{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T00:00:08Z","timestamp":1751155208872},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319058122"},{"type":"electronic","value":"9783319058139"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05813-9_13","type":"book-chapter","created":{"date-parts":[[2014,4,16]],"date-time":"2014-04-16T07:57:50Z","timestamp":1397635070000},"page":"188-202","source":"Crossref","is-referenced-by-count":8,"title":["\u03c1-uncertainty Anonymization by Partial Suppression"],"prefix":"10.1007","author":[{"given":"Xiao","family":"Jia","sequence":"first","affiliation":[]},{"given":"Chao","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Xinhui","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Kenny Q.","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Lo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules. In: KDEX (1999)"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Brijs, T., Swinnen, G., Vanhoof, K., Wets, G.: Using association rules for product assortment decisions: A case study. In: Knowledge Discovery and Data Mining, pp. 254\u2013260 (1999)","DOI":"10.1145\/312129.312241"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Cao, J., Karras, P., Ra\u00efssi, C., Tan, K.-L.: \u03c1-uncertainty: inference-proof transaction anonymization. In: VLDB, pp. 1033\u20131044 (2010)","DOI":"10.14778\/1920841.1920971"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Chen, R., Mohammed, N., Fung, B.C.M., Desai, B.C., Xiong, L.: Publishing set-valued data via differential privacy. VLDB, 1087\u20131098 (2011)","DOI":"10.14778\/3402707.3402744"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C. Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol.\u00a04978, pp. 1\u201319. Springer, Heidelberg (2008)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Fisher, K., Walker, D., Zhu, K.Q., White, P.: From dirt to shovels: Fully automatic tool generation from ad hoc data. In: POPL, pp. 421\u2013434 (2008)","DOI":"10.1145\/1328897.1328488"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. (2010)","DOI":"10.1145\/1749603.1749605"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Tao, Y.: Anonymous publication of sensitive transactional data. TKDE, 161\u2013174 (2011)","DOI":"10.1109\/TKDE.2010.101"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"He, Y., Naughton, J.F.: Anonymization of set-valued data via top-down, local generalization. VLDB, 934\u2013945 (2009)","DOI":"10.14778\/1687627.1687733"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1111\/j.1469-8137.1912.tb05611.x","volume":"11","author":"P. Jaccard","year":"1912","unstructured":"Jaccard, P.: The distribution of the flora in the alphine zone. New Phytologist\u00a011, 37\u201350 (1912)","journal-title":"New Phytologist"},{"issue":"1","key":"13_CR11","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1214\/aoms\/1177729694","volume":"21","author":"S. Kullback","year":"1951","unstructured":"Kullback, S., Leibler, R.A.: On information and sufficiency. Annals of Mathematical Statistics\u00a021(1), 79\u201386 (1951)","journal-title":"Annals of Mathematical Statistics"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 557\u2013570 (2002)","DOI":"10.1142\/S0218488502001648"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Terrovitis, M., Liagouris, J., Mamoulis, N., Skiadopoulos, S.: Privacy preservation by disassociation. PVLDB (2012)","DOI":"10.14778\/2336664.2336668"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Terrovitis, M., Mamoulis, N., Kalnis, P.: Privacy-preserving anonymization of set-valued data. VLDB, 115\u2013125 (2008)","DOI":"10.14778\/1453856.1453874"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Verykios, V.S., Elmagarmid, A.K., Bertino, E., Saygin, Y., Dasseni, E.: Association rule hiding. TKDE, 434\u2013447 (2004)","DOI":"10.1109\/TKDE.2004.1269668"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Wu, Y.-H., Chiang, C.-M., Chen, A.L.P.: Hiding sensitive association rules with limited side effects. TKDE, 29\u201342 (2007)","DOI":"10.1109\/TKDE.2007.250583"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Anatomy: Simple and effective privacy preservation. In: PVLDB, pp. 139\u2013150 (2006)","DOI":"10.1145\/1142473.1142500"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Xu, Y., Wang, K., Fu, A.W.-C., Yu, P.S.: Anonymizing transaction databases for publication. In: KDD, pp. 767\u2013775 (2008)","DOI":"10.1145\/1401890.1401982"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Koudas, N., Srivastava, D., Yu, T.: Aggregate query answering on anonymized tables. In: ICDE, pp. 116\u2013125 (2007)","DOI":"10.1109\/ICDE.2007.367857"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Kohavi, R., Mason, L.: Real world performance of association rule algorithms. In: KDD, pp. 401\u2013406 (2001)","DOI":"10.1145\/502512.502572"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05813-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T15:26:00Z","timestamp":1648826760000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-05813-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319058122","9783319058139"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05813-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}