{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:42:50Z","timestamp":1743097370887,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319417059"},{"type":"electronic","value":"9783319417066"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41706-6_4","type":"book-chapter","created":{"date-parts":[[2016,7,2]],"date-time":"2016-07-02T11:54:11Z","timestamp":1467460451000},"page":"96-108","source":"Crossref","is-referenced-by-count":0,"title":["Sharing Data with Guaranteed Privacy"],"prefix":"10.1007","author":[{"given":"Arno","family":"Siebes","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,3]]},"reference":[{"key":"4_CR1","first-page":"307","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"R Agrawal","year":"1996","unstructured":"Agrawal, R., Mannila, H., Srikant, R., Toivonen, A.H., Verkamo, I.: Fast discovery of association rules. In: Usama, M.F., Piatetsky-Shapiro, G., Smyth, P., Uthurusamy, R. (eds.) Advances in Knowledge Discovery and Data Mining, pp. 307\u2013328. AAAI\/MIT Press, Menlo Park (1996)"},{"issue":"6239","key":"4_CR2","doi-asserted-by":"crossref","first-page":"1130","DOI":"10.1126\/science.aaa1160","volume":"348","author":"E Bakshy","year":"2015","unstructured":"Bakshy, E., Messing, S., Adami, L.: Exposure to ideologically diverse news and opinion on Facebook. Science 348(6239), 1130\u20131132 (2015)","journal-title":"Science"},{"key":"4_CR3","volume-title":"Classification and Regression Trees","author":"L Breiman","year":"1984","unstructured":"Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and Regression Trees. Chapman & Hall, Wadsworth (1984)"},{"issue":"1","key":"4_CR4","first-page":"171","volume":"14","author":"T Calders","year":"2007","unstructured":"Calders, T., Goethals, B.: Non-derivable itemset mining. Science 14(1), 171\u2013206 (2007)","journal-title":"Science"},{"key":"4_CR5","volume-title":"Elements of Information Theory","author":"TM Cover","year":"2006","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley, New York (2006)"},{"issue":"6221","key":"4_CR6","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1126\/science.1256297","volume":"347","author":"Y-A Montjoye de","year":"2015","unstructured":"de Montjoye, Y.-A., Radaelli, L., Singh, V.K., Sandy, A.: Pentland: unique in the shopping mall: on the reidentifiability of credit card metadata. Science 347(6221), 536\u2013539 (2015)","journal-title":"Science"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Dong, G., Li, J.: Efficient mining of emerging patterns: discovering trends and differences. In: Fayyad, S.C., Madigan, D., (eds.) Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, CA, USA, 15\u201318 August 1999, pp. 43\u201352 (1999)","DOI":"10.1145\/312129.312191"},{"issue":"3\u20134","key":"4_CR8","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Data Min. Knowl. Disc. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Data Min. Knowl. Disc."},{"key":"4_CR9","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4643.001.0001","volume-title":"The Minimum Description Length Principle","author":"P Gr\u00fcnwald","year":"2007","unstructured":"Gr\u00fcnwald, P.: The Minimum Description Length Principle. MIT Press, Cambridge (2007)"},{"key":"4_CR10","first-page":"47","volume-title":"Handbook of Data Mining and Knowledge Discovery","author":"W Kl\u00f6sgen","year":"2002","unstructured":"Kl\u00f6sgen, W.: Subgroup patterns. In: Kl\u00f6sgen, W., Zytkow, J.M. (eds.) Handbook of Data Mining and Knowledge Discovery, pp. 47\u201351. Oxford University Press, New York (2002)"},{"volume-title":"Privacy, Big Data, the Public Good: Frameworks for Engagement","year":"2015","key":"4_CR11","unstructured":"Lane, J., Stodden, V., Bender, S., Nissenbaum, H. (eds.): Privacy, Big Data, the Public Good: Frameworks for Engagement. Cambridge University Press, New York (2015)"},{"key":"4_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-3860-5","volume-title":"An