{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:25:51Z","timestamp":1725517551965},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540856535"},{"type":"electronic","value":"9783540856542"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85654-2_3","type":"book-chapter","created":{"date-parts":[[2008,8,27]],"date-time":"2008-08-27T07:30:03Z","timestamp":1219822203000},"page":"19-32","source":"Crossref","is-referenced-by-count":4,"title":["BSGI: An Effective Algorithm towards Stronger l-Diversity"],"prefix":"10.1007","author":[{"given":"Yang","family":"Ye","sequence":"first","affiliation":[]},{"given":"Qiao","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Chi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dapeng","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"3_CR1","first-page":"1010","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. TKDE\u00a013(6), 1010\u20131027 (2001)","journal-title":"TKDE"},{"issue":"5","key":"3_CR2","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 571\u2013588 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information. In: PODS, p. 188 (1998)","DOI":"10.1145\/275487.275508"},{"issue":"5","key":"3_CR4","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowlege-Based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness, and Knowlege-Based Systems"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D.: l-diversity: Privacy beyond k-anonymity. In: ICDE, p. 24 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: ICDE, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Personalized privacy preservation. In: SIGMOD, pp. 229\u2013240 (2006)","DOI":"10.1145\/1142473.1142500"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Anatomy: Simple and effective privacy preservation. In: VLDB, pp. 139\u2013150 (2006)","DOI":"10.1145\/1142473.1142500"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Ercan Nergiz, M., Atzori, M., Clifton, C.W.: Hiding the Presence of Individuals from Shared Databases. In: SIGMOD, pp. 665\u2013676 (2007)","DOI":"10.1145\/1247480.1247554"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: m-Invariance: Towards Privacy Preserving Re-publication of Dynamic Datasets. In: SIGMOD, pp. 689\u2013700 (2007)","DOI":"10.1145\/1247480.1247556"},{"key":"3_CR11","unstructured":"Byun, J.-W., Li, T., Bertino, E., Li, N., Sohn, Y.: Privacy-Preserving Incremental Data Dissemination. CERIAS Tech Report, Purdue University (2007-07)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.: Utility-Based Anonymization Using Local Recoding. In: SIGKDD, pp. 785\u2013790 (2006)","DOI":"10.1145\/1150402.1150504"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient full-domain k-anonymity. In: SIGMOD, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: ICDE, p. 25 (2006)","DOI":"10.1109\/ICDE.2006.101"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","volume-title":"Database Systems for Advanced Applications","author":"J.-W. Byun","year":"2006","unstructured":"Byun, J.-W., Kamra, A., Bertino, E., Li, N.: Efficient k-Anonymization Using Clustering Techniques. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol.\u00a03882. Springer, Heidelberg (2006)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE, pp. 217\u2013228 (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"3_CR17","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Approximation algorithms for k-anonymity. In: JOPT (2005)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Iyengar, V.: Transforming data to satisfy privacy constraints. In: SIGKDD, pp. 279\u2013288 (2002)","DOI":"10.1145\/775047.775089"},{"key":"3_CR19","unstructured":"Aggarwal, C.C.: On k-anonymity and the curse of dimensionality. In: VLDB, pp. 901\u2013909 (2005)"},{"key":"3_CR20","unstructured":"U.C. Irvin Machine Learning Repository, http:\/\/archive.ics.uci.edu\/ml\/"}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85654-2_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:33:28Z","timestamp":1606185208000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85654-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540856535","9783540856542"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85654-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}