{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:39:23Z","timestamp":1725500363439},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540775348"},{"type":"electronic","value":"9783540775355"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77535-5_25","type":"book-chapter","created":{"date-parts":[[2008,1,8]],"date-time":"2008-01-08T10:23:47Z","timestamp":1199787827000},"page":"345-358","source":"Crossref","is-referenced-by-count":1,"title":["Risk &amp; Distortion Based K-Anonymity"],"prefix":"10.1007","author":[{"given":"Shenkun","family":"Xu","sequence":"first","affiliation":[]},{"given":"Xiaojun","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Approximation algorithms for k-anonymity. Journal of Privacy Technology no. 20051120001 (2005)"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE, pp. 217\u2013228 (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"25_CR3","unstructured":"Bettini, C., Wang, X.S., Jajodia, S.: The Role of Quasi-identifiers in k-Anonymity Revisited. TR 11-06, DICo, University of Milan, Italy (July 2006)"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Wang, K., Yu, P.S.: Top-down specialization for information and privacy preservation. In: ICDE, pp. 205\u2013216 (2005)","DOI":"10.1109\/ICDE.2005.143"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Iyengar, V.: Transforming data to satisfy privacy constraints. In: SIGKDD, pp. 279\u2013288 (2002)","DOI":"10.1145\/775047.775089"},{"issue":"1","key":"25_CR6","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.geb.2005.08.001","volume":"56","author":"J.C. Cox","year":"2006","unstructured":"Cox, J.C., Sadiraj, V.: Small-and Large-Stakes Risk Aversion: Implications of Concavity Calibration for Decision Theory. Games and Economic Behavior\u00a056(1), 45\u201360 (2006)","journal-title":"Games and Economic Behavior"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Kawano, S.-I., Nakano, S.-I.: Constant Time Generation of Set Partitions. IEICE Trans. Fundamentals\u00a0E88-A(4) (2005)","DOI":"10.1093\/ietfec\/e88-a.4.930"},{"key":"25_CR8","volume-title":"Decisions with Multiple Objectives: Preferences and Value Trade Offs","author":"R. Keeney","year":"1976","unstructured":"Keeney, R., Raiffa, H.: Decisions with Multiple Objectives: Preferences and Value Trade Offs. John Wiley & Sons, Chichester (1976)"},{"key":"25_CR9","unstructured":"Kevin, J., Soo, H.: How much is enough? A risk-management approach to computer security[D]. School of Engineering, Stanford University (2000)"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Lefevre, K., Dewitt, D.J., Ramakrishnan, R.: Incognito: Efficient full-domain k-anonymity. In: SIGMOD, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: ICDE (2006)","DOI":"10.1109\/ICDE.2006.101"},{"key":"25_CR12","first-page":"179","volume-title":"Combinational Mathematics","author":"L. Kai-cheng","year":"2002","unstructured":"Kai-cheng, L., Hua-ming, L.: Combinational Mathematics, 3rd edn. pp. 179\u2013184. Tsinghua University Press, Beijing (in Chinese) (2002)","edition":"3"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D.: l-diversity: Privacy beyond k-anonymity. In: ICDE (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: PODS. Proc. Of the 23rd ACM Symposium on Principles of Database Systems, pp. 223\u2013228 (2004)","DOI":"10.1145\/1055558.1055591"},{"key":"25_CR15","unstructured":"Orlov, M.: Efficient Generation of Set Partitions (2002), http:\/\/www.informatik.uni-ulm.de\/ni\/Lehre\/WS03\/DMM\/Software\/partitions.pdf"},{"issue":"6","key":"25_CR16","first-page":"1010","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata releas. IEEE TKDE\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE TKDE"},{"key":"25_CR17","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. SRI Technical Report SRI-CSL-98-04 (1998)"},{"issue":"5","key":"25_CR18","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems"},{"issue":"5","key":"25_CR19","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 571\u2013588 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Wang, K., Fung, B.C.M.: Anonymizing sequential releases. In: KDD. Proc. of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, pp. 414\u2013423 (2006)","DOI":"10.1145\/1150402.1150449"},{"key":"25_CR21","unstructured":"Wang, K., Yu, P.S., Chakraborty, S.: Bottom-up generalization: A data mining solution to privacy protection. In: ICDM, pp. 249\u2013256 (2004)"},{"key":"25_CR22","series-title":"Lecture Notes in Statistics","volume-title":"Elements of Statistical isclosure Disclosure Control","author":"L.C.R.J. Willenborg","year":"2000","unstructured":"Willenborg, L.C.R.J., de Waal, T.: Elements of Statistical isclosure Disclosure Control. Lecture Notes in Statistics. Springer, New York (2000)"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Personalized Privacy Preservation. In: Proc. of the SIGMOD, Chicago, Illinois, USA, June 27-29, 2006 (2006)","DOI":"10.1145\/1142473.1142500"},{"issue":"5","key":"25_CR24","doi-asserted-by":"publisher","first-page":"1222","DOI":"10.1360\/jos171222","volume":"17","author":"Y. Xiao-chun","year":"2006","unstructured":"Xiao-chun, Y., Xiang-yu, L., Bin, W., Ge, Y.: K-Anonymization Approaches for Supporting Multiple Constraints. Journal of Software\u00a017(5), 1222\u20131231 (2006), http:\/\/www.jos.org.cn\/1000-9825\/17\/1222.htm","journal-title":"Journal of Software"},{"key":"25_CR25","unstructured":"ftp:\/\/ftp.ics.uci.edu\/pub\/machine-learning-databases\/adult"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77535-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T13:20:54Z","timestamp":1557148854000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77535-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540775348","9783540775355"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77535-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}