{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T03:09:00Z","timestamp":1771643340195,"version":"3.50.1"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319193144","type":"print"},{"value":"9783319193151","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19315-1_3","type":"book-chapter","created":{"date-parts":[[2015,6,6]],"date-time":"2015-06-06T10:42:08Z","timestamp":1433587328000},"page":"24-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Quantifying Privacy: A Novel Entropy-Based Measure of Disclosure Risk"],"prefix":"10.1007","author":[{"given":"Mousa","family":"Alfalayleh","sequence":"first","affiliation":[]},{"given":"Ljiljana","family":"Brankovic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,7]]},"reference":[{"issue":"4","key":"3_CR1","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"NR Adam","year":"1989","unstructured":"Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Comput. Surv. 21(4), 515\u2013556 (1989)","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"3_CR2","doi-asserted-by":"publisher","first-page":"1778","DOI":"10.1137\/070689589","volume":"25","author":"R Ahlswede","year":"2011","unstructured":"Ahlswede, R., Aydinian, H.: On security of statistical databases. SIAM J. Discrete Math. 25(4), 1778\u20131791 (2011)","journal-title":"SIAM J. Discrete Math."},{"issue":"4","key":"3_CR3","first-page":"32","volume":"9","author":"Y Al-Saggaf","year":"2012","unstructured":"Al-Saggaf, Y., Islam, M.Z.: Privacy in social network sites (SNS) - the threats from data mining. Ethical Space: J. Commun. Ethics 9(4), 32\u201340 (2012)","journal-title":"Ethical Space: J. Commun. Ethics"},{"issue":"2","key":"3_CR4","doi-asserted-by":"crossref","first-page":"29","DOI":"10.13189\/wjcat.2013.010202","volume":"1","author":"F Al-Saggaf","year":"2013","unstructured":"Al-Saggaf, F., Islam, M.Z.: A malicious use of a clustering algorithm to threaten the privacy of a social networking site user. World J. Comput. Appl. Technol. 1(2), 29\u201334 (2013)","journal-title":"World J. Comput. Appl. Technol."},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Al-Saggaf, Y., Islam, M.Z.: Data mining and privacy of social network sites users: implications of the data mining problem. Sci. Eng. Ethics (2014)","DOI":"10.1007\/s11948-014-9564-6"},{"key":"3_CR6","unstructured":"Blake, C.L.: Wine Recognition Data (1998)"},{"key":"3_CR7","unstructured":"Brankovic, L.: Usability of secure statistical databases. Ph.D. Thesis, Newcastle, Australia (1998)"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"37","DOI":"10.2298\/PETF0314037B","volume":"14","author":"L Brankovic","year":"2003","unstructured":"Brankovic, L., Cvetkovic, D.: The eigenspace of the eigenvalue -2 in generalized line graphs and a problem in security of statistical databases. Publikacije ETF, Serija: matematika. 14, 37\u201348 (2003)","journal-title":"Publikacije ETF, Serija: matematika."},{"key":"3_CR9","unstructured":"Brankovic, L., Estivill-Castro, V.: Privacy issues in knowledge discovery and data mining. In: Australian Institute of Computer Ethics Conference, pp. 89\u201399 (1999)"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-69861-6_12","volume-title":"Security, Privacy, and Trust in Modern Data Management","author":"L Brankovic","year":"2007","unstructured":"Brankovic, L., Giggins, H.: Statistical database security. In: Petkovi\u0107, M., Jonker, W. (eds.) Security, Privacy, and Trust in Modern Data Management, pp. 167\u2013181. Springer, Heidelberg (2007)"},{"issue":"3","key":"3_CR11","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1137\/S0895480198345004","volume":"13","author":"L Brankovic","year":"2000","unstructured":"Brankovic, L., Horak, P., Miller, M.: An optimization problem in statistical databases. SIAM J. Discrete Math. 13(3), 46\u2013353 (2000)","journal-title":"SIAM J. Discrete Math."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Brankovic, L., Horak, P., Miller, M., Wrightson, G.: Usability of compromise-free statistical databases for range sum queries. In: 9th International Conference on Scientific and Statistical Database Management, pp. 144\u2013154. IEEE Computer Society (1997)","DOI":"10.1109\/SSDM.1997.621177"},{"key":"3_CR13","first-page":"151","volume-title":"Privacy-Preserving Data Mining","author":"L Brankovic","year":"2007","unstructured":"Brankovic, L., Islam, M.Z., Giggins, H.: Security, privacy, and trust in modern data management. In: Petkovi\u0107, M., Jonker, W. (eds.) Privacy-Preserving Data Mining, pp. 151\u2013165. Springer, Heidelberg (2007)"},{"issue":"2","key":"3_CR14","doi-asserted-by":"crossref","first-page":"461","DOI":"10.26493\/1855-3974.220.34c","volume":"7","author":"L Brankovic","year":"2014","unstructured":"Brankovic, L., Lopez, N., Miller, M., Sebe, F.: Triangle randomization for social network data anonymization. Ars Math. Contemp. 