter","created":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T01:38:22Z","timestamp":1554773902000},"page":"268-277","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Enhancement of Telecom Processes Interacting with Charging Data Records"],"prefix":"10.1007","author":[{"given":"Siham","family":"Arfaoui","sequence":"first","affiliation":[]},{"given":"Abdelhamid","family":"Belmekki","sequence":"additional","affiliation":[]},{"given":"Abdellatif","family":"Mezrioui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,10]]},"reference":[{"key":"27_CR1","unstructured":"Technical Specification 32.298: Telecommunication management, charging management, Charging Data Record (CDR) parameter description, 3GPP, version 15.3.0 (2018)"},{"key":"27_CR2","unstructured":"Technical Specification 32.250: Telecommunication management, charging management, Circuit Switched (CS) domain charging, 3GPP, version 15.0.0 (2018)"},{"key":"27_CR3","unstructured":"Technical Specification 32.276: Telecommunication management, charging management, Voice Call Service (VCS) charging, 3GPP, version 15.0.0 (2018)"},{"key":"27_CR4","unstructured":"Technical Specification 32.274: Telecommunication management, charging management, Short Message Service (SMS) charging, 3GPP, version 15.0.0 (2018)"},{"key":"27_CR5","unstructured":"Technical Specification 32.297: Telecommunication management, charging management, Charging Data Record (CDR) file format and transfer, 3GPP, version 15.0.0 (2018)"},{"key":"27_CR6","unstructured":"AFCDP, Glossary anonymization of data (2008)"},{"key":"27_CR7","unstructured":"Mivule, K., Turner, C.: A review of privacy essentials for confidential mobile data transactions. In: International Conference on Mobility in Computing-ICMiC 2013, pp. 36\u201343 (2013)"},{"issue":"4","key":"27_CR8","first-page":"1","volume":"42","author":"CM Benjamin","year":"2010","unstructured":"Benjamin, C.M., Fung, M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 1\u201353 (2010)","journal-title":"ACM Comput. Surv."},{"issue":"5","key":"27_CR9","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Puzziness Knowl.-Based Syst. 10(5), 571\u2013588 (2002)","journal-title":"Int. J. Uncertain. Puzziness Knowl.-Based Syst."},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Islam, M.R., Islam, M.E.: An approach to provide security to unstructured big data. In: IEEE 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA), pp. 1\u20135 (2014)","DOI":"10.1109\/SKIMA.2014.7083392"},{"key":"27_CR11","first-page":"48","volume-title":"Lecture Notes in Computer Science","author":"Ji-Won Byun","year":"2006","unstructured":"Byun, J.-W., Sohn, Y., Bertino, E., Li, N.: Secure anonymization for incremental datasets, pp. 48\u201363. Springer, Heidelberg (2006)"},{"key":"27_CR12","unstructured":"Fraser, R., Willison, D.: Tools for anonymization of personal health information prepared for the pan-Canadian group of protection of personal health information (PRPS), September 2009"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Personalized privacy preservation. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 229\u2013240 (2006)","DOI":"10.1145\/1142473.1142500"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Kri\u017ean, T., Brakus, M., Vukeli\u0107, D.: In-situ anonymization of big data. In: Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 292\u2013298 (2015)","DOI":"10.1109\/MIPRO.2015.7160282"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Mamoulis, N., Cheung, D.W.: Nonhomogeneous generalization in privacy preserving data publishing, pp. 747\u2013758 (2010)","DOI":"10.1145\/1807167.1807248"},{"key":"27_CR16","unstructured":"Data Masking: What you need to know before you begin, A Net 2000 Ltd. White paper"},{"key":"27_CR17","unstructured":"https:\/\/www.quora.com\/how-much-does-it-cost-tu-use-informatica"},{"key":"27_CR18","unstructured":"Call Detail Record Reference, V300R003C01LMA101, pp. 22\u2013229. HUAWEI (2013)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-17065-3_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T04:11:26Z","timestamp":1558152686000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-17065-3_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,10]]},"ISBN":["9783030170646","9783030170653"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-17065-3_27","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,4,10]]},"assertion":[{"value":"10 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SoCPaR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Soft Computing and Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Porto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socpar2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/socpar18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}