{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T10:35:11Z","timestamp":1759401311544,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540717027"},{"type":"electronic","value":"9783540717034"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71703-4_57","type":"book-chapter","created":{"date-parts":[[2007,8,2]],"date-time":"2007-08-02T00:31:22Z","timestamp":1186014682000},"page":"676-687","source":"Crossref","is-referenced-by-count":2,"title":["Capture Inference Attacks for K-Anonymity with Privacy Inference Logic"],"prefix":"10.1007","author":[{"given":"Xiaojun","family":"Ye","sequence":"first","affiliation":[]},{"given":"Zude","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yongnian","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"57_CR1","unstructured":"Aggarwal, G., Feder, T., et al.: Approximation Algorithms for K-Anonymity. Journal of Privacy Technology, Paper number: 20051120001 (Nov. 2005)"},{"key":"57_CR2","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J., Agrawal, R.: Data Privacy through Optimal K-Anonymization. In: Proc. of ICDE 2005, Tokyo, Japan, pp. 217\u2013228 (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"57_CR3","doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Wang, K., Yu, P.S.: Top-Down Specialization for Information and Privacy Protection. In: Proc. of ICDE 2005, Tokyo, Japan, pp. 205\u2013216 (2005)","DOI":"10.1109\/ICDE.2005.143"},{"key":"57_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/978-3-540-25955-8_17","volume-title":"Privacy in Statistical Databases","author":"W.E. Winkler","year":"2004","unstructured":"Winkler, W.E.: Re-identification Methods for Masked Microdata. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol.\u00a03050, pp. 216\u2013230. Springer, Heidelberg (2004)"},{"key":"57_CR5","volume-title":"Data Mining Concepts and Techniques","author":"J. Han","year":"2000","unstructured":"Han, J., Kamber, M.: Data Mining Concepts and Techniques. Morgan Kaufmann, San Francisco (Aug. 2000)"},{"key":"57_CR6","doi-asserted-by":"crossref","unstructured":"Kifer, D., Gehrke, J.: Injecting Utility into Anonymized Datasets. In: Proc. of SIGMOD 2006, Chicago, USA, pp. 217\u2013229 (2006)","DOI":"10.1145\/1142473.1142499"},{"key":"57_CR7","unstructured":"Lambert, D.: Measures of Disclosure Risk and Harm, http:\/\/cm.bell-labs.com\/cm\/ms\/departments\/sia\/doc\/93.17.ps"},{"key":"57_CR8","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Multidimensional K-Anonymity, Technical Report, http:\/\/www.cs.wisc.edu\/techreports\/2005\/","DOI":"10.1109\/ICDE.2006.101"},{"key":"57_CR9","doi-asserted-by":"crossref","unstructured":"Lefevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient Full-Domain K-Anonymity. In: Proc. of SIGMOD 2005, Baltimore, USA, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"57_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/11788911_25","volume-title":"Flexible and Efficient Information Handling","author":"Z. Li","year":"2006","unstructured":"Li, Z., Zhan, G., Ye, X.: Towards a More Reasonable Generalization Cost Metric for K-Anonymization. In: Bell, D.A., Hong, J. (eds.) BNCOD 2006. LNCS, vol.\u00a04042, pp. 258\u2013261. Springer, Heidelberg (2006)"},{"key":"57_CR11","doi-asserted-by":"crossref","unstructured":"Lyengar, V.S.: Transforming Data to Satisfy Privacy Constraints. In: Proc. of SIGKDD 2002, Edmonton, Canada, pp. 279\u2013288 (2002)","DOI":"10.1145\/775088.775089"},{"key":"57_CR12","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D.: \u2113-Diversity: Privacy Beyond K-Anonymity. In: Proc. of ICDE 2006, Atlanta, USA (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"57_CR13","doi-asserted-by":"crossref","unstructured":"Meyerson, A., Williams, R.: On the Complexity of Optimal K-Anonymity. In: Proc. of PODS 2004, Paris, France, pp. 223\u2013228 (2004)","DOI":"10.1145\/1055558.1055591"},{"key":"57_CR14","unstructured":"Samarati, P., Sweeney, L.: Protecting Privacy when Disclosing Information: K-Anonymity and Its Enforcement Through Generalization and Suppression. Technical Report, SRI Computer Science Lab (1998), http:\/\/privacy.cs.cmu.edu\/people\/sweeney\/publications.html"},{"key":"57_CR15","unstructured":"Sweeney, L.: Guaranteeing Anonymity when Sharing Medical Data, the Datafly System. Journal of the American Medical Informatics Association (1997), http:\/\/adams.mgh.harvard.edu\/PDF_Repository\/D004462.PDF"},{"issue":"5","key":"57_CR16","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving K-Anonymity Privacy Protection Using Generalization and Suppression. Intl. Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 571\u2013588 (2002)","journal-title":"Intl. Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"issue":"5","key":"57_CR17","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: K-Anonymity: A Model For Protecting Privacy. Intl. Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"Intl. Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"57_CR18","doi-asserted-by":"crossref","unstructured":"Truta, T.M., Fotouhi, F., Barth-Jones, D.: Disclosure Risk Measures for Microdata. In: Proc. of the 15th Intl. Conf. on Scientific and Statistical Database Management, Cambridge, USA, pp. 15\u201322 (2003)","DOI":"10.1109\/SSDM.2003.1214948"},{"key":"57_CR19","unstructured":"UCI. U.c. irvine machine learning repository. http:\/\/www.ics.uci.edu\/mlearn"},{"key":"57_CR20","series-title":"Lecture Notes in Statistics","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-0121-9","volume-title":"Elements of Statistical Disclosure Control","author":"L. Willenborg","year":"2001","unstructured":"Willenborg, L., de Waal, T.: Elements of Statistical Disclosure Control. Lecture Notes in Statistics, vol.\u00a0155. Springer, Heidelberg (2001)"},{"key":"57_CR21","unstructured":"Yao, C., Wang, X.S., Jajodia, S.: Checking for K-Anonymity Violation by Views. In: Proc. of VLDB 2005, Trondheim, Norway, pp. 910\u2013921 (2005)"}],"container-title":["Lecture Notes in Computer Science","Advances in Databases: Concepts, Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71703-4_57.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T02:06:04Z","timestamp":1737338764000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71703-4_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540717027","9783540717034"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71703-4_57","relation":{},"subject":[]}}