{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:54:10Z","timestamp":1763704450274},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540717027"},{"type":"electronic","value":"9783540717034"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71703-4_37","type":"book-chapter","created":{"date-parts":[[2007,8,2]],"date-time":"2007-08-02T00:31:22Z","timestamp":1186014682000},"page":"422-433","source":"Crossref","is-referenced-by-count":18,"title":["Protecting Individual Information Against Inference Attacks in Data Publishing"],"prefix":"10.1007","author":[{"given":"Chen","family":"Li","sequence":"first","affiliation":[]},{"given":"Houtan","family":"Shirani-Mehr","sequence":"additional","affiliation":[]},{"given":"Xiaochun","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Yang, X., Li, C.: Secure XML publishing without information leakage in the presence of data inference. In: VLDB (2004)","DOI":"10.1016\/B978-012088469-8.50012-7"},{"issue":"1","key":"37_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/974121.974131","volume":"33","author":"V.S. Verykios","year":"2004","unstructured":"Verykios, V.S., Bertino, E., Fovino, I.N., et al.: State-of-the-art in privacy preserving data mining. SIGMOD Record\u00a033(1), 50\u201357 (2004)","journal-title":"SIGMOD Record"},{"issue":"5","key":"37_CR3","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst.\u00a010(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: SIGMOD Conference, pp. 439\u2013450 (2000)","DOI":"10.1145\/342009.335438"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: KDD, pp. 217\u2013228 (2002)","DOI":"10.1145\/775047.775080"},{"key":"37_CR6","unstructured":"Atallah, M., Bertino, E., Elmagarmid, A., Ibrahim, M., Verykios, V.: Disclosure limitation of sensitive rules (1999)"},{"issue":"4","key":"37_CR7","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/604264.604271","volume":"30","author":"Y. Saygin","year":"2001","unstructured":"Saygin, Y., Verykios, V.S., Clifton, C.: Using unknowns to prevent discovery of association rules. SIGMOD Record\u00a030(4), 45\u201354 (2001)","journal-title":"SIGMOD Record"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Aggarwal, C., Pei, J., Zhang, B.: On Privacy Preservation against Adversarial Data Mining. In: Proceedings of ACM SIGKDD (2006)","DOI":"10.1145\/1150402.1150460"},{"issue":"2","key":"37_CR9","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/505586.505590","volume":"5","author":"E. Damiani","year":"2001","unstructured":"Damiani, E., Vimercati, S.D.C.D., Paraboschi, S., Samarati, P.: A Fine-Grained Access Control System for XML Documents. ACM Transaction on Information and System Security\u00a05(2), 169\u2013202 (2001)","journal-title":"ACM Transaction on Information and System Security"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Miklau, G., Suciu, D.: Controlling Access to Published Data using Cryptography. In: VLDB (2003)","DOI":"10.1016\/B978-012722442-8\/50084-7"},{"issue":"6","key":"37_CR11","first-page":"900","volume":"12","author":"A. Brodskyand","year":"2000","unstructured":"Brodskyand, A., Farkas, C., Jajodia, S.: Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures. TKDE\u00a012(6), 900\u2013919 (2000)","journal-title":"TKDE"},{"key":"37_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/3-540-45439-X_24","volume-title":"Information Security","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Carminati, B., Ferrari, E.: A Secure Publishing Service for Digital Libraries of XML Documents. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol.\u00a02200, pp. 347\u2013362. Springer, Heidelberg (2001)"},{"key":"37_CR13","unstructured":"Li, C., Shirani-Mehr, H., Yang, X.: Protecting Individual Information Against Inference Attacks in Data Publishing. UCI Technical Report (2006)"},{"issue":"2","key":"37_CR14","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1137\/S0097539793260763","volume":"28","author":"S. Rajagopalan","year":"1999","unstructured":"Rajagopalan, S., Vazirani, V.V.: Primal-dual RNC approximation algorithms for set cover and covering integer programs. SIAM Journal on Computing\u00a028(2), 525\u2013540 (1999)","journal-title":"SIAM Journal on Computing"},{"key":"37_CR15","volume-title":"Concrete mathematics: a foundation for computer science","author":"R.L. Graham","year":"1989","unstructured":"Graham, R.L., Knuth, D.E., Patashnik, O.: Concrete mathematics: a foundation for computer science. Addison-Wesley Longman, Reading (1989)"}],"container-title":["Lecture Notes in Computer Science","Advances in Databases: Concepts, Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71703-4_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T09:54:38Z","timestamp":1619517278000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71703-4_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540717027","9783540717034"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71703-4_37","relation":{},"subject":[]}}