{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:09:28Z","timestamp":1726060168108},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030349851"},{"type":"electronic","value":"9783030349868"}],"license":[{"start":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T00:00:00Z","timestamp":1574899200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-34986-8_29","type":"book-chapter","created":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T10:02:47Z","timestamp":1574848967000},"page":"405-420","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Clustering-Anonymity Method for Privacy Preserving Table Data Sharing"],"prefix":"10.1007","author":[{"given":"Liping","family":"Liu","sequence":"first","affiliation":[]},{"given":"Chunhui","family":"Piao","sequence":"additional","affiliation":[]},{"given":"Huirui","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,28]]},"reference":[{"key":"29_CR1","first-page":"50","volume":"01","author":"X Xiaolin","year":"2018","unstructured":"Xiaolin, X., Ming, C.: Research on government service data sharing in the environment of digital government. Adm. Trib. 01, 50\u201359 (2018)","journal-title":"Adm. Trib."},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Susanto, H., Almunawar, M.N.: Security and privacy issues in cloud-based e-government. In: Cloud Computing Technologies for Connected Government, pp. 292\u2013321. IGI Global (2016)","DOI":"10.4018\/978-1-4666-8629-8.ch012"},{"key":"29_CR3","unstructured":"Yuan, Y.: Privacy Protection Method and Research in Data Sharing. Harbin Engineering University, (2014)"},{"key":"29_CR4","unstructured":"Zhang, Y.: Research on Sensitive Information Protection in Data Sharing. Dalian Maritime University (2012)"},{"issue":"15","key":"29_CR5","first-page":"159","volume":"36","author":"Z Xia","year":"2010","unstructured":"Xia, Z., Han, J., Juan, Yu., Guo, T.: MDAV algorithm for implementing (k, e) -anonymity model. Comput. Eng. 36(15), 159\u2013161 (2010)","journal-title":"Comput. Eng."},{"key":"29_CR6","first-page":"48","volume":"9","author":"H Ronglei","year":"2018","unstructured":"Ronglei, H., Yanqiong, H., Ping, Z., Xiaohong, F.: Design and implementation of medical privacy protection scheme in big data environment. Netinfo Secur. 9, 48\u201354 (2018)","journal-title":"Netinfo Secur."},{"issue":"18","key":"29_CR7","first-page":"29","volume":"12","author":"C Li","year":"2016","unstructured":"Li, C.: Analysis of the research status of privacy protection under the environment of big data. Comput. Knowl. Technol. 12(18), 29\u201331 (2016)","journal-title":"Comput. Knowl. Technol."},{"key":"29_CR8","unstructured":"Wang, B., Yang, J.: Research on anonymity technique for personalization privacy-preserving data publishing. Comput. Sci. 39(4), 168\u2013171+200 (2012)"},{"issue":"3","key":"29_CR9","first-page":"224","volume":"1","author":"T Zhu","year":"2015","unstructured":"Zhu, T., He, M., Zou, D.: Differential privacy and applications on big data. J. Inf. Secur. Res. 1(3), 224\u2013229 (2015)","journal-title":"J. Inf. Secur. Res."},{"key":"29_CR10","unstructured":"Wu, L.: Research on Clustering Algorithm of Data Table Anonymity. Xidian University (2017)"},{"key":"29_CR11","unstructured":"Ren, W.: Association rules based background knowledge attack and privacy protection. Shandong University (2011)"},{"key":"29_CR12","first-page":"1","volume-title":"Automata, Languages and Programming","author":"Cynthia Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Proceedings of the 33rd International Conference on Automata, Languages and Programming, pp. 1\u201312 (2006)"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: Encyclopedia of Cryptography and Security, pp. 338\u2013340. Springer, New York (2011)","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"29_CR14","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"Cynthia Dwork","year":"2006","unstructured":"Dwork, C., Mcsherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity inprivate data analysis. In: Proceedings of the 3th Theory of Cryptography Conference (TCC), pp. 363\u2013385 (2006)"},{"issue":"4","key":"29_CR15","first-page":"1672","volume":"40","author":"J Xie","year":"2012","unstructured":"Xie, J., Guo, W., Xie, W.: A neighborhood-based K-medoids clustering algorithm. J. Shaanxi Norm. Univ. (Nat. Sci. Ed.) 40(4), 1672\u20134291 (2012)","journal-title":"J. Shaanxi Norm. Univ. (Nat. Sci. Ed.)"},{"key":"29_CR16","first-page":"84","volume":"239","author":"Y Lu","year":"2017","unstructured":"Lu, Y., Sinnott, R.O., Verspoor, K.: A semantic-based k-anonymity scheme for health record linkage. Stud. Health Technol. Inform. 239, 84\u201390 (2017)","journal-title":"Stud. Health Technol. Inform."},{"issue":"5","key":"29_CR17","first-page":"125","volume":"37","author":"X Liu","year":"2016","unstructured":"Liu, X., Li, Q.: Differentially private data release based on clustering anonymization. J. Commun. 37(5), 125\u2013129 (2016)","journal-title":"J. Commun."},{"key":"29_CR18","unstructured":"Chunhui, P., Yajuan, S., Jiaqi, Y., et al.: Privacy-preserving governmental data publishing: A fog-computing-based differential privacy approach. Future Generation Computer Systems, S0167739X18300773 (2018)"},{"issue":"01","key":"29_CR19","first-page":"23","volume":"27","author":"H Liu","year":"2014","unstructured":"Liu, H.: Clustering-based data publishing for differential data anonymization. J. Hainan Norm. Univ. Nat. Sci. 27(01), 23\u201326 (2014)","journal-title":"J. Hainan Norm. Univ. Nat. Sci."},{"key":"29_CR20","unstructured":"Xiong, J.B., Wang, M.S., Tian, Y.L., Ma, R., Yao, Z.Q., Lin, M.W.: Research progress on privacy measurement for cloud data. Ruan Jian Xue Bao\/Journal of Software 29(7), 1963\u20131980 (2018). (in Chinese). http:\/\/www.jos.org.cn\/1000-9825\/5363.htm"},{"key":"29_CR21","first-page":"786","volume":"4","author":"Y Shi","year":"2019","unstructured":"Shi, Y., Zhou, W., Zang, S., et al.: A comprehensive evaluation model of privacy protection based on probability statistics and del-entropy. Chin. J. Comput. 4, 786\u2013799 (2019)","journal-title":"Chin. J. Comput."},{"key":"29_CR22","unstructured":"Chen, X.: Research and Implementation of Data Anonymized Privacy Protection Method. Jiangsu University of Science and Technology (2018)"},{"key":"29_CR23","doi-asserted-by":"crossref","unstructured":"Blum, A., Ligett, K., Roth, A.: A learning theory approach to non-interactive database privacy. In: Fortieth annual ACM Symposium on Theory of Computing (STOC 2008). ACM (2008)","DOI":"10.1145\/1374376.1374464"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in E-Business Engineering for Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34986-8_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,6]],"date-time":"2021-02-06T22:35:54Z","timestamp":1612650954000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-34986-8_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,28]]},"ISBN":["9783030349851","9783030349868"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34986-8_29","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2019,11,28]]},"assertion":[{"value":"28 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICEBE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on e-Business Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icebe2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conferences.computer.org\/icebe\/2019\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}