{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:46:44Z","timestamp":1725518804000},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881919"},{"type":"electronic","value":"9783540881926"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88192-6_49","type":"book-chapter","created":{"date-parts":[[2008,9,29]],"date-time":"2008-09-29T08:05:59Z","timestamp":1222675559000},"page":"500-507","source":"Crossref","is-referenced-by-count":2,"title":["T-rotation: Multiple Publications of Privacy Preserving Data Sequence"],"prefix":"10.1007","author":[{"given":"Youdong","family":"Tao","sequence":"first","affiliation":[]},{"given":"Yunhai","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Shaohua","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Shiwei","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Dongqing","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing Tables. In: The 10th International Conference on Database Theory, pp. 246\u2013258 (2005)","DOI":"10.1007\/978-3-540-30570-5_17"},{"key":"49_CR2","doi-asserted-by":"crossref","unstructured":"Byun, J.W., Sohn, Y., Bertino, E., Li, N.: Secure Anonymization for Incremental Datasets. In: Secure Data Management, 3rd VLDB Workshop, pp. 48\u201363 (2006)","DOI":"10.1007\/11844662_4"},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient Full-domain K-anonymity. In: ACM International Conference on Management of Data, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D.: l-diversity: Privacy beyond K-anonymity. In: The 22nd International Conference on Data Engineering, pp. 24\u201335 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Pei, J., Xu, J., Wang, Z., Wang, W., Wang, K.: Maintaining K-anonymity against Incremental Updates. In: 19th International Conference on Scientific and Statistical Database Management, pp. 5\u201314 (2007)","DOI":"10.1109\/SSDBM.2007.16"},{"key":"49_CR6","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting Respondents\u2019 Identities in Microdata Release. IEEE Transactions on Knowledge and Data Engineering\u00a013, 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"49_CR7","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving K-anonymity Privacy Protection Using Generalization and Suppression. International Journal on Uncertainty, Fuzziness and Knowledge Based Systems\u00a010, 571\u2013588 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge Based Systems"},{"key":"49_CR8","unstructured":"UCI Machine Learning Repository, http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html"},{"key":"49_CR9","doi-asserted-by":"crossref","unstructured":"Wang, K., Fung, B.C.M.: Anonymizing Sequential Releases. In: 12th ACM SIGKDD, pp. 414\u2013423 (2006)","DOI":"10.1145\/1150402.1150449"},{"key":"49_CR10","doi-asserted-by":"crossref","unstructured":"Wong, R.C., Li, J., Fu, A.W., Wang, K. (\u03b1, k)-anonymity: an Enhanced K-anonymity Model for Privacy-preserving Data Publishing. In: 12th ACM SIGKDD, pp. 754\u2013759 (2006)","DOI":"10.1145\/1150402.1150499"},{"key":"49_CR11","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Anatomy: Simple and Effective Privacy Preservation. In: The 32nd international conference on Very large data bases, pp. 139\u2013150 (2006)","DOI":"10.1145\/1142473.1142500"},{"key":"49_CR12","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: M-Invariance: Towards Privacy Preserving Re-publication of Dynamic Datasets. In: ACM International Conference on Management of Data, pp. 689\u2013700 (2007)","DOI":"10.1145\/1247480.1247556"},{"key":"49_CR13","doi-asserted-by":"crossref","unstructured":"Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W.: Utility-based Anonymization Using Local Recoding. In: 12th ACM SIGKDD, pp. 785\u2013790 (2006)","DOI":"10.1145\/1150402.1150504"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88192-6_49.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,20]],"date-time":"2023-05-20T04:56:09Z","timestamp":1684558569000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88192-6_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881919","9783540881926"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88192-6_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}