{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:52:37Z","timestamp":1757310757212},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319476490"},{"type":"electronic","value":"9783319476506"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47650-6_21","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T17:32:26Z","timestamp":1475602346000},"page":"262-274","source":"Crossref","is-referenced-by-count":2,"title":["Automatic Construction of Generalization Hierarchies for Publishing Anonymized Data"],"prefix":"10.1007","author":[{"given":"Vanessa","family":"Ayala-Rivera","sequence":"first","affiliation":[]},{"given":"Liam","family":"Murphy","sequence":"additional","affiliation":[]},{"given":"Christina","family":"Thorpe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"unstructured":"Chicago Homicides. https:\/\/data.cityofchicago.org","key":"21_CR1"},{"unstructured":"Insurance. https:\/\/github.com\/ucd-pel\/Datasets\/tree\/master\/Insurance","key":"21_CR2"},{"unstructured":"UTD ToolBox. http:\/\/cs.utdallas.edu\/dspl\/cgi-bin\/toolbox\/","key":"21_CR3"},{"unstructured":"WS4J library. https:\/\/code.google.com\/p\/ws4j\/","key":"21_CR4"},{"issue":"3","key":"21_CR5","first-page":"337","volume":"7","author":"V Ayala-Rivera","year":"2014","unstructured":"Ayala-Rivera, V., McDonagh, P., Cerqueus, T., Murphy, L.: A systematic comparison and evaluation of k -anonymization algorithms for practitioners. Trans. Data Priv. 7(3), 337\u2013370 (2014)","journal-title":"Trans. Data Priv."},{"unstructured":"Ayala-Rivera, V., McDonagh, P., Cerqueus, T., Murphy, L.: Ontology-based quality evaluation of value generalization hierarchies for data anonymization. In: PSD (2014)","key":"21_CR6"},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/3-540-45715-1_11","volume-title":"Computational Linguistics and Intelligent Text Processing","author":"S Banerjee","year":"2002","unstructured":"Banerjee, S., Pedersen, T.: An adapted lesk algorithm for word sense disambiguation using WordNet. In: Gelbukh, A. (ed.) CICLing 2002. LNCS, vol. 2276, pp. 136\u2013145. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45715-1_11"},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-23556-6_2","volume-title":"Secure Data Management","author":"A Campan","year":"2011","unstructured":"Campan, A., Cooper, N., Truta, T.M.: On-the-fly generalization hierarchies for numerical attributes revisited. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2011. LNCS, vol. 6933, pp. 18\u201332. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-23556-6_2"},{"key":"21_CR9","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.websem.2011.08.005","volume":"11","author":"M D\u2019Aquin","year":"2012","unstructured":"D\u2019Aquin, M., Natalya, N.F.: Where to publish and find ontologies? A survey of ontology libraries. Web Semant. (online) 11, 96\u2013111 (2012)","journal-title":"Web Semant. (online)"},{"key":"21_CR10","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.ins.2013.04.021","volume":"242","author":"J Domingo-Ferrer","year":"2013","unstructured":"Domingo-Ferrer, J., S\u00e1nchez, D., Rufian-Torrell, G.: Anonymization of nominal data based on semantic marginality. Inf. Sci. 242, 35\u201348 (2013)","journal-title":"Inf. Sci."},{"doi-asserted-by":"crossref","unstructured":"Kr\u00f6ll, M., Fukazawa, Y., Ota, J., Strohmaier, M.: Concept hierarchies of health-related human goals. In: KSEM, pp. 124\u2013135 (2011)","key":"21_CR11","DOI":"10.1007\/978-3-642-25975-3_12"},{"issue":"3","key":"21_CR12","doi-asserted-by":"crossref","first-page":"1132","DOI":"10.1016\/j.eswa.2007.08.042","volume":"35","author":"S Lee","year":"2008","unstructured":"Lee, S., Huh, S.-Y., McNiel, R.D.: Automatic generation of concept hierarchies using WordNet. Expert Syst. Appl. 35(3), 1132\u20131144 (2008)","journal-title":"Expert Syst. Appl."},{"doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: International Conference on Management of Data, pp. 49\u201360 (2005)","key":"21_CR13","DOI":"10.1145\/1066157.1066164"},{"unstructured":"Lichman, M.: UCI Machine Learning Repository (2013)","key":"21_CR14"},{"key":"21_CR15","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.inffus.2011.03.004","volume":"13","author":"S Mart\u00ednez","year":"2012","unstructured":"Mart\u00ednez, S., S\u00e1nchez, D., Valls, A., Batet, M.: Privacy protection of textual attributes through a semantic-based masking method. Inf. Fusion 13, 304\u2013314 (2012)","journal-title":"Inf. Fusion"},{"issue":"1","key":"21_CR16","first-page":"1","volume":"6","author":"L Meng","year":"2013","unstructured":"Meng, L., Huang, R., Gu, J.: A review of semantic similarity measures in WordNet. Int. J. Hybrid Inf. Technol. 6(1), 1\u201312 (2013)","journal-title":"Int. J. Hybrid Inf. Technol."},{"key":"21_CR17","first-page":"83","volume":"24","author":"K Peffers","year":"2006","unstructured":"Peffers, K., Tuunanen, T., Gengler, C.E., Rossi, M., Hui, W., Virtanen, V., Bragge, J.: The design science research process: a model for producing and presenting information systems research. DESRIST 24, 83\u2013106 (2006)","journal-title":"DESRIST"},{"doi-asserted-by":"crossref","unstructured":"Portillo-Dominguez, A.O., Wang, M., Magoni, D., Perry, P., Murphy, J.: Load balancing of java applications by forecasting garbage collections. In: ISPDC (2014)","key":"21_CR18","DOI":"10.1109\/ISPDC.2014.20"},{"key":"21_CR19","first-page":"89","volume":"39","author":"D S\u00e1nchez","year":"2015","unstructured":"S\u00e1nchez, D., Batet, M., Mart\u00ednez, S., Domingo-Ferrer, J.: Semantic variance: an intuitive measure for ontology accuracy evaluation. EAAI 39, 89\u201399 (2015)","journal-title":"EAAI"},{"key":"21_CR20","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.knosys.2013.10.015","volume":"55","author":"A Sol\u00e9-Ribalta","year":"2014","unstructured":"Sol\u00e9-Ribalta, A., S\u00e1nchez, D., Batet, M., Serratosa, F.: Towards the estimation of feature-based semantic similarity using multiple ontologies. Knowl. Based Syst. 55, 101\u2013113 (2014)","journal-title":"Knowl. Based Syst."},{"issue":"05","key":"21_CR21","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(05), 571\u2013588 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"21_CR22","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-642-15280-1_12","volume-title":"Knowledge Science, Engineering and Management","author":"Y Wang","year":"2010","unstructured":"Wang, Y., Liu, W., Bell, D.: A concept hierarchy based ontology mapping approach. In: Bi, Y., Williams, M.-A. (eds.) KSEM 2010. LNCS (LNAI), vol. 6291, pp. 101\u2013113. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15280-1_12"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47650-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T04:07:03Z","timestamp":1568434023000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47650-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319476490","9783319476506"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47650-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}