{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:28:16Z","timestamp":1742912896947,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319241289"},{"type":"electronic","value":"9783319241296"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24129-6_17","type":"book-chapter","created":{"date-parts":[[2015,9,3]],"date-time":"2015-09-03T07:55:33Z","timestamp":1441266933000},"page":"195-200","source":"Crossref","is-referenced-by-count":0,"title":["Conceptualization of Personalized Privacy Preserving Algorithms"],"prefix":"10.1007","author":[{"given":"Buket","family":"Usenmez","sequence":"first","affiliation":[]},{"given":"Ozgu","family":"Can","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,3]]},"reference":[{"key":"17_CR1","unstructured":"Boillat P., Kjaerum M.: Handbook on European data protection law (2014). http:\/\/www.echr.coe.int\/Documents\/Handbook_data_protection_ENG.pdf"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Ciriani V., De Capitani di Vimercati S., Foresti S., Samarati P.: k-Anonymity. In: Advances in Information Security (2007)","DOI":"10.1002\/9780470050118.ecse096"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-Diversity: Privacy Beyond k-Anonymity. ACM Transactions on Knowledge Discovery from Data 1(1), Article 3 (2007)","DOI":"10.1145\/1217299.1217302"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Li N., Li T., Venkatasubramanian S: t-closeness: privacy beyond k-anonymity and l-diversity. In: ICDE Conference 2007 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Sarathy, R., Muralidhar, K.: Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data. Transactions on Data Privacy 4 (2011)","DOI":"10.1007\/978-3-642-15838-4_19"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Aggarwal, C., Yu, P.: Privacy-Preserving Data Mining : Models and Algorithms. Springer Publishing (2008). ISBN:0387709916 9780387709918","DOI":"10.1007\/978-0-387-70992-5"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Agrawal R., Srikant R.: Privacy preserving data mining. In: Proceedings of the ACM SIGMOID Conference (2000)","DOI":"10.1145\/342009.335438"},{"issue":"5","key":"17_CR9","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-Anonymity: A model for protecting privacy. Int. Journal on Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557\u2013570 (2002)","journal-title":"Int. Journal on Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Wong, R., Li, J., Fu, A., Wang, K.: ( $${\\alpha }$$ , k)-anonymity: an enhanced k-anonymity model for privacy-preserving data publishing. In: Proceedings of the 12th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 754\u2013759 (2006)","DOI":"10.1145\/1150402.1150499"},{"key":"17_CR11","unstructured":"Fraser R., Willison D.: Tools for De-Identification of Personal Health Information. Pan Canadian Health Information (HIP) Group (2009)"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-540-77018-3_8","volume-title":"Emerging Technologies in Knowledge Discovery and Data Mining","author":"HW Jin","year":"2007","unstructured":"Jin, H.W.: Practical issues on privacy-preserving health data mining. In: Washio, T., Zhou, Z.-H., Huang, J.Z., Hu, X., Li, J., Xie, C., He, J., Zou, D., Li, K.-C., Freire, M.M. (eds.) PAKDD 2007. LNCS (LNAI), vol. 4819, pp. 64\u201375. Springer, Heidelberg (2007)"},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.jbi.2014.06.002","volume":"50","author":"A Divanis","year":"2014","unstructured":"Divanis, A., et al.: Publishing data from electronic health records while preserving privacy: A survey of algorithms. J. of Biomedical Informatics 50, 4\u201319 (2014)","journal-title":"J. of Biomedical Informatics"},{"key":"17_CR14","unstructured":"Qin, J., Li, X.: A framework for privacy preserving medical document sharing. In: Thirty Fourth Int. Conf. on Information Systems (2013)"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Personalized privacy preservation. In: ACM SIGMOD Int. Conf. on Management of Data, pp. 229\u2013240 (2006)","DOI":"10.1145\/1142473.1142500"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Omran, E., Bokma, A., Abu-Almaati, S.: A k-anonymity based semantic model for protecting personal information and privacy. In: IEEE Int. Advance Computing Conference (2009)","DOI":"10.1109\/IADCC.2009.4809229"}],"container-title":["Communications in Computer and Information Science","Metadata and Semantics Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24129-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,13]],"date-time":"2023-08-13T18:00:56Z","timestamp":1691949656000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24129-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319241289","9783319241296"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24129-6_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]}}}