7(2), 461\u2013477 (2014)","journal-title":"Ars Math. Contemp."},{"key":"3_CR15","first-page":"169","volume":"12","author":"L Brankovic","year":"1996","unstructured":"Brankovic, L., Miller, M., Siran, J.: Graphs, 0\u20131 matrices, and usability of statistical databases. Congressus Numerantium 12, 169\u2013182 (1996)","journal-title":"Congressus Numerantium"},{"key":"3_CR16","unstructured":"Brankovic, L., Miller, M., Siran, J.: Usability of k-compromise-free statistical databases. In: Proceedings of the 11th Australasian Workshop on Combinatorial Algorithms (AWOCA 2000), Hunter Valley, pp. 159\u2013166 (2000)"},{"issue":"12","key":"3_CR17","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1080\/00207160214651","volume":"79","author":"L Brankovic","year":"2002","unstructured":"Brankovic, L., Miller, M., Siran, J.: Range query usability of statistical databases. Int. J. Comput. Math. 79(12), 1265\u20131271 (2002)","journal-title":"Int. J. Comput. Math."},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1007\/3-540-45655-4_48","volume-title":"Computing and Combinatorics","author":"L Brankovic","year":"2002","unstructured":"Brankovic, L., Sir\u00e1n, J.: 2-compromise usability in 1-dimensional statistical databases. In: Ibarra, O.H., Zhang, L. (eds.) COCOON 2002. LNCS, vol. 2387, pp. 448\u2013455. Springer, Heidelberg (2002)"},{"key":"3_CR19","volume-title":"Cryptography and Data Security","author":"DE Denning","year":"1982","unstructured":"Denning, D.E.: Cryptography and Data Security. Addison-Wesley Longman Publishing Co., Inc., Boston (1982)"},{"key":"3_CR20","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1080\/01621459.1986.10478229","volume":"81","author":"GT Duncan","year":"1986","unstructured":"Duncan, G.T., Lambert, D.: Disclosure-limited data dissemination. J. Am. Stat. Assoc. 81, 10\u201328 (1986)","journal-title":"J. Am. Stat. Assoc."},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/3-540-48298-9_41","volume-title":"Data Warehousing and Knowledge Discovery","author":"V Estivill-Castro","year":"1999","unstructured":"Estivill-Castro, V., Brankovic, L.: Data swapping: balancing privacy against precision in mining for logic rules. In: Mohania, M., Tjoa, A.M. (eds.) DaWaK 1999. LNCS, vol. 1676, pp. 389\u2013398. Springer, Heidelberg (1999)"},{"issue":"3","key":"3_CR23","first-page":"33","volume":"9","author":"V Estivill-Castro","year":"1999","unstructured":"Estivill-Castro, V., Brankovic, L., Dowe, D.L.: Privacy in data mining. Privacy - Law Policy Reporter 9(3), 33\u201335 (1999)","journal-title":"Privacy - Law Policy Reporter"},{"issue":"1","key":"3_CR24","doi-asserted-by":"publisher","first-page":"21","DOI":"10.7763\/IJCTE.2015.V7.924","volume":"7","author":"S Fletcher","year":"2015","unstructured":"Fletcher, S., Islam, M.Z.: Measuring information quality for privacy preserving data mining. Int. J. Comput. Theory Eng. 7(1), 21\u201328 (2015)","journal-title":"Int. J. Comput. Theory Eng."},{"issue":"2","key":"3_CR25","first-page":"383","volume":"9","author":"WA Fuller","year":"1993","unstructured":"Fuller, W.A.: Masking procedures for microdata disclosure limitation. J. Off. Stat. 9(2), 383\u2013406 (1993)","journal-title":"J. Off. Stat."},{"issue":"4","key":"3_CR26","doi-asserted-by":"publisher","first-page":"14.2","DOI":"10.1145\/1749603.1749605","volume":"42","author":"CCM Fung","year":"2010","unstructured":"Fung, C.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14.2\u201314.53 (2010)","journal-title":"ACM Comput. Surv."},{"key":"3_CR27","unstructured":"Giggins, H.: Security of genetic databases. Ph.D. Thesis, Newcastle, Australia (2009)"},{"key":"3_CR28","unstructured":"Giggins, H., Brankovic, L.: VICUS - a noise addition technique for categorical data. In: 10th Australasian Data Mining Conference. CRPIT, vol. 134, pp. 139\u2013148 (2012)"},{"key":"3_CR29","first-page":"65","volume":"20","author":"JR Griggs","year":"1997","unstructured":"Griggs, J.R.: Concentrating subset sums at k points. Bull. Inst. Comb. Appl. 20, 65\u201374 (1997)","journal-title":"Bull. Inst. Comb. Appl."