{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:15:33Z","timestamp":1742976933907,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319678153"},{"type":"electronic","value":"9783319678160"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67816-0_8","type":"book-chapter","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T06:43:16Z","timestamp":1505198596000},"page":"124-142","source":"Crossref","is-referenced-by-count":2,"title":["$$\\delta $$-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining"],"prefix":"10.1007","author":[{"given":"Zhizhou","family":"Li","sequence":"first","affiliation":[]},{"given":"Ten H.","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"issue":"2","key":"8_CR1","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/335191.335438","volume":"29","author":"R Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. SIGMOD Rec. 29(2), 439\u2013450 (2000). http:\/\/doi.acm.org\/10.1145\/335191.335438","journal-title":"SIGMOD Rec."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Brenner, H., Nissim, K.: Impossibility of differentially private universally optimal mechanisms. In: FOCS, pp. 71\u201380. IEEE Computer Society (2010)","DOI":"10.1109\/FOCS.2010.13"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Brickell, J., Shmatikov, V.: The cost of privacy: destruction of data-mining utility in anonymized data publishing. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008, pp. 70\u201378. ACM, New York (2008)","DOI":"10.1145\/1401890.1401904"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Cormode, G., Procopiuc, C., Shen, E., Srivastava, D., Yu, T.: Empirical privacy and empirical utility of anonymized data. In: 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW), pp. 77\u201382, April 2013","DOI":"10.1109\/ICDEW.2013.6547431"},{"key":"8_CR5","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49244-5","volume-title":"Introduction to Cryptography - Principles and Applications","author":"H Delfs","year":"2007","unstructured":"Delfs, H., Knebl, H.: Introduction to Cryptography - Principles and Applications. Information Security and Cryptography. Springer, Heidelberg (2007)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-79228-4_1"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). doi: 10.1007\/11681878_14"},{"issue":"1","key":"8_CR8","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1136\/amiajnl-2012-001047","volume":"20","author":"C Dwork","year":"2013","unstructured":"Dwork, C., Pottenger, R.: Toward practicing privacy. J. Am. Med. Inform. Assoc. 20(1), 102\u2013108 (2013). http:\/\/jamia.bmj.com\/content\/20\/1\/102.abstract","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008, pp. 265\u2013273. ACM, NY, USA (2008). http:\/\/doi.acm.org\/10.1145\/1401890.1401926","DOI":"10.1145\/1401890.1401926"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. In: Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, STOC 2009, pp. 351\u2013360. ACM, NY, USA (2009). http:\/\/doi.acm.org\/10.1145\/1536414.1536464","DOI":"10.1145\/1536414.1536464"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Gupte, M., Sundararajan, M.: Universally optimal privacy mechanisms for minimax agents. In: Proceedings of the Twenty-ninth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2010, pp. 135\u2013146. ACM, NY, USA (2010). http:\/\/doi.acm.org\/10.1145\/1807085.1807105","DOI":"10.1145\/1807085.1807105"},{"key":"8_CR12","series-title":"Chapman & Hall\/Crc Cryptography and Network Security Series","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010756","volume-title":"Introduction to Modern Cryptography","author":"J Katz","year":"2007","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall\/Crc Cryptography and Network Security Series. Chapman & Hall\/CRC, Boca Raton (2007)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T.: t-closeness: Privacy beyond k-anonymity and -diversity. In: Proceedings of IEEE 23rd International Conference on Data Engineering (ICDE 2007) (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Li, T., Li, N.: On the tradeoff between privacy and utility in data publishing. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD \u201909, pp. 517\u2013526. ACM, NY, USA (2009). http:\/\/doi.acm.org\/10.1145\/1557019.1557079","DOI":"10.1145\/1557019.1557079"},{"issue":"1","key":"8_CR15","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/18.61115","volume":"37","author":"J Lin","year":"1991","unstructured":"Lin, J.: Divergence measures based on the shannon entropy. IEEE Trans. Inform. Theory 37(1), 145\u2013151 (1991)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-44598-6_3","volume-title":"Advances in Cryptology \u2014 CRYPTO 2000","author":"Y Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36\u201354. Springer, Heidelberg (2000). doi: 10.1007\/3-540-44598-6_3"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, p. 24 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"McSherry, F., Mironov, I.: Differentially private recommender systems: Building privacy into the net. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2009, pp. 627\u2013636. ACM, NY, USA (2009). http:\/\/doi.acm.org\/10.1145\/1557019.1557090","DOI":"10.1145\/1557019.1557090"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, pp. 19\u201330. ACM, NY, USA (2009). http:\/\/doi.acm.org\/10.1145\/1559845.1559850","DOI":"10.1145\/1559845.1559850"},{"key":"8_CR20","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.future.2013.01.001","volume":"33","author":"J Parra-Arnau","year":"2014","unstructured":"Parra-Arnau, J., Rebollo-Monedero, D., Forn, J.: Measuring the privacy of user profiles in personalized information systems. Future Gener. Comput. Syst. 33, 53\u201363 (2014). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X1300006X , special Section on Applications of Intelligent Data and Knowledge Processing Technologies; Guest Editor: Dominik lzak","journal-title":"Future Gener. Comput. Syst."},{"issue":"8","key":"8_CR21","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/TSE.2013.6","volume":"39","author":"F Peters","year":"2013","unstructured":"Peters, F., Menzies, T., Gong, L., Zhang, H.: Balancing privacy and utility in cross-company defect prediction. IEEE Trans. Softw. Eng. 39(8), 1054\u20131068 (2013)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"8_CR22","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s10207-012-0182-5","volume":"12","author":"D Rebollo-Monedero","year":"2013","unstructured":"Rebollo-Monedero, D., Parra-Arnau, J., Diaz, C., Forn, J.: On the measurement of privacy as an attackers estimation error. Int. J. Inf. Secur. 12(2), 129\u2013149 (2013). http:\/\/dx.doi.org\/10.1007\/s10207-012-0182-5","journal-title":"Int. J. Inf. Secur."},{"issue":"5","key":"8_CR23","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557\u2013570 (2002). http:\/\/dx.doi.org\/10.1142\/S0218488502001648","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"8_CR24","series-title":"Advances in Database Systems","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5_4","volume-title":"Privacy-Preserving Data Mining","author":"S Venkatasubramanian","year":"2008","unstructured":"Venkatasubramanian, S.: Measures of anonymity. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining. ADBS, vol. 34. Springer, Boston (2008). doi: 10.1007\/978-0-387-70992-5_4"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67816-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T06:45:35Z","timestamp":1570085135000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67816-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319678153","9783319678160"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67816-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}