{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:00:27Z","timestamp":1742947227538,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319920153"},{"type":"electronic","value":"9783319920160"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92016-0_19","type":"book-chapter","created":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T13:54:16Z","timestamp":1526910856000},"page":"200-210","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards String Sanitization"],"prefix":"10.1007","author":[{"given":"Oluwole","family":"Ajala","sequence":"first","affiliation":[]},{"given":"Hayam","family":"Alamro","sequence":"additional","affiliation":[]},{"given":"Costas","family":"Iliopoulos","sequence":"additional","affiliation":[]},{"given":"Grigorios","family":"Loukides","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,22]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Abul, O., Bonchi, F., Nanni, M.: Never walk alone: uncertainty for anonymity in moving objects databases. In: ICDE, pp. 376\u2013385 (2008)","DOI":"10.1109\/ICDE.2008.4497446"},{"issue":"12","key":"19_CR2","first-page":"1709","volume":"22","author":"O Abul","year":"2010","unstructured":"Abul, O., Bonchi, F., Giannotti, F.: Hiding sequential and spatiotemporal patterns. TKDE 22(12), 1709\u20131723 (2010)","journal-title":"TKDE"},{"issue":"6","key":"19_CR3","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"A Aho","year":"1975","unstructured":"Aho, A., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Commun. ACM 18(6), 333\u2013340 (1975)","journal-title":"Commun. ACM"},{"issue":"11","key":"19_CR4","first-page":"1087","volume":"4","author":"R Chen","year":"2011","unstructured":"Chen, R., Mohammed, N., Fung, B.C.M., Desai, B.C., Xiong, L.: Publishing set-valued data via differential privacy. PVLDB 4(11), 1087\u20131098 (2011)","journal-title":"PVLDB"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Cormode, G., Karloff, H., Wirth, A.: Set cover algorithms for very large datasets. In: CIKM, pp. 479\u2013488 (2010)","DOI":"10.1145\/1871437.1871501"},{"key":"19_CR6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546853","volume-title":"Algorithm on Strings","author":"M Crochemore","year":"2007","unstructured":"Crochemore, M., Hancart, C., Lecroc, T.: Algorithm on Strings. Cambridge University Press, Cambridge (2007)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Gkoulalas-Divanis, A., Loukides, G.: Revisiting sequential pattern hiding to enhance utility. In: KDD, pp. 1316\u20131324 (2011)","DOI":"10.1145\/2020408.2020605"},{"issue":"1","key":"19_CR9","first-page":"223","volume":"5","author":"A Gkoulalas-Divanis","year":"2012","unstructured":"Gkoulalas-Divanis, A., Loukides, G.: Utility-guided clustering-based transaction data anonymization. Trans. Data Priv. 5(1), 223\u2013251 (2012)","journal-title":"Trans. Data Priv."},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"G\u00f6tz, M., Nath, S., Gehrke, J.: MaskIt: privately releasing user context streams for personalized mobile applications. In: SIGMOD, pp. 289\u2013300 (2012)","DOI":"10.1145\/2213836.2213870"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Gwadera, R., Gkoulalas-Divanis, A., Loukides, G.: Permutation-based sequential pattern hiding. In: ICDM, pp. 241\u2013250 (2013)","DOI":"10.1109\/ICDM.2013.57"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"He, Y., Barman, S., Wang, D., Naughton, J.F.: On the complexity of privacy-preserving complex event processing. In: PODS, pp. 165\u2013174 (2011)","DOI":"10.1145\/1989284.1989304"},{"key":"19_CR13","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1137\/1.9781611974010.87","volume-title":"Proceedings of the 2015 SIAM International Conference on Data Mining","author":"Grigorios Loukides","year":"2015","unstructured":"Loukides, G., Gwadera, R.: Optimal event sequence sanitization. In: Proceedings of the 2015 SIAM International Conference on Data Mining, pp. 775\u2013783 (2015)"},{"issue":"2","key":"19_CR14","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s10506-014-9154-6","volume":"22","author":"A Monreale","year":"2014","unstructured":"Monreale, A., Pedreschi, D., Pensa, R.G., Pinelli, F.: Anonymity preserving sequential pattern mining. Artif. Intell. Law 22(2), 141\u2013173 (2014)","journal-title":"Artif. Intell. Law"},{"key":"19_CR15","unstructured":"Oliveira, S.R.M., Za\u00efane, O.R.: Protecting sensitive knowledge by data sanitization. In: ICDM, pp. 211\u2013218 (2003)"},{"issue":"2","key":"19_CR16","first-page":"165","volume":"7","author":"G Poulis","year":"2014","unstructured":"Poulis, G., Skiadopoulos, S., Loukides, G., Gkoulalas-Divanis, A.: Apriori-based algorithms for km-anonymizing trajectory data. Trans. Data Priv. 7(2), 165\u2013194 (2014)","journal-title":"Trans. Data Priv."},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Nath, S.: Differentially private aggregation of distributed time-series with transformation and encryption. In: SIGMOD, pp. 735\u2013746 (2010)","DOI":"10.1145\/1807167.1807247"},{"issue":"1","key":"19_CR18","doi-asserted-by":"publisher","first-page":"4:1","DOI":"10.1145\/2532643","volume":"8","author":"R Sherkat","year":"2013","unstructured":"Sherkat, R., Li, J., Mamoulis, N.: Efficient time-stamped event sequence anonymization. ACM Trans. Web 8(1), 4:1\u20134:53 (2013)","journal-title":"ACM Trans. Web"},{"key":"19_CR19","unstructured":"Sun, X., Yu, P.: A border-based approach for hiding sensitive frequent itemsets. In: ICDM, pp. 426\u2013433 (2005)"},{"issue":"4","key":"19_CR20","first-page":"434","volume":"16","author":"VS Verykios","year":"2004","unstructured":"Verykios, V.S., Emagarmid, A.K., Bertino, E., Saygin, Y., Dasseni, E.: Association rule hiding. TKDE 16(4), 434\u2013447 (2004)","journal-title":"TKDE"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Wang, D., He, Y., Rundensteiner, E., Naughton, J.F.: Utility-maximizing event stream suppression. In: SIGMOD, pp. 589\u2013600 (2013)","DOI":"10.1145\/2463676.2465305"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92016-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T00:05:55Z","timestamp":1653091555000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-92016-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319920153","9783319920160"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92016-0_19","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"22 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Artificial Intelligence Applications and Innovations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 May 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 May 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aiai2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/easyconferences.eu\/aiai2018\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}