{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T12:41:04Z","timestamp":1775047264270,"version":"3.50.1"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031371196","type":"print"},{"value":"9783031371202","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37120-2_21","type":"book-chapter","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T23:04:56Z","timestamp":1687993496000},"page":"317-333","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["K-Anonymity Versus PSI3 for\u00a0Depersonalization and\u00a0Security Assessment of\u00a0Large Data Structures"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Bogdanov","sequence":"first","affiliation":[]},{"given":"Nadezhda","family":"Shchegoleva","sequence":"additional","affiliation":[]},{"given":"Valery","family":"Khvatov","sequence":"additional","affiliation":[]},{"given":"Gennady","family":"Dik","sequence":"additional","affiliation":[]},{"given":"Jasur","family":"Kiyamov","sequence":"additional","affiliation":[]},{"given":"Aleksandr","family":"Dik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,29]]},"reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/978-3-030-87010-2_33","volume-title":"Computational Science and Its Applications","author":"AV Bogdanov","year":"2021","unstructured":"Bogdanov, A.V., et al.: Protection of personal data using anonymization. In: Gervasi, O., et al. (eds.) ICCSA 2021. LNCS, vol. 12956, pp. 447\u2013459. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-87010-2_33"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Bogdanov, A.V., et al.: Risk model of application of lifting methods. In: Proceedings of the 9th International Conference Distributed Computing and Grid Technologies in Science and Education. RWTH Aahen University, vol. 3041. pp. 369\u2013374, December 2021. (CEUR Workshop Proceedings)","DOI":"10.54546\/MLIT.2021.77.69.001"},{"key":"21_CR3","unstructured":"NISTIR 8062. An Introduction to Privacy Engineering and Risk Management in Federal Systems"},{"key":"21_CR4","unstructured":"ISO\/IEC27701. Security techniques - Extension to ISO\/IEC 27001 and ISO\/IEC 27002 for privacy information management - Requirements and guidelines"},{"key":"21_CR5","unstructured":"De-identification Guidelines for Structured Data, IPC Ontario (2016)"},{"key":"21_CR6","unstructured":"General Data Protection Regulation (REGULATION (EU) 2016\/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC)"},{"key":"21_CR7","unstructured":"Anonymization: managing data protection risk code of practice. Information Commissioner\u2019s Office, Wycliffe House, Water Lane, Wilmslow, Cheshire SK9 5AF. November 2012"},{"key":"21_CR8","unstructured":"ISO\/IEC 20889:2018. Privacy enhancing data de-identification terminology and classification of techniques"},{"issue":"3","key":"21_CR9","first-page":"28","volume":"52","author":"K Ito","year":"2016","unstructured":"Ito, K., Kogure, J., Shimoyama, T., Tsuda, H.: De-identification and encryption technologies to protect personal information. Fujitsu Sci. Tech. J. 52(3), 28\u201336 (2016)","journal-title":"Fujitsu Sci. Tech. J."},{"key":"21_CR10","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C Shannon","year":"1948","unstructured":"Shannon, C.: A mathematical theory of communication. Bell Syst. Tech. J. 27, 379\u2013423 (1948)","journal-title":"Bell Syst. Tech. J."},{"key":"21_CR11","doi-asserted-by":"publisher","first-page":"1945","DOI":"10.3390\/e13111945","volume":"13","author":"JC Baez","year":"2011","unstructured":"Baez, J.C., Fritz, T., Leinster, T.: A characterization of entropy in terms of information loss. Entropy 13, 1945\u20131957 (2011)","journal-title":"Entropy"},{"issue":"3","key":"21_CR12","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1109\/TIT.2021.3125006","volume":"68","author":"Z Wang","year":"2021","unstructured":"Wang, Z., Banawan, K., Ulukus, S.: Private set intersection: a multi-message symmetric private information retrieval perspective. IEEE Trans. Inf. Theor. 68(3), 2001\u20132019 (2021)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/3-540-45068-8_5","volume-title":"Web Engineering","author":"Jorge J. G\u00f3mez-Sanz","year":"2003","unstructured":"G\u00f3mez-Sanz, Jorge J.., Pav\u00f3n, Juan, D\u00edaz-Carrasco, \u00c1ureo.: The PSI3 agent recommender system. In: Lovelle, Juan Manuel Cueva., Rodr\u00edguez, Bernardo Mart\u00edn Gonz\u00e1lez., Gayo, Jose Emilio Labra., del Puerto Paule Ruiz, Mar\u00eda, Aguilar, Luis Joyanes (eds.) ICWE 2003. LNCS, vol. 2722, pp. 30\u201339. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-45068-8_5"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2023 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37120-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T23:39:33Z","timestamp":1687995573000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37120-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031371196","9783031371202"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37120-2_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Custom based on Cyberchair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"283","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8,5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PHD Showcase Papers: 6(for main conf) \/ For ICCSA 2023 Workshops 876 subm sent, 350 full papers and 29 short papers accepted, additional PHD Showcase Papers: 2","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}