{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:47:01Z","timestamp":1775054821765,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540220640","type":"print"},{"value":"9783540247753","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24775-3_10","type":"book-chapter","created":{"date-parts":[[2010,9,10]],"date-time":"2010-09-10T23:48:20Z","timestamp":1284162500000},"page":"74-85","source":"Crossref","is-referenced-by-count":50,"title":["Secure Association Rule Sharing"],"prefix":"10.1007","author":[{"given":"Stanley R. M.","family":"Oliveira","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Osmar R.","family":"Za\u00efane","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Y\u00fccel","family":"Saygin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure Limitation of Sensitive Rules. In: Proc. of IEEE Knowledge and Data Engineering Workshop, Chicago, Illinois, November 1999, pp. 45\u201352 (1999)","DOI":"10.1109\/KDEX.1999.836532"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-45496-9_27","volume-title":"Information Hiding","author":"E. Dasseni","year":"2001","unstructured":"Dasseni, E., Verykios, V.S., Elmagarmid, A.K., Bertino, E.: Hiding Association Rules by Using Confidence and Support. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 369\u2013383. Springer, Heidelberg (2001)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy Preserving Mining of Association Rules. In: Proc. of the 8th ACM SIGKDD Intl. Conf. on Knowlegde Discovery and Data Mining, Edmonton, AB, Canada, July 2002, pp. 217\u2013228 (2002)","DOI":"10.1145\/775047.775080"},{"key":"10_CR4","unstructured":"Oliveira, S.R.M., Za\u00efane, O.R.: Privacy Preserving Frequent Itemset Mining. In: Proc. of the IEEE ICDM Workshop on Privacy, Security, and Data Mining, Maebashi City, Japan, December 2002, pp. 43\u201354 (2002)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Oliveira, S.R.M., Za\u00efane, O.R.: Algorithms for Balancing Privacy and Knowledge Discovery in Association Rule Mining. In: Proc. of the 7th International Database Engineering and Applications Symposium (IDEAS 2003), Hong Kong, China, July 2003, pp. 54\u201363 (2003)","DOI":"10.1109\/IDEAS.2003.1214911"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Oliveira, S.R.M., Za\u00efane, O.R.: Protecting Sensitive Knowledge By Data Sanitization. In: Proc. of the 3rd IEEE International Conference on Data Mining (ICDM 2003), Melbourne, Florida, USA, November 2003, pp. 613\u2013616 (2003)","DOI":"10.1109\/ICDM.2003.1250990"},{"issue":"4","key":"10_CR7","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/604264.604271","volume":"30","author":"Y. Saygin","year":"2001","unstructured":"Saygin, Y., Verykios, V.S., Clifton, C.: Using Unknowns to Prevent Discovery of Association Rules. SIGMOD Record\u00a030(4), 45\u201354 (2001)","journal-title":"SIGMOD Record"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Kohavi, R., Mason, L.: Real World Performance of Association Rules Algorithms. In: Proc. of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA (August 2001)","DOI":"10.1145\/502512.502572"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24775-3_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T18:04:13Z","timestamp":1740506653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24775-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220640","9783540247753"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24775-3_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}