{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:53:08Z","timestamp":1725511988900},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540717027"},{"type":"electronic","value":"9783540717034"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71703-4_39","type":"book-chapter","created":{"date-parts":[[2007,8,2]],"date-time":"2007-08-02T00:31:22Z","timestamp":1186014682000},"page":"447-458","source":"Crossref","is-referenced-by-count":1,"title":["Implementation of Bitmap Based Incognito and Performance Evaluation"],"prefix":"10.1007","author":[{"given":"Hyun-Ho","family":"Kang","sequence":"first","affiliation":[]},{"given":"Jae-Myung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Gap-Joo","family":"Na","sequence":"additional","affiliation":[]},{"given":"Sang-Won","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proceedings of the ACM SIGMOD international conference on Management of data, Baltimore, Maryland, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"issue":"5","key":"39_CR2","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems"},{"key":"39_CR3","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory (1998)"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Zhou, J., Ross, K.A.: Implementing database operations using SIMD instructions. In: Proceedings of the ACM SIGMOD international conference on Management of data, Madison, Wisconsin, pp. 145\u2013156 (2002)","DOI":"10.1145\/564691.564709"},{"issue":"6","key":"39_CR5","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondants\u2019 identities in microdata release. IEEE Transactions on Knowledge and Data Engineering\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"39_CR6","unstructured":"Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules in Large Databases. In: Proceedings of Proceedings of the 32nd International Conference on Very Large Data Bases, Santiago de Chile, Chile, pp. 487\u2013499 (1994)"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J., Agrawal, R.: Data Privacy through Optimal k-Anonymization. In: Proceedings of the 21st International Conference on Data Engineering, pp. 217\u2013228 (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"39_CR8","volume-title":"Cost-Based Oracle Fundamentals","author":"J. Lewis","year":"2005","unstructured":"Lewis, J.: Cost-Based Oracle Fundamentals. Apress, Berkeley (2005)"},{"key":"39_CR9","unstructured":"Test Data from: \n                      \n                        http:\/\/vldb.skku.ac.kr\/mbar\/files\/"}],"container-title":["Lecture Notes in Computer Science","Advances in Databases: Concepts, Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71703-4_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T09:54:39Z","timestamp":1619517279000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71703-4_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540717027","9783540717034"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71703-4_39","relation":{},"subject":[]}}