{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:53:13Z","timestamp":1725533593211},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642026164"},{"type":"electronic","value":"9783642026171"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02617-1_17","type":"book-chapter","created":{"date-parts":[[2009,6,17]],"date-time":"2009-06-17T14:22:04Z","timestamp":1245248524000},"page":"159-168","source":"Crossref","is-referenced-by-count":2,"title":["Clustering-Based Frequency l-Diversity Anonymization"],"prefix":"10.1007","author":[{"given":"Mohammad-Reza","family":"Zare-Mirakabad","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aman","family":"Jantan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"St\u00e9phane","family":"Bressan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Byun, J.-W., Kamra, A., Bertino, E., Li, N.: Efficient k-Anonymity Using Clustering Technique. In: CERIAS Tech Report 2006-10, Center for Education and Research in Information Assurance and Security, Purdue University (2006)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J., Agrawal, R.: Data Privacy through Optimal k-Anonymization. In: 21st International Conference on Data Engineering (ICDE) (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"17_CR3","unstructured":"Xiao, X., Tao, Y.: Anatomy: Simple and Effective Privacy Preservation. In: Very Large Data Bases (VLDB) Conference, pp. 139\u2013150 (2006)"},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010, 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"17_CR5","unstructured":"Samarati, P., Sweeney, L.: Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression. In: Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory (1998)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Iyengar, V.: Transforming Data to Satisfy Privacy Constraints. In: SIGKDD, pp. 279\u2013288 (2002)","DOI":"10.1145\/775047.775089"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D. J., Ramakrishnan, R.: Mondrian Multidimensional k-Anonymity. In: 22nd International Conference on Data Engineering (ICDE) (2006)","DOI":"10.1109\/ICDE.2006.101"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-Diversity: Privacy beyond k-Anonymity. In: IEEE 22nd International Conference on Data Engineering (ICDE 2006) (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Wong, R. C.-W., Li, J., Fu, A. W.-C., Wang, K.: (alpha, k)-Anonymity: An Enhanced k-Anonymity Model for Privacy Preserving Data Publishing. In: 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD) (2006)","DOI":"10.1145\/1150402.1150499"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In: IEEE 23rd International Conference on Data Engineering (ICDE), 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"17_CR11","volume-title":"Very Large Data Bases (VLDB) Conference","author":"G. Ghinita","year":"2007","unstructured":"Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast Data Anonymization with Low Information Loss. In: Very Large Data Bases (VLDB) Conference. ACM Press, New York (2007)"},{"key":"17_CR12","unstructured":"Blake, C., Merz, C.: UCI Repository of Machine Learning Databases (1998)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Security and Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02617-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T18:14:30Z","timestamp":1685038470000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02617-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642026164","9783642026171"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02617-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}