{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:58:40Z","timestamp":1771703920980,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540724834","type":"print"},{"value":"9783540725244","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72524-4_75","type":"book-chapter","created":{"date-parts":[[2007,6,25]],"date-time":"2007-06-25T16:15:32Z","timestamp":1182788132000},"page":"733-744","source":"Crossref","is-referenced-by-count":6,"title":["(\u03b1, k)-anonymity Based Privacy Preservation by Lossy Join"],"prefix":"10.1007","author":[{"given":"Raymond Chi-Wing","family":"Wong","sequence":"first","affiliation":[]},{"given":"Yubao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Zhilan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Ada Wai-Chee","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Pei","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"75_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1007\/978-3-540-30570-5_17","volume-title":"Database Theory - ICDT 2005","author":"G. Aggarwal","year":"2004","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing Tables. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol.\u00a03363, pp. 246\u2013258. Springer, Heidelberg (2004)"},{"key":"75_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: SIGMOD, Dallas, Texas, May 2000, pp. 439\u2013450 (2000)","DOI":"10.1145\/342009.335438"},{"key":"75_CR3","doi-asserted-by":"crossref","unstructured":"Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE, pp. 217\u2013228 (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"75_CR4","doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Wang, K., Yu, P.S.: Top-down specialization for information and privacy preservation. In: ICDE, pp. 205\u2013216 (2005)","DOI":"10.1109\/ICDE.2005.143"},{"key":"75_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/978-3-540-25955-8_26","volume-title":"Privacy in Statistical Databases","author":"A. Hundepool","year":"2004","unstructured":"Hundepool, A.: The ARGUS Software in the CASC-Project. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol.\u00a03050, pp. 323\u2013335. Springer, Heidelberg (2004)"},{"key":"75_CR6","unstructured":"Hundepool, A., Willenborg, L.: \u03bc-and \u03c4- argus: software for statistical disclosure control. In: Third international seminar on statsitcal confidentiality, Bled (1996)"},{"key":"75_CR7","doi-asserted-by":"crossref","unstructured":"Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: SIGKDD, Edmonton, Alberta, Canada, pp. 279\u2013288 (2002)","DOI":"10.1145\/775047.775089"},{"key":"75_CR8","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient full-domain k-anonymity. In: SIGMOD, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"75_CR9","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D.: l-Diversity: privacy beyond k-anonymity. In: ICDE (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"75_CR10","doi-asserted-by":"crossref","unstructured":"Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: PODS, pp. 223\u2013228 (2004)","DOI":"10.1145\/1055558.1055591"},{"issue":"6","key":"75_CR11","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Transactions on Knowledge and Data Engineering\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"75_CR12","unstructured":"Sweeney, L.: Uniqueness of simple demographics in the u.s. population. Technical Report, Carnegie Mellon University (2000)"},{"issue":"5","key":"75_CR13","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International journal on uncertainty, Fuzziness and knowldege based systems\u00a010(5), 571\u2013588 (2002)","journal-title":"International journal on uncertainty, Fuzziness and knowldege based systems"},{"issue":"5","key":"75_CR14","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. International journal on uncertainty, Fuzziness and knowldege based systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International journal on uncertainty, Fuzziness and knowldege based systems"},{"key":"75_CR15","doi-asserted-by":"crossref","unstructured":"Wang, K., Fung, B.: Anonymizing sequential releases. In: SIGKDD, Philadelphia, PA, USA (2006)","DOI":"10.1145\/1150402.1150449"},{"key":"75_CR16","unstructured":"Wang, K., Yu, P.S., Chakraborty, S.: Bottom-up generalization: A data mining solution to privacy protection. In: ICDM, pp. 249\u2013256 (2004)"},{"key":"75_CR17","doi-asserted-by":"crossref","unstructured":"Wong, R.C.W., Li, J., Fu, A., Wang, K. (alpha, k)-Anonymity: An Enhanced k-Anonymity Model for Privacy-Preserving Data Publishing. In: SIGKDD, Philadelphia, PA, USA (2006)","DOI":"10.1145\/1150402.1150499"},{"key":"75_CR18","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Anatomy: Simple and effective privacy preservation. In: VLDB (2006)","DOI":"10.1145\/1142473.1142500"},{"key":"75_CR19","doi-asserted-by":"crossref","unstructured":"Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W.-C.: Utility-based anonymization using local recoding. In: SIGKDD, Philadelphia, PA, USA (2006)","DOI":"10.1145\/1150402.1150504"}],"container-title":["Lecture Notes in Computer Science","Advances in Data and Web Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72524-4_75.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T12:59:44Z","timestamp":1683896384000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72524-4_75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540724834","9783540725244"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72524-4_75","relation":{},"subject":[]}}