{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:47:32Z","timestamp":1725511652971},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540788485"},{"type":"electronic","value":"9783540788492"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78849-2_28","type":"book-chapter","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T13:49:01Z","timestamp":1209390541000},"page":"263-274","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Inference Attacking and Prevention on Multiple Relative K-Anonymized Microdata Sets"],"prefix":"10.1007","author":[{"given":"Yalong","family":"Dong","sequence":"first","affiliation":[]},{"given":"Zude","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaojun","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Aggarwal, G., Feder, T., et al.: Anonymizing Tables for Privacy Protection (2004), http:\/\/theory.standford.edu\/~rajeev\/privacy.html","key":"28_CR1","DOI":"10.1007\/978-3-540-30570-5_17"},{"unstructured":"Aggarwal, G., Feder, T., et al.: Approximation Algorithms for K-Anonymity. Journal of Privacy Technology (November 2005)","key":"28_CR2"},{"unstructured":"Aggarwal, G., Feder, T., et al.: Injecting Utility into Anonymized Datasets. In: Proc. of PODS 2006, June 2006, pp. 153\u2013163 (2006)","key":"28_CR3"},{"doi-asserted-by":"crossref","unstructured":"Kifer, D., Gehrke, J.: Injecting Utility into Anonymized Datasets. In: Proc. of SIGMOD 2006, June 2006, pp. 217\u2013229 (2006)","key":"28_CR4","DOI":"10.1145\/1142473.1142499"},{"doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Multidimensional K-Anonymity. Technical Report (2005), www.cs.wisc.edu\/techreports\/2005\/","key":"28_CR5","DOI":"10.1109\/ICDE.2006.101"},{"doi-asserted-by":"crossref","unstructured":"Lefevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient Full-Domain K-Anonymity. In: Proc. of SIGMOD 2005 (June 2005)","key":"28_CR6","DOI":"10.1145\/1066157.1066164"},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11788911_25","volume-title":"Flexible and Efficient Information Handling","author":"Z. Li","year":"2006","unstructured":"Li, Z., Zhan, G., Ye, X.: Towards a More Reasonable Generalization Cost Metric For K-Anonymization. In: Bell, D.A., Hong, J. (eds.) BNCOD 2006. LNCS, vol.\u00a04042, Springer, Heidelberg (2006)"},{"key":"28_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1007\/11827405_86","volume-title":"Database and Expert Systems Applications","author":"Z. Li","year":"2006","unstructured":"Li, Z., Zhan, G., Ye, X.: Towards a Microdata Anonymization Model with Individual-Defined Ks. In: Bressan, S., K\u00fcng, J., Wagner, R. (eds.) DEXA 2006. LNCS, vol.\u00a04080, pp. 883\u2013893. Springer, Heidelberg (2006)"},{"doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D.: \u2113-Diversity: Privacy Beyond K-Anonymity. In: Proc. of ICDE 2006 (2006)","key":"28_CR9","DOI":"10.1109\/ICDE.2006.1"},{"doi-asserted-by":"crossref","unstructured":"Meyerson, A., Williams, R.: On the Complexity of Optimal K-Anonymity. In: Proc. of PODS 2004 (2004)","key":"28_CR10","DOI":"10.1145\/1055558.1055591"},{"unstructured":"Samarati, P., Sweeney, L.: Protecting Privacy when Disclosing Information: K-Anonymity and Its Enforcement Through Generalization and Suppression, Technical Report, SRI Computer Science Lab. (1998)","key":"28_CR11"},{"issue":"5","key":"28_CR12","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving K-Anonymity Privacy Protection Using Generalization and Suppression. Intl. Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 571\u2013588 (2002)","journal-title":"Intl. Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"issue":"5","key":"28_CR13","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: K-Anonymity: A Model For Protecting Privacy. Intl. Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"Intl. Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"unstructured":"Yao, C., Wang, X.S., Jajodia, S.: Checking for K-Anonymity Violation by Views. In: Proc. of VLDB 2005 (2005)","key":"28_CR14"},{"key":"28_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71703-4_57","volume-title":"Advances in Databases: Concepts, Systems and Applications","author":"X. Ye","year":"2007","unstructured":"Ye, X., Li, Z., Li, Y.: Capture Inference Attacks for K-Anonymity with Privacy Inference Logic. In: Kotagiri, R., Radha Krishna, P., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol.\u00a04443, Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Progress in WWW Research and Development"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78849-2_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:02:20Z","timestamp":1619521340000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78849-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540788485","9783540788492"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78849-2_28","relation":{},"subject":[]}}