{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:04:44Z","timestamp":1742958284411,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578046"},{"type":"electronic","value":"9783030578053"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_31","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"327-336","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A New Approach for Dynamic and Risk-Based Data Anonymization"],"prefix":"10.1007","author":[{"given":"Lilian","family":"Adkinson Orellana","sequence":"first","affiliation":[]},{"given":"Pablo","family":"Dago Casas","sequence":"additional","affiliation":[]},{"given":"Marta","family":"Sestelo","sequence":"additional","affiliation":[]},{"given":"Borja","family":"Pintos Castro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"31_CR1","first-page":"901","volume":"5","author":"CC Aggarwal","year":"2005","unstructured":"Aggarwal, C.C.: On k-anonymity and the curse of dimensionality. VLDB 5, 901\u2013909 (2005)","journal-title":"VLDB"},{"unstructured":"Article 29 Working Party. Opinion 05\/2014 on Anonymisation Techniques (2014). \nhttp:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2014\/wp216_en.pdf\n\n. Last Accessed 10 Feb 2020","key":"31_CR2"},{"doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: Encyclopedia of Cryptography and Security, 2nd edn., pp. 338\u2013340. Springer (2011)","key":"31_CR3","DOI":"10.1007\/978-1-4419-5906-5_752"},{"unstructured":"General Data Protection Regulation (GDPR) (2014). \nhttps:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj\n\n. Last Accessed 10 Feb 2020","key":"31_CR4"},{"doi-asserted-by":"crossref","unstructured":"Lakkaraju, K., Slagell, A.: Evaluating the utility of anonymized network traces for intrusion detection. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, pp. 1\u20138 (2008)","key":"31_CR5","DOI":"10.1145\/1460877.1460899"},{"doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd International Conference on Data Engineering, pp. 106\u2013115. IEEE (2007)","key":"31_CR6","DOI":"10.1109\/ICDE.2007.367856"},{"doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. TKDD 1(1) (2007)","key":"31_CR7","DOI":"10.1145\/1217299.1217302"},{"unstructured":"Mivule, K.: Utilizing noise addition for data privacy, an overview. CoRR abs\/1309.3958 (2013)","key":"31_CR8"},{"doi-asserted-by":"crossref","unstructured":"de Montjoye, Y.A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3, 1376 (2013)","key":"31_CR9","DOI":"10.1038\/srep01376"},{"doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: 2008 IEEE Symposium on Security and Privacy, pp. 111\u2013125. IEEE (2008)","key":"31_CR10","DOI":"10.1109\/SP.2008.33"},{"doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 30th IEEE Symposium on Security and Privacy, USA, pp. 173\u2013187. IEEE Computer Society (2009)","key":"31_CR11","DOI":"10.1109\/SP.2009.22"},{"issue":"2","key":"31_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jaras.2013040101","volume":"4","author":"Y Song","year":"2013","unstructured":"Song, Y., Lu, X., Nobari, S., Bressan, S., Karras, P.: On the privacy and utility of anonymized social networks. Int. J. Adapt. Resilient Auton. Syst. 4(2), 1\u201334 (2013)","journal-title":"Int. J. Adapt. Resilient Auton. Syst."},{"issue":"5","key":"31_CR13","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 571\u2013588 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"issue":"5","key":"31_CR14","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"issue":"3","key":"31_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3168389","volume":"51","author":"I Wagner","year":"2018","unstructured":"Wagner, I., Eckhoff, D.: Technical privacy metrics: a systematic survey. ACM Comput. Surv. 51(3), 1\u201338 (2018)","journal-title":"ACM Comput. Surv."},{"doi-asserted-by":"crossref","unstructured":"Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A practical attack to de-anonymize social network users. In: 31st IEEE Symposium on Security and Privacy, USA, pp. 223\u2013238. IEEE Computer Society (2010)","key":"31_CR16","DOI":"10.1109\/SP.2010.21"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Q., Koudas, N., Srivastava, D., Yu, T.: Aggregate query answering on anonymized tables. In: Proceedings of the 23rd International Conference on Data Engineering, pp. 116\u2013125. IEEE (2007)","key":"31_CR17","DOI":"10.1109\/ICDE.2007.367857"}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T11:12:44Z","timestamp":1599477164000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_31","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}