{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:50:31Z","timestamp":1742975431279,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319735207"},{"type":"electronic","value":"9783319735214"}],"license":[{"start":{"date-parts":[[2017,12,28]],"date-time":"2017-12-28T00:00:00Z","timestamp":1514419200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-73521-4_5","type":"book-chapter","created":{"date-parts":[[2017,12,27]],"date-time":"2017-12-27T09:53:42Z","timestamp":1514368422000},"page":"73-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Introducing ADegree: Anonymisation of Social Networks Through Constraint Programming"],"prefix":"10.1007","author":[{"given":"Sergei","family":"Solonets","sequence":"first","affiliation":[]},{"given":"Victor","family":"Drobny","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Rivera","sequence":"additional","affiliation":[]},{"given":"JooYoung","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,28]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, pp. 181\u2013190. ACM, New York (2007)","DOI":"10.1145\/1242572.1242598"},{"issue":"1","key":"5_CR2","doi-asserted-by":"publisher","first-page":"766","DOI":"10.14778\/1687627.1687714","volume":"2","author":"S Bhagat","year":"2009","unstructured":"Bhagat, S., Cormode, G., Krishnamurthy, B., Srivastava, D.: Class-based graph anonymization for social network data. Proc. VLDB Endow. 2(1), 766\u2013777 (2009)","journal-title":"Proc. VLDB Endow."},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-01718-6_4","volume-title":"Privacy, Security, and Trust in KDD","author":"A Campan","year":"2009","unstructured":"Campan, A., Truta, T.M.: Data and structural k-anonymity in social networks. In: Bonchi, F., Ferrari, E., Jiang, W., Malin, B. (eds.) PInKDD 2008. LNCS, vol. 5456, pp. 33\u201354. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01718-6_4"},{"key":"5_CR4","first-page":"264","volume":"11","author":"P Erd\u0151s","year":"1960","unstructured":"Erd\u0151s, P., Gallai, T.: Graphs with prescribed degrees of vertices. Mat. Lapok 11, 264\u2013274 (1960). Hungarian","journal-title":"Mat. Lapok"},{"key":"5_CR5","unstructured":"Gecode Team: Gecode: Generic constraint development environment (2006). http:\/\/www.gecode.org"},{"issue":"6","key":"5_CR6","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1007\/s00778-010-0210-x","volume":"19","author":"M Hay","year":"2010","unstructured":"Hay, M., Miklau, G., Jensen, D., Towsley, D., Li, C.: Resisting structural re-identification in anonymized social networks. VLDB J. 19(6), 797\u2013823 (2010)","journal-title":"VLDB J."},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-319-60795-5_10","volume-title":"Data Analytics","author":"A Lebedev","year":"2017","unstructured":"Lebedev, A., Lee, J.Y., Rivera, V., Mazzara, M.: Link prediction using top-k shortest distances. In: Cal\u00ec, A., Wood, P., Martin, N., Poulovassilis, A. (eds.) BICOD 2017. LNCS, vol. 10365, pp. 101\u2013105. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60795-5_10"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-1-4614-7163-9_110187-1","volume-title":"Encyclopedia of Social Network Analysis and Mining","author":"JY Lee","year":"2017","unstructured":"Lee, J.Y., Oh, J.C.: Agent perspective social networks: distributed second degree estimation. In: Alhajj, R., Rokne, J. (eds.) Encyclopedia of Social Network Analysis and Mining, pp. 1\u201312. Springer, New York (2017). https:\/\/doi.org\/10.1007\/978-1-4614-7163-9_110187-1"},{"key":"5_CR9","unstructured":"Lee, J.Y.: Reputation computation in social networks and its applications (2014)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Lee, J.Y., Lopatin, K., Hussain, R., Nawaz, W.: Evolution of friendship: a case study of mobiClique. In: Proceedings of the Computing Frontiers Conference, pp. 267\u2013270. ACM (2017)","DOI":"10.1145\/3075564.3075595"},{"key":"5_CR11","series-title":"Lecture Notes in Social Networks","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-19003-7_1","volume-title":"Applications of Social Media and Social Network Analysis","author":"JY Lee","year":"2015","unstructured":"Lee, J.Y., Oh, J.C.: A node-centric reputation computation algorithm on online social networks. In: Kazienko, P., Chawla, N. (eds.) Applications of Social Media and Social Network Analysis. LNSN, pp. 1\u201322. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19003-7_1"},{"key":"5_CR12","unstructured":"Liu, C., Mittal, P.: Linkmirage: How to anonymize links in dynamic social systems. CoRR, abs\/1501.01361 (2015)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, pp. 93\u2013106. ACM, New York (2008)","DOI":"10.1145\/1376616.1376629"},{"key":"5_CR14","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-3926-3.ch005","volume-title":"Social Networks and Collective Intelligence: A Return to the Agora","author":"M Mazzara","year":"2013","unstructured":"Mazzara, M., Biselli, L., Greco, P.P., Dragoni, N., Marraffa, A., Qamar, N., de Nicola, S.: Social Networks and Collective Intelligence: A Return to the Agora. IGI Global, Hershey (2013)"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, SP 2009, pp. 173\u2013187. IEEE Computer Society, Washington (2009)","DOI":"10.1109\/SP.2009.22"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-319-31875-2_12","volume-title":"Information Security Applications","author":"BP Nguyen","year":"2016","unstructured":"Nguyen, B.P., Ngo, H., Kim, J., Kim, J.: Publishing graph data with subgraph differential privacy. In: Kim, H., Choi, D. (eds.) WISA 2015. LNCS, vol. 9503, pp. 134\u2013145. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31875-2_12"},{"key":"5_CR17","volume-title":"Handbook of Constraint Programming (Foundations of Artificial Intelligence)","author":"F Rossi","year":"2006","unstructured":"Rossi, F., van Beek, P., Walsh, T.: Handbook of Constraint Programming (Foundations of Artificial Intelligence). Elsevier Science Inc., New York (2006)"},{"key":"5_CR18","unstructured":"Solonets, S.: Adegree constraint implementation (2017). https:\/\/github.com\/Solonets\/ADegree"},{"issue":"5","key":"5_CR19","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, ICDE 2008, pp. 506\u2013515. IEEE Computer Society, Washington (2008)","DOI":"10.1109\/ICDE.2008.4497459"},{"issue":"1","key":"5_CR21","first-page":"946","volume":"2","author":"L Zou","year":"2009","unstructured":"Zou, L., Chen, L., Tamer \u00d6zsu, M.: K-automorphism: a general framework for privacy preserving network publication. PVLDB 2(1), 946\u2013957 (2009)","journal-title":"PVLDB"}],"container-title":["Lecture Notes in Computer Science","Mobility Analytics for Spatio-Temporal and Social Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-73521-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:20:56Z","timestamp":1709832056000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-73521-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,28]]},"ISBN":["9783319735207","9783319735214"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-73521-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017,12,28]]},"assertion":[{"value":"28 December 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MATES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Mobility Analytics for Spatio-temporal and Social Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"massd2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ai-group.ds.unipi.gr\/mates17\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}