{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:43:26Z","timestamp":1742989406309,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319626970"},{"type":"electronic","value":"9783319626987"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-62698-7_34","type":"book-chapter","created":{"date-parts":[[2017,7,11]],"date-time":"2017-07-11T01:56:44Z","timestamp":1499738204000},"page":"410-423","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["P-IRON for Privacy Preservation in Data Mining"],"prefix":"10.1007","author":[{"given":"G.","family":"Arumugam","sequence":"first","affiliation":[]},{"given":"V.","family":"Jane Varamani Sulekha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,12]]},"reference":[{"issue":"6","key":"34_CR1","doi-asserted-by":"publisher","first-page":"555","DOI":"10.4304\/jsw.4.6.555-562","volume":"4","author":"MN Dehkordi","year":"2009","unstructured":"Dehkordi, M.N., Badie, K., Zadeh, A.K.: A novel method for privacy preserving in association rule mining based on genetic algorithms. JSW 4(6), 555\u2013562 (2009)","journal-title":"JSW"},{"key":"34_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-44598-6_3","volume-title":"Advances in Cryptology \u2014 CRYPTO 2000","author":"Y Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36\u201354. Springer, Heidelberg (2000). doi:10.1007\/3-540-44598-6_3"},{"issue":"2","key":"34_CR3","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/335191.335438","volume":"29","author":"R Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM SIGMOD Rec. 29(2), 439\u2013450 (2000). ACM","journal-title":"ACM SIGMOD Rec."},{"issue":"10","key":"34_CR4","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.1287\/mnsc.45.10.1399","volume":"45","author":"K Muralidhar","year":"1999","unstructured":"Muralidhar, K., Parsa, R., Sarathy, R.: A general additive data perturbation method for database security. Manage. Sci. 45(10), 1399\u20131415 (1999)","journal-title":"Manage. Sci."},{"key":"34_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-540-24741-8_12","volume-title":"Advances in Database Technology - EDBT 2004","author":"CC Aggarwal","year":"2004","unstructured":"Aggarwal, C.C., Yu, P.S.: A condensation approach to privacy preserving data mining. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B\u00f6hm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 183\u2013199. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-24741-8_12"},{"key":"34_CR6","unstructured":"Chen, K., Liu, L.: A random rotation perturbation approach to privacy preserving data classification (2005)"},{"issue":"1","key":"34_CR7","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TKDE.2006.14","volume":"18","author":"K Liu","year":"2006","unstructured":"Liu, K., Kargupta, H., Ryan, J.: Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18(1), 92\u2013106 (2006)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Chen, K., Sun, G., Liu, L.: Towards attack-resilient geometric data perturbation. In: Proceedings of the 2007 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics (2007)","DOI":"10.1137\/1.9781611972771.8"},{"issue":"1","key":"34_CR9","first-page":"37","volume":"1","author":"SRM Oliveira","year":"2010","unstructured":"Oliveira, S.R.M., Zaiane, O.R.: Privacy preserving clustering by data transformation. J. Inf. Data Manag. 1(1), 37 (2010)","journal-title":"J. Inf. Data Manag."},{"key":"34_CR10","first-page":"28","volume":"2","author":"TS Gal","year":"2008","unstructured":"Gal, T.S., Chen, Z., Gangopadhyay, A.: A privacy protection model for patient data with multiple sensitive attributes. IGI Glob. 2, 28 (2008)","journal-title":"IGI Glob."},{"key":"34_CR11","volume-title":"Handbook of Database Security, 431\u2013460","author":"CC Aggarwal","year":"2008","unstructured":"Aggarwal, C.C., Yu, P.S.: Privacy-preserving data mining: a survey. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security, 431\u2013460. Springer, New York (2008)"},{"issue":"1","key":"34_CR12","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J.M.: Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans. Knowl. Data Eng. 14(1), 189\u2013201 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"34_CR13","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/s00778-006-0007-0","volume":"15","author":"J Domingo-Ferrer","year":"2006","unstructured":"Domingo-Ferrer, J., et al.: Efficient multivariate data-oriented microaggregation. The VLDB J. Int. J. Very Large Data Bases 15(4), 355\u2013369 (2006)","journal-title":"The VLDB J. Int. J. Very Large Data Bases"},{"issue":"4","key":"34_CR14","first-page":"345","volume":"18","author":"A Oganian","year":"2001","unstructured":"Oganian, A., Domingo-Ferrer, J.: On the complexity of optimal microaggregation for statistical disclosure control. Stat. J. U. N. Econ. Comm. Eur. 18(4), 345\u2013353 (2001)","journal-title":"Stat. J. U. N. Econ. Comm. Eur."},{"key":"34_CR15","unstructured":"Solanas, A., Martinez-Balleste, A., Domingo-Ferrer, J.: V-MDAV: a multivariate microaggregation with variable group size. In: Proceedings of the 17th COMPSTAT Symposium of the IASC, Rome (2006)"},{"issue":"4","key":"34_CR16","doi-asserted-by":"publisher","first-page":"3256","DOI":"10.1016\/j.eswa.2009.09.054","volume":"37","author":"J-L Lin","year":"2010","unstructured":"Lin, J.-L., et al.: Density-based microaggregation for statistical disclosure control. Expert Syst. Appl. 37(4), 3256\u20133263 (2010)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"34_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/19393555.2010.515288","volume":"20","author":"ME Kabir","year":"2011","unstructured":"Kabir, M.E., Wang, H.: Microdata protection method through microaggregation: a median-based approach. Inf. Secur. J. Glob. Perspect. 20(1), 1\u20138 (2011)","journal-title":"Inf. Secur. J. Glob. Perspect."},{"issue":"11","key":"34_CR18","doi-asserted-by":"publisher","first-page":"3098","DOI":"10.1109\/TKDE.2015.2435777","volume":"27","author":"J Soria-Comas","year":"2015","unstructured":"Soria-Comas, J., et al.: T-Closeness through microaggregation: strict privacy with enhanced utility preservation. IEEE Trans. Knowl. Data Eng. 27(11), 3098\u20133110 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"34_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.inffus.2015.11.002","volume":"30","author":"D S\u00e1nchez","year":"2016","unstructured":"S\u00e1nchez, D., et al.: Utility-preserving differentially private data releases via individual ranking microaggregation. Inf. Fusion 30, 1\u201314 (2016)","journal-title":"Inf. Fusion"},{"key":"34_CR20","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.jbi.2014.01.001","volume":"50","author":"TS Gal","year":"2014","unstructured":"Gal, T.S., et al.: A data recipient centered de-identification method to retain statistical attributes. J. Biomed. Inform. 50, 32\u201345 (2014)","journal-title":"J. Biomed. Inform."},{"key":"34_CR21","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2000","unstructured":"Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers, San Francisco (2000)"},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"Arumugam, G., Sulekha, V.: IMR based anonymization for privacy preservation in data mining. In: Proceedings of the 11th International Knowledge Management in Organizations Conference on the Changing Face of Knowledge Management Impacting Society. ACM (2016)","DOI":"10.1145\/2925995.2926005"},{"key":"34_CR23","doi-asserted-by":"publisher","first-page":"165","DOI":"10.2307\/2528688","volume":"25","author":"D Wishart","year":"1969","unstructured":"Wishart, D.: 256. Note: an algorithm for hierarchical classifications. Biometrics 25, 165\u2013170 (1969)","journal-title":"Biometrics"},{"key":"34_CR24","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.ins.2013.07.004","volume":"250","author":"J Soria-Comas","year":"2013","unstructured":"Soria-Comas, J., Domingo-Ferrer, J.: Optimal data-independent noise for differential privacy. Inf. Sci. 250, 200\u2013214 (2013)","journal-title":"Inf. Sci."}],"container-title":["Communications in Computer and Information Science","Knowledge Management in Organizations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-62698-7_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:04:35Z","timestamp":1709820275000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-62698-7_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319626970","9783319626987"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-62698-7_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"12 July 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KMO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Management in Organizations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"kmo2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/derrickting.org\/kmo2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}