{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T02:29:09Z","timestamp":1766888949613},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642042041"},{"type":"electronic","value":"9783642042058"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04205-8_19","type":"book-chapter","created":{"date-parts":[[2009,8,26]],"date-time":"2009-08-26T10:54:46Z","timestamp":1251284086000},"page":"216-230","source":"Crossref","is-referenced-by-count":3,"title":["Privacy Risk Diagnosis: Mining l-Diversity"],"prefix":"10.1007","author":[{"given":"Mohammad-Reza","family":"Zare-Mirakabad","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aman","family":"Jantan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"St\u00e9phane","family":"Bressan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"19_CR1","first-page":"131","volume-title":"iZi: A New Toolkit for Pattern Mining Problems","author":"F. Flouvat","year":"2008","unstructured":"Flouvat, F., Marchi, F.D., Petit, J.-M.: iZi: A New Toolkit for Pattern Mining Problems, pp. 131\u2013136. Springer, Heidelberg (2008)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Knobbe, A.J., Ho, E.K.Y.: Maximally informative k-itemsets and their efficient discovery. In: 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 237\u2013244 (2006)","DOI":"10.1145\/1150402.1150431"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imielinski, T., Swami, A.: Mining Association Rules between Sets of Items in Large Databases. In: ACM Conference on Management of Data (SIGMOD), pp. 207\u2013216 (1993)","DOI":"10.1145\/170035.170072"},{"key":"19_CR4","unstructured":"USA CENSUS DATA"},{"key":"19_CR5","unstructured":"Blake, C., Merz, C.: UCI Repository of Machine Learning Databases (1998)"},{"key":"19_CR6","unstructured":"Byun, J.-W., Kamra, A., Bertino, E., Li, N.: Efficient k-Anonymity Using Clustering Technique. In: CERIAS Tech Report 2006-10, Center for Education and Research in Information Assurance and Security. Purdue University (2006)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J., Agrawal, R.: Data Privacy through Optimal k-Anonymization. In: 21st International Conference on Data Engineering, ICDE (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"19_CR8","unstructured":"Xiao, X., Tao, Y.: Anatomy: Simple and Effective Privacy Preservation. In: Very Large Data Bases (VLDB) Conference, pp. 139\u2013150 (2006)"},{"key":"19_CR9","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. International Journal on Uncertainty. Fuzziness and Knowledge-based Systems\u00a010, 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty. Fuzziness and Knowledge-based Systems"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Khuller, S., Panigrahy, R., Thomas, D., Zhu, A.: Achieving Anonymity via Clustering. In: Principles of Database Systems(PODS) (2006)","DOI":"10.1145\/1142351.1142374"},{"key":"19_CR11","unstructured":"Samarati, P., Sweeney, L.: Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression. In: Technical Report SRI-CSL-98-04. SRI Computer Science Laboratory (1998)"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Iyengar, V.: Transforming Data to Satisfy Privacy Constraints. In: SIGKDD, pp. 279\u2013288 (2002)","DOI":"10.1145\/775047.775089"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W.-C.: Utility-based Anonymization Using Local Recoding. In: 12th ACM SIGKDD international conference on Knowledge discovery and data mining (2006)","DOI":"10.1145\/1150402.1150504"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient Full-domain k-Anonymity. In: ACM Conference on Management of Data (SIGMOD), pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian Multidimensional k-Anonymity. In: 22nd International Conference on Data Engineering, ICDE (2006)","DOI":"10.1109\/ICDE.2006.101"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-Diversity: Privacy beyond k-Anonymity. In: IEEE 22nd International Conference on Data Engineering, ICDE 2006 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-Diversity: Privacy beyond k-Anonymity. ACM Transactions on Knowledge Discovery from Data\u00a01 (2007)","DOI":"10.1145\/1217299.1217302"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Wong, R.C.-W., Li, J., Fu, A.W.-C., Wang, K.: (alpha, k)-Anonymity: An Enhanced k-Anonymity Model for Privacy Preserving Data Publishing. In: 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD (2006)","DOI":"10.1145\/1150402.1150499"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In: IEEE 23rd International Conference on Data Engineering (ICDE), pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1007\/978-3-540-72524-4_75","volume-title":"Advances in Data and Web Management","author":"R.C.-W. Wong","year":"2007","unstructured":"Wong, R.C.-W., Liu, Y., Yin, J., Huang, Z., Fu, A.W.-c., Pei, J.: (\u03b1, k)-anonymity based privacy preservation by lossy join. In: Dong, G., Lin, X., Wang, W., Yang, Y., Yu, J.X. (eds.) APWeb\/WAIