{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T04:08:49Z","timestamp":1747541329600,"version":"3.40.5"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319149769"},{"type":"electronic","value":"9783319149776"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-14977-6_29","type":"book-chapter","created":{"date-parts":[[2015,1,28]],"date-time":"2015-01-28T09:23:24Z","timestamp":1422437004000},"page":"299-310","source":"Crossref","is-referenced-by-count":3,"title":["k-degree Closeness Anonymity: A Centrality Measure Based Approach for Network Anonymization"],"prefix":"10.1007","author":[{"given":"Debasis","family":"Mohapatra","sequence":"first","affiliation":[]},{"given":"Manas Ranjan","family":"Patra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","first-page":"59","DOI":"10.29012\/jpc.v1i1.566","volume":"1","author":"Y. Lindell","year":"2009","unstructured":"Lindell, Y., Pinkas, B.: Secure Multiparty Computation for Privacy-Preserving Data Mining. The Journal of Privacy and Confidentiality\u00a01, 59\u201398 (2009)","journal-title":"The Journal of Privacy and Confidentiality"},{"key":"29_CR2","volume-title":"Data mining: Concepts and techniques","author":"J. Hann","year":"2001","unstructured":"Hann, J., Kamber, N.: Data mining: Concepts and techniques. MorganKanfmann Publishers, San Francisco (2001)"},{"key":"29_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-540-30570-5_17","volume-title":"Database Theory - ICDT 2005","author":"G. Aggarwal","year":"2005","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing tables. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol.\u00a03363, pp. 246\u2013258. Springer, Heidelberg (2005)"},{"issue":"5","key":"29_CR4","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-ANONYMITY: A Model for Protecting Privacy, International Journal on Uncertainty. Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"Fuzziness and Knowledge-based Systems"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: Proc. 22nd Intnl. Conf. Data Engg (ICDE), p. 24 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Chi-Wing Wong, R., Li, J., Fu, A.W., Wang, K.: (\u03b1,k)Anonymity: An Enhanced k-Anonymity Model for Privacy Preserving Data Publishing. In: KDD 2006, pp. 754\u2013759 (2006)","DOI":"10.1145\/1150402.1150499"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Anatomy: Simple and Effective Privacy Preservation. In: VLDB, pp. 139\u2013150 (2006)","DOI":"10.1145\/1142473.1142500"},{"issue":"5","key":"29_CR8","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int\u2019l Journal on Uncertainty, Fuzziness, and Knowledge-Base Systems\u00a010(5), 571\u2013588 (2002)","journal-title":"Int\u2019l Journal on Uncertainty, Fuzziness, and Knowledge-Base Systems"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: PODS, pp. 223\u2013228 (2004)","DOI":"10.1145\/1055558.1055591"},{"key":"29_CR10","unstructured":"Michael, H., Gerome, M., David, J., Philipp, W., Siddharth, S.: Anonymizing social networks. Technical report, University of Massachusetts Amherst (2007)"},{"key":"29_CR11","unstructured":"Kun, L., Kamalika, D., Tyrone, G., Hillol, K.: Privacy-Preserving Data Analysis on Graphs and Social Networks. In: Kargupta, H., Han, J., Yu, P., Motwani, R., Kumar, V. (eds.) Next Generation of Data Mining, ch. 21, pp. 419\u2013437. Chapman & Hall\/CRC (2008)"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Kun, L., Evimaria, T.: Towards identity anonymization on graphs. In: Proceedings of ACM SIGMOD, Vancouver, Canada, pp. 93\u2013106 (2008)","DOI":"10.1145\/1376616.1376629"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Kapron Bruce, M., Gautam, S., Venkatesh, S.: Social Network Anonymization via Edge Addition. In: ASONAM 2011, pp. 155\u2013162 (2011)","DOI":"10.1109\/ASONAM.2011.108"},{"key":"29_CR14","unstructured":"Sean, C., Kapron Bruce, M., Ganesh, R., Gautam, S., Alex, T., Venkatesh, S.: k-Anonymization of Social Networks by Vertex Addition. In: ADBIS (2) 2011, pp. 107\u2013116 (2011)"},{"key":"29_CR15","unstructured":"Bin, Z., Jian, P.: Preserving privacy in social networks against neighborhood attacks. In: Proceedings of the 24th International Conference on Data Engineering (ICDE 2008), pp. 506\u2013515 (2008)"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"PedarsaniPedram, G.M.: On the Privacy of Anonymized Networks. In: KDD 2011, pp. 1235\u20131243 (2011)","DOI":"10.1145\/2020408.2020596"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Wu, W., Xiao, Y., Wang, W., He, Z., Wang, Z.: K-Symmetry Model for Identity Anonymization in Social Networks. In: Proceedings of the 13th International Conference on Extending Database Technology (EDBT 2010), pp. 111\u2013122 (2010)","DOI":"10.1145\/1739041.1739058"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Wang, G., Liu, Q., Li, F., Yang, S., Wu, J.: Outsourcing Privacy-Preserving Social Networks to Cloud. In: 2013 Proceedings IEEE INFOCOM, pp. 2886\u20132894 (2013)","DOI":"10.1109\/INFCOM.2013.6567099"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14977-6_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T22:08:15Z","timestamp":1747519695000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-14977-6_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319149769","9783319149776"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14977-6_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}