{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:33:48Z","timestamp":1743060828976,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319112176"},{"type":"electronic","value":"9783319112183"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-11218-3_52","type":"book-chapter","created":{"date-parts":[[2014,9,8]],"date-time":"2014-09-08T11:16:15Z","timestamp":1410174975000},"page":"581-592","source":"Crossref","is-referenced-by-count":2,"title":["Correlation Based Anonymization Using Generalization and Suppression for Disclosure Problems"],"prefix":"10.1007","author":[{"given":"Amit","family":"Thakkar","sequence":"first","affiliation":[]},{"given":"Aashiyana Arifbhai","family":"Bhatti","sequence":"additional","affiliation":[]},{"given":"Jalpesh","family":"Vasa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"52_CR1","doi-asserted-by":"crossref","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: K-Anonymous Data Mining: A Survey. In: Advances in Database Systems. Springer, US (2008)","DOI":"10.1007\/978-0-387-70992-5_5"},{"key":"52_CR2","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: Proc. 22nd Intnl. Conf. Data Engg. (ICDE), p. 24 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"52_CR3","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory (1998)"},{"issue":"5","key":"52_CR4","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzz.\u00a010(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzz."},{"key":"52_CR5","unstructured":"LeFevre, K., De Witt, D.J., Ramakrishnan, R.: Multidimensional K-Anonymity"},{"key":"52_CR6","doi-asserted-by":"crossref","unstructured":"Samarati, P.: Protecting Respondents\u2019 Identities in Microdata Release. IEEE Transactions on Knowledge and Data Engineering\u00a013(6) (2001)","DOI":"10.1109\/69.971193"},{"key":"52_CR7","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: Privacy Beyond k-Anonymity and l-diversity. In: ICDE, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"52_CR8","doi-asserted-by":"crossref","unstructured":"Wu, Y., Ruan, X., Liao, S., Wang, X.: P-Cover K-anonymity model for Protecting Multiple Sensitive Attributes. IEEE (2010)","DOI":"10.1109\/ICCSE.2010.5593663"},{"key":"52_CR9","doi-asserted-by":"crossref","unstructured":"Gionis, A., Tassa, T.: k-Anonymization with Minimal Loss of Information. IEEE Transactions on Knowledge and Data Engineering\u00a021(2) (2009)","DOI":"10.1109\/TKDE.2008.129"},{"key":"52_CR10","unstructured":"Aggarwal, C.C., Yu, P.S.: Privacy-Preserving Data Mining: Models And Algorithms. Kluwer Academic Publishers"},{"key":"52_CR11","doi-asserted-by":"crossref","unstructured":"Gionis, A., Tassa, T.: k-Anonymization with Minimal Loss of Information. IEEE Transactions on Knowledge and Data Engineering\u00a021 (2009)","DOI":"10.1109\/TKDE.2008.129"},{"key":"52_CR12","unstructured":"Kedar, S., Dhawale, S., Vaibhav, W., Kadam, P., Wani, S., Ingale, P.: Privacy Preserving Data Mining. International Journal of Advanced Research in Computer and Communication Engineering\u00a02(4) (2013)"},{"key":"52_CR13","doi-asserted-by":"crossref","unstructured":"Malik, M.B., Ghazi, M.A., Ali, R.: Privacy Preserving Data Mining Techniques: Current Scenario and Future. In: 2012 IEEE Third International Conference on Computer and Communication Technology (2012)","DOI":"10.1109\/ICCCT.2012.15"},{"key":"52_CR14","doi-asserted-by":"crossref","unstructured":"Mahesh, R., Meyyappan, T.: Anonymization Technique through Record Elimination to Preserve Privacy of Published Data. In: Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (2013)","DOI":"10.1109\/ICPRIME.2013.6496495"},{"key":"52_CR15","doi-asserted-by":"crossref","unstructured":"Maheshwarkar, N., Pathak, K., Chourey, V.: N-SA K-anonymity Model: A Model Exclusive of Tuple Suppression Technique. In: Third Global Congress on Intelligent Systems (2012)","DOI":"10.1109\/GCIS.2012.77"},{"key":"52_CR16","doi-asserted-by":"crossref","unstructured":"Liu, J., Luo, J., Huang, J.Z.: Rating: Privacy Preservation for Multiple Attributes with Different Sensitivity Requirements. In: 11th IEEE International Conference on Data Mining Workshops (2011)","DOI":"10.1109\/ICDMW.2011.144"},{"key":"52_CR17","doi-asserted-by":"crossref","unstructured":"Wang, Q., Xu, Z., Qu, S.: An Enhanced K-Anonymity Model against Homogeneity Attack. Journal of Software\u00a06(10) (2011)","DOI":"10.4304\/jsw.6.10.1945-1952"},{"key":"52_CR18","unstructured":"Mogre, N.V., Agarwal, G., Patil, P.: A Review on Data Anonymization Technique For Data Publishing. International Journal of Engineering Research & Technology (IJERT)\u00a01(10) (2012) ISSN: 2278-0181"},{"key":"52_CR19","doi-asserted-by":"crossref","unstructured":"Kisilevich, S., Rokach, L., Elovici, Y.: Member, IEEE, and Brach Shapira, Efficient Multidimensional Suppression for K-Anonymity. IEEE Transactions on Knowledge and Data Engineering\u00a022(3) (2010)","DOI":"10.1109\/TKDE.2009.91"},{"key":"52_CR20","doi-asserted-by":"crossref","unstructured":"Shanthi, A.S., Karthikeyan, M.: A Review on Privacy Preserving Data Mining (2012)","DOI":"10.1109\/ICCIC.2012.6510302"},{"key":"52_CR21","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1016\/j.datak.2007.03.009","volume":"63","author":"M. Ercan Nergiz","year":"2007","unstructured":"Ercan Nergiz, M., Clifton, C.: Thoughts on k-anonymization. Data & Knowledge Engineering\u00a063, 622\u2013645 (2007)","journal-title":"Data & Knowledge Engineering"},{"key":"#cr-split#-52_CR22.1","unstructured":"Aggarwal, C.C.: On k-Anonymity and the Curse of Dimensionality. In: Proceedings of the 31st VLDB Conference, Trondheim, Norway (2005)"},{"key":"#cr-split#-52_CR22.2","doi-asserted-by":"crossref","unstructured":"International Journal of Information Security and Privacy 2(3), 28-44 (July-September 2008)","DOI":"10.4018\/jisp.2008070103"},{"issue":"3","key":"52_CR23","doi-asserted-by":"publisher","first-page":"28","DOI":"10.4018\/jisp.2008070103","volume":"2","author":"T.S. Gal","year":"2008","unstructured":"Gal, T.S., Chen, Z., Gangopadhyay, A.: A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes. International Journal of Information Security and Privacy\u00a02(3), 28\u201344 (2008)","journal-title":"International Journal of Information Security and Privacy"},{"issue":"11","key":"52_CR24","first-page":"975","volume":"60","author":"S.M. Nargundi","year":"2012","unstructured":"Nargundi, S.M., Phalnikar, R.: k-Anonymization using Multidimen-sional Suppression for Data De-identificatio. International Journal of Computer Application\u00a060(11), 975\u20138887 (2012)","journal-title":"International Journal of Computer Application"},{"key":"52_CR25","doi-asserted-by":"crossref","unstructured":"Wong, R.C.-W., Fu, A.W.-C., Wang, K., Pei, J.: Ano-nymization-Based Attacks in Privacy-Preserving Data Publishing. ACM Trans-actions on Database Systems\u00a034(2) Article 8 (Publication date: June 2009)","DOI":"10.1145\/1538909.1538910"},{"issue":"21","key":"52_CR26","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1056\/NEJM199511233332112","volume":"333","author":"B. Woodward","year":"1995","unstructured":"Woodward, B.: The computer-based patient record confidentiality. The New England Journal of Medicine\u00a0333(21), 1419\u20131422 (1995)","journal-title":"The New England Journal of Medicine"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Intelligent Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11218-3_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T03:41:02Z","timestamp":1674272462000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11218-3_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319112176","9783319112183"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11218-3_52","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}