{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T17:54:27Z","timestamp":1758477267047,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319224244"},{"type":"electronic","value":"9783319224251"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22425-1_14","type":"book-chapter","created":{"date-parts":[[2015,8,19]],"date-time":"2015-08-19T14:42:31Z","timestamp":1439995351000},"page":"225-241","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["k-Anonymous Microdata Release via Post Randomisation Method"],"prefix":"10.1007","author":[{"given":"Dai","family":"Ikarashi","sequence":"first","affiliation":[]},{"given":"Ryo","family":"Kikuchi","sequence":"additional","affiliation":[]},{"given":"Koji","family":"Chida","sequence":"additional","affiliation":[]},{"given":"Katsumi","family":"Takahashi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,20]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C.: On unifying privacy and uncertain data models. In: Alonso, G., Blakeley, J.A., Chen, A.L.P.: (eds.) ICDE, pp. 386\u2013395. IEEE (2008)","DOI":"10.1109\/ICDE.2008.4497447"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Buneman, P. (ed.) PODS. ACM (2001)","DOI":"10.1145\/375551.375602"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R., Thomas, D.: Privacy preserving OLAP. In: \u00d6zcan, F. (ed.) SIGMOD Conference, pp. 251\u2013262. ACM (2005)","DOI":"10.1145\/1066157.1066187"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"14_CR5","unstructured":"Kooiman, P., Willenborg, L., Gouweleeuw, J.: PRAM: a method for disclosure limitation of microdata. Reseach report no. 90 (1997)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: Chirkova, R., Dogac, A., \u00d6zsu, M.T., Sellis, T.K. (eds.) ICDE, pp. 106\u2013115. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Lin, B.-R., Wang, Y., Rane, S.: A framework for privacy preserving statistical analysis on distributed databases. In: WIFS, pp. 61\u201366. IEEE (2012)","DOI":"10.1109\/WIFS.2012.6412626"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. In: Liu, L., Reuter, A., Whang, K.-Y., Zhang, J. (eds.) ICDE, p. 24. IEEE Computer Society (2006)","DOI":"10.1109\/ICDE.2006.1"},{"issue":"11","key":"14_CR9","doi-asserted-by":"publisher","first-page":"1623","DOI":"10.1109\/TKDE.2009.190","volume":"22","author":"D Rebollo-Monedero","year":"2010","unstructured":"Rebollo-Monedero, D., Forn\u00e9, J., Domingo-Ferrer, J.: From t-closeness-like privacy to postrandomization via information theory. IEEE Trans. Knowl. Data Eng. 22(11), 1623\u20131636 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"6","key":"14_CR10","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: Mendelzon, A.O, Paredaens, J. (eds.) PODS, p. 188. ACM Press (1998)","DOI":"10.1145\/275487.275508"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Soria-Comas, J., Domingo-Ferrer, J.: Probabilistic k-anonymity through microaggregation and data swapping. In: FUZZ-IEEE, pp. 1\u20138. IEEE (2012)","DOI":"10.1109\/FUZZ-IEEE.2012.6251280"},{"issue":"5","key":"14_CR13","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: $$k$$-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl.-Based Syst."},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Wong, R.C.-W., Li, J., Fu, A.W.-C., Wang, K.: (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: Eliassi-Rad, T., Ungar, L.H., Craven, M., Gunopulos, D. (eds.) KDD, pp. 754\u2013759. ACM (2006)","DOI":"10.1145\/1150402.1150499"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22425-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T16:22:43Z","timestamp":1674836563000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22425-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319224244","9783319224251"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22425-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"20 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}