Introduction to Kolmogorov Complexity and Its Applications","author":"M Li","year":"1993","unstructured":"Li, M., Vit\u00e1nyi, P.: An Introduction to Kolmogorov Complexity and Its Applications. Springer, New York (1993)"},{"issue":"3","key":"4_CR13","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1023\/A:1009796218281","volume":"1","author":"H Mannila","year":"1997","unstructured":"Mannila, H., Toivonen, A.H., Verkamo, I.: Levelwise search and borders of theories in knowledge discovery. Data Min. Knowl. Disc. 1(3), 241\u2013258 (1997)","journal-title":"Data Min. Knowl. Disc."},{"key":"4_CR14","volume-title":"Big Data, A Revolution That Will Transform How We Live, Work and Think","author":"V Mayer-Sch\u00f6nberger","year":"2013","unstructured":"Mayer-Sch\u00f6nberger, V., Cukier, K.: Big Data, A Revolution That Will Transform How We Live, Work and Think. John Murray, London (2013)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: 2008 IEEE Symposium on Security and Privacy (S&P 2008), 18\u201321 May 2008, Oakland, California, USA, pp. 111\u2013125 (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"4_CR16","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (1998)"},{"key":"4_CR17","volume-title":"Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World","author":"B Schneier","year":"2015","unstructured":"Schneier, B.: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W.W. Norton and Company, New York (2015)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1007\/978-3-642-04174-7_25","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"A Siebes","year":"2009","unstructured":"Siebes, A., Puspitaningrum, D.: Mining databases to mine queries faster. In: Buntine, W., Grobelnik, M., Mladeni\u0107, D., Shawe-Taylor, J. (eds.) ECML PKDD 2009, Part II. LNCS, vol. 5782, pp. 382\u2013397. Springer, Heidelberg (2009)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Siebes, A., Vreeken, J., van Leeuwen, M.: Item sets that compress. In: Ghosh, J., Lambert, D., Skillicorn, D.B., Srivastava, J. (eds.) SDM 2006 Proceedings, pp. 393\u2013404. SIAM (2006)","DOI":"10.1137\/1.9781611972764.35"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Smets, K., Vreeken, J.: Slim: directly mining descriptive patterns. In: Ghosh, J., Liu, H., Davidson, I., Domeniconi, C., Kamath, C. (eds.) SDM 2012 Proceedings, pp. 236\u2013247. SIAM (2012)","DOI":"10.1137\/1.9781611972825.21"},{"key":"4_CR21","doi-asserted-by":"crossref","DOI":"10.1201\/b17764","volume-title":"The Science of Computing: Shaping a Discipline","author":"M Tedre","year":"2014","unstructured":"Tedre, M.: The Science of Computing: Shaping a Discipline. CRC Press\/Taylor & Francis, Boca Raton (2014)"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Vreeken, J., van Leeuwen, M., Siebes, A.: Preserving privacy through data generation. In: Ramakrishnan, N., Za\u00efane, O.R., Shi, Y., Clifton, C.W., Wu, X. (eds.) ICDM 2007 Proceedings, pp. 685\u2013690. IEEE (2007)","DOI":"10.1109\/ICDM.2007.25"},{"issue":"1","key":"4_CR23","first-page":"169","volume":"23","author":"J Vreeken","year":"2011","unstructured":"Vreeken, J., van Leeuwen, M., Siebes, A.: Krimp: mining itemsets that compress. Science 23(1), 169\u2013214 (2011)","journal-title":"Science"},{"key":"4_CR24","unstructured":"Wikipedia: Netflix prize (2015). Accessed 31 July 2015"}],"container-title":["Lecture Notes in Computer Science","Solving Large Scale Learning Tasks. Challenges and Algorithms"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41706-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T12:12:58Z","timestamp":1568117578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41706-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319417059","9783319417066"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41706-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}