},{"key":"3_CR30","unstructured":"Griggs, J.R.: Database security and the distribution of subset sums in $$R^m$$. In: Proceedings of the International Colloquium on Combinatorics and Graph Theory (1998)"},{"issue":"1\u20133","key":"3_CR31","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/S0166-218X(98)00122-X","volume":"91","author":"P Horak","year":"1999","unstructured":"Horak, P., Brankovic, L., Miller, M.: A combinatorial problem in database security. Discrete Appl. Math. 91(1\u20133), 119\u2013126 (1999)","journal-title":"Discrete Appl. Math."},{"key":"3_CR32","unstructured":"Islam, M.Z.: Privacy preservation in data mining through noise addition. Ph.D. Thesis, Newcastle, Australia (2008)"},{"key":"3_CR33","unstructured":"Islam, M.Z., Barnaghi, P.M., Brankovic, L.: Measuring data quality: predictive accuracy vs. similarity of decision trees. In: 6th International Conference on Computer and Information Technology, Dhaka, Bangladesh, pp. 457\u2013462 (2003)"},{"key":"3_CR34","unstructured":"Islam, M.Z., Brankovic, L.: Noise addition for protecting privacy in data mining. In: 6th Engineering Mathematics and Applications Conference, Sydney, pp. 85\u201390 (2003)"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Islam, M.Z., Brankovic, L.: Detective: a decision tree based categorical value clustering and perturbation technique in privacy preserving data mining. In: 3rd International IEEE Conference on Industrial Informatics, Australia, pp. 701\u2013708 (2005)","DOI":"10.1109\/INDIN.2005.1560461"},{"key":"3_CR36","unstructured":"Kim, J.J.: A method for limiting disclosure in microdata based on random noise and transformation. In: Proceedings of the Section on Survey Research Methods, pp. 303\u2013308. American Statistical Association (1986)"},{"key":"3_CR37","unstructured":"Kim, J.J., Winkler, W.E.: Masking microdata files. In: Proceedings of the Section on Survey Research Methods, pp. 114\u2013119. American Statistical Association (1995)"},{"issue":"4","key":"3_CR38","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.ijmedinf.2012.01.005","volume":"81","author":"T King","year":"2012","unstructured":"King, T., Brankovic, L., Gillard, P.: Perspectives of Australian adults about protecting the privacy of their health information in statistical databases. Int. J. Med. Inform. 81(4), 279\u2013289 (2012)","journal-title":"Int. J. Med. Inform."},{"key":"3_CR39","first-page":"313","volume":"9","author":"D Lambert","year":"1993","unstructured":"Lambert, D.: Measures of disclosure risk and harm. J. Off. Stat. 9, 313\u2013331 (1993)","journal-title":"J. Off. Stat."},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: $$t$$-closeness: privacy beyond $$k$$-anonymity and $$l$$-diversity. In: IEEE International Conference on Data Engineering (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"4","key":"3_CR41","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/j.ipm.2013.01.002","volume":"49","author":"N Lopez","year":"2013","unstructured":"Lopez, N., Sebe, F.: Privacy preserving release of blogosphere data in the presence of search engines. Inf. Process. Manage. 49(4), 833\u2013851 (2013)","journal-title":"Inf. Process. Manage."},{"key":"3_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-642-45278-9_26","volume-title":"Combinatorial Algorithms","author":"N L\u00f3pez","year":"2013","unstructured":"L\u00f3pez, N., Seb\u00e9, F.: Degree sequences of pagerank uniform graphs and digraphs with prime outdegrees. In: Lecroq, T., Mouchard, L. (eds.) IWOCA 2013. LNCS, vol. 8288, pp. 303\u2013313. Springer, Heidelberg (2013)"},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: $$l$$-diversity: privacy beyond $$k$$-anonymity. ACM Trans. Knowl. Discov. Data. 1 (2007)","DOI":"10.1145\/1217299.1217302"},{"issue":"2","key":"3_CR44","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/0020-7101(95)01132-X","volume":"40","author":"S Morris","year":"1995","unstructured":"Morris, S., Cooper, J., Bomba, D., Brankovic, L., Miller, M., Pacheco, F.: Australian healthcare: a smart card for a clever country. Int. J. Biomed. Comput. 40(2), 101\u2013105 (1995)","journal-title":"Int. J. Biomed. Comput."},{"issue":"2","key":"3_CR45","first-page":"175","volume":"27","author":"A Oganian","year":"2003","unstructured":"Oganian, A., Domingo-Ferrer, J.: A posteriori disclosure risk measure for tabular data based on conditional entropy. SORT - Stat. Oper. Res. Trans. 27(2), 175\u2013190 (2003)","journal-title":"SORT - Stat. Oper. Res. Trans."},{"key":"3_CR46","unstructured":"Public Use Microdata Sample (PUMS) (2006)"},{"key":"3_CR47","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: $$k$$-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04. SRI Computer Science Laboratory, Palo Alto, CA (1998)"},{"issue":"6","key":"3_CR48","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1109\/TIFS.2013.2253320","volume":"9","author":"L Sankar","year":"2013","unstructured":"Sankar, L., Rajagopalan, S.R., Poor, H.V.: Utility-privacy tradeoffs for databases: an information-theoretic approach. IEEE Trans. Inf. Forensics Secur. 9(6), 838\u2013852 (2013). Special Issue on Privacy and Trust Management in the Cloud and Distributed Data Systems","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"3_CR49","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1111\/1467-9868.00365","volume":"64","author":"CJ Skinner","year":"2002","unstructured":"Skinner, C.J., Elliot, M.J.: A measure of disclosure risk for microdata. J. Roy. Stat. Soc. B 64(4), 855\u2013867 (2002)","journal-title":"J. Roy. Stat. Soc. B"},{"key":"3_CR50","unstructured":"Spruill, N.L.: Measures of Confidentiality, Statistics of Income and Related Administrative Record Research, pp. 131\u2013136 (1982)"},{"key":"3_CR51","doi-asserted-by":"crossref","unstructured":"Sramka, M., Safavi-Naini, R., Denzinger, J., Askari, M.: A Practice-oriented framework for measuring privacy and utility in data sanitization systems. In: EDBT\/ICDT2010 Workshops, Lausanne, Switzerland, pp. 315\u2013333 (2010)","DOI":"10.1145\/1754239.1754270"},{"key":"3_CR52","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/0378-3758(91)90047-I","volume":"27","author":"P Tendick","year":"1991","unstructured":"Tendick, P.: Optimal noise addition for preserving confidentiality in multivariate data. J. Stat. Plan. Inference 27, 341\u2013353 (1991)","journal-title":"J. Stat. Plan. Inference"},{"issue":"5","key":"3_CR53","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1142\/S0218488502001612","volume":"10","author":"M Trottini","year":"2002","unstructured":"Trottini, M., Fienberg, S.E.: Modelling user uncertainty for disclosure risk and data utility. Int. J. Uncertain. Fuzz. Knowl. Based Sys. 10(5), 511\u2013527 (2002)","journal-title":"Int. J. Uncertain. Fuzz. Knowl. Based Sys."},{"key":"3_CR54","doi-asserted-by":"crossref","unstructured":"Truta, T.M., Fotouhi, F., Barth-Jones, D.: Disclosure risk measures for the sampling disclosure control method. In: 2004 ACM symposium on Applied computing (SAC 2004), NY, USA, pp. 301\u2013306 (2004)","DOI":"10.1145\/967900.967964"},{"key":"3_CR55","series-title":"Lecture Notes in Statistics","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-1-4613-0121-9","volume-title":"Elements of Statistical Disclosure Control","author":"L Willenborg","year":"2001","unstructured":"Willenborg, L., de Waal, T.: Elements of Statistical Disclosure Control. Lecture Notes in Statistics, p. 155. Springer-Verlag, New York (2001)"},{"key":"3_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-540-25955-8_18","volume-title":"Privacy in Statistical Databases","author":"WE Winkler","year":"2004","unstructured":"Winkler, W.E.: Masking and re-identification methods for public-use microdata: overview and research problems. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 231\u2013246. Springer, Heidelberg (2004)"},{"key":"3_CR57","unstructured":"Wolberg, W.H., Street, W.N., Mangasarian, O.L.: Wisc. Diag. Breast Can. (1995)"},{"key":"3_CR58","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/3-540-47804-3_11","volume-title":"Inference Control in Statistical Databases","author":"WE Yancey","year":"2002","unstructured":"Yancey, W.E., Winkler, W.E., Creecy, R.H.: Disclosure risk assessment in perturbative microdata protection. In: Domingo-Ferrer, J. (ed.) Inference Control in Statistical Databases. LNCS, vol. 2316, p. 135. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Combinatorial Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19315-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T11:47:15Z","timestamp":1748432835000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19315-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319193144","9783319193151"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19315-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"7 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}