{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T20:10:04Z","timestamp":1750795804454,"version":"3.41.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319644707"},{"type":"electronic","value":"9783319644714"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64471-4_1","type":"book-chapter","created":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T10:37:25Z","timestamp":1501583845000},"page":"3-17","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Generating k-Anonymous Microdata by Fuzzy Possibilistic Clustering"],"prefix":"10.1007","author":[{"given":"Balkis","family":"Abidi","sequence":"first","affiliation":[]},{"given":"Sadok","family":"Ben Yahia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,2]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Abidi, B., Yahia, S.B.: Multi-pfkcn: a fuzzy possibilistic clustering algorithm based on neural network. In: Proceedings of International Conference on Fuzzy Systems (FUZZ-IEEE 2013), Hyderabad, India, 7\u201310 July 2013, pp. 1\u20138. IEEE (2013)","DOI":"10.1109\/FUZZ-IEEE.2013.6622419"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Abidi, B., Yahia, S.B., Bouzeghoub, A.: A new algorithm for fuzzy clustering able to find the optimal number of clusters. In: Proceedings of 24th International Conference on Tools with Artificial Intelligence, ICTAI 2012, Athens, Greece, November 7\u20139 2012, pp. 806\u2013813. IEEE (2012)","DOI":"10.1109\/ICTAI.2012.174"},{"key":"1_CR3","series-title":"Advances in Database Systems","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-0-387-70992-5_1","volume-title":"Privacy-Preserving Data Mining - Models and Algorithms","author":"CC Aggarwal","year":"2008","unstructured":"Aggarwal, C.C., Yu, P.S.: An introduction to privacy-preserving data mining. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining - Models and Algorithms. Advances in Database Systems, vol. 34, pp. 1\u20139. Springer, Boston (2008)"},{"issue":"5","key":"1_CR4","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1142\/S0218488502001661","volume":"10","author":"J Bacher","year":"2002","unstructured":"Bacher, J., Brand, R., Bender, S.: Re-identifying register data by survey data using cluster analysis: an empirical study. Int. J. Uncertainty Fuzz. Knowl. Based Syst. 10(5), 589\u2013607 (2002)","journal-title":"Int. J. Uncertainty Fuzz. Knowl. Based Syst."},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"5051","DOI":"10.1007\/978-0-387-30440-3_301","volume-title":"Encyclopedia of Complexity and Systems Science","author":"P Berkhin","year":"2009","unstructured":"Berkhin, P., Dhillon, I.S.: Knowledge discovery: clustering. In: Meyers, R.A. (ed.) Encyclopedia of Complexity and Systems Science, pp. 5051\u20135064. Springer, New York (2009)"},{"issue":"6","key":"1_CR6","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1002\/asi.22634","volume":"63","author":"CL Borgman","year":"2012","unstructured":"Borgman, C.L.: The conundrum of sharing research data. J. Am. Soc. Inf. Sci. Technol. (JASIST) 63(6), 1059\u20131078 (2012)","journal-title":"J. Am. Soc. Inf. Sci. Technol. (JASIST)"},{"issue":"11","key":"1_CR7","doi-asserted-by":"publisher","first-page":"1866","DOI":"10.1016\/j.jss.2007.02.014","volume":"80","author":"CC Chang","year":"2007","unstructured":"Chang, C.C., Li, Y.C., Huang, W.H.: Tfrp: An efficient microaggregation algorithm for statistical disclosure control. J. Syst. Softw. 80(11), 1866\u20131878 (2007)","journal-title":"J. Syst. Softw."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Dewri, R., Ray, I., Ray, I., Whitley, D.: On the optimal selection of k in the k-anonymity problem. In: Proceedings of the 24th International Conference on Data Engineering, ICDE 7\u201312 2008, Canc\u00fan, M\u00e9xico, pp. 1364\u20131366. IEEE Computer Society, April 2008","DOI":"10.1109\/ICDE.2008.4497557"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Domigo-Ferrer, J., Solanas, A., Mart\u00ednez-Ballest\u00e9, A.: Privacy in statistical databases: k-anonymity through microaggregation. In: Proceedings oh the IEEE International Conference on Granular Computing, GrC 2006, Atlanta, Georgia, USA, 10\u201312 May 2006, pp. 774\u2013777 (2006)","DOI":"10.1109\/GRC.2006.1635915"},{"issue":"4","key":"1_CR10","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/s00778-006-0007-0","volume":"15","author":"J Domingo-Ferrer","year":"2006","unstructured":"Domingo-Ferrer, J., Mart\u00ednez-Ballest\u00e9, A., Mateo-Sanz, J.M., Seb\u00e9, F.: Efficient multivariate data-oriented microaggregation. VLDB J. 15(4), 355\u2013369 (2006)","journal-title":"VLDB J."},{"issue":"1","key":"1_CR11","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/S0377-0427(03)00643-5","volume":"164\u2013165","author":"J Domingo-Ferrer","year":"2004","unstructured":"Domingo-Ferrer, J., Torra, V.: Disclosure risk assessment in statistical data protection. J. Comput. Appl. Math. 164\u2013165(1), 285\u2013293 (2004)","journal-title":"J. Comput. Appl. Math."},{"issue":"2","key":"1_CR12","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s10618-005-0007-5","volume":"11","author":"J Domingo-Ferrer","year":"2005","unstructured":"Domingo-Ferrer, J., Torra, V.: Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Min. Knowl. Disc. 11(2), 195\u2013212 (2005)","journal-title":"Data Min. Knowl. Disc."},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). doi:10.1007\/11787006_1"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Simson, L.: Garfinkel. De-identification of personal information. Technical report, National Institute of Standards and Technologie (2015)","DOI":"10.6028\/NIST.IR.8053"},{"issue":"3","key":"1_CR15","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1109\/TSMCB.2004.826829","volume":"34","author":"W Hu","year":"2004","unstructured":"Hu, W., Xie, D., Tan, T., Maybank, S.: Learning activity patterns using fuzzy self-organizing neural network. Syst. Man Cybern. Part B 34(3), 1618\u20131626 (2004)","journal-title":"Syst. Man Cybern. Part B"},{"issue":"2\u20133","key":"1_CR16","first-page":"191","volume":"10","author":"R Ehrlich","year":"1984","unstructured":"Ehrlich, R., Bezdek, J., Full, W.: FCM: the fuzzy c-means clustering algorithm. Comput. Geosci. 10(2\u20133), 191\u2013203 (1984)","journal-title":"Comput. Geosci."},{"key":"1_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-56927-2","volume-title":"Self-Organizing Maps, Chap. 3","author":"T Kohonen","year":"2001","unstructured":"Kohonen, T., Schroeder, M.R., Huang, T.S.: Self-Organizing Maps, Chap. 3. Springer, Heidelberg (2001)"},{"issue":"2","key":"1_CR18","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/91.227387","volume":"1","author":"R Krishnapuram","year":"1993","unstructured":"Krishnapuram, R., Keller, J.M.: A possibilistic approach to clustering. IEEE Trans. Fuzzy Syst. 1(2), 98\u2013110 (1993)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, Turkey, 15\u201320 April 2007, pp. 106\u2013115. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"4","key":"1_CR20","doi-asserted-by":"publisher","first-page":"3256","DOI":"10.1016\/j.eswa.2009.09.054","volume":"37","author":"JL Lin","year":"2010","unstructured":"Lin, J.L., Wen, T.H., Hsieh, J.C., Chang, P.C.: Density-based microaggregation for statistical disclosure control. Expert Syst. Appl. 37(4), 3256\u20133263 (2010)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"1_CR21","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Disc. Data (TKDD) 1(1), 3 (2007)","journal-title":"ACM Trans. Knowl. Disc. Data (TKDD)"},{"key":"1_CR22","doi-asserted-by":"crossref","first-page":"345","DOI":"10.3233\/SJU-2001-18409","volume":"18","author":"A Oganian","year":"2001","unstructured":"Oganian, A., Domingo-Ferrer, J.: On the complexity of optimal microaggregation for statistical disclosure control. Stat. J. United Nations Econ. Comission Eur. 18, 345\u2013354 (2001)","journal-title":"Stat. J. United Nations Econ. Comission Eur."},{"issue":"6","key":"1_CR23","first-page":"1701","volume":"57","author":"P Ohm","year":"2010","unstructured":"Ohm, P.: Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Rev. 57(6), 1701\u20131777 (2010)","journal-title":"UCLA Law Rev."},{"issue":"4","key":"1_CR24","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1109\/TFUZZ.2004.840099","volume":"13","author":"NR Pal","year":"2005","unstructured":"Pal, N.R., Pal, K., Keller, J.M., Bezdek, J.C.: A possibilistic fuzzy c-means clustering algorithm. IEEE Trans. Fuzzy Syst. 13(4), 517\u2013530 (2005)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Ramachandran, A., Singh, L., Porter, E., Nagle, F.: Exploring re-identification risks in public domains. In: Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, PST 2012, Paris, France, 16\u201318 July 2012, pp. 35\u201342. IEEE (2012)","DOI":"10.1109\/PST.2012.6297917"},{"issue":"5","key":"1_CR26","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzz. Knowl. Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzz. Knowl. Based Syst."},{"key":"1_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-540-25955-8_14","volume-title":"Privacy in Statistical Databases","author":"V Torra","year":"2004","unstructured":"Torra, V., Miyamoto, S.: Evaluating fuzzy clustering algorithms for microdata protection. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 175\u2013186. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-25955-8_14"},{"key":"1_CR28","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh, L.A.: Fuzzy sets. Inf. Control 8, 338\u2013353 (1965)","journal-title":"Inf. Control"}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64471-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T19:35:12Z","timestamp":1750793712000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-64471-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319644707","9783319644714"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64471-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"2 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DEXA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database and Expert Systems Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lyon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dexa2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/dexa2017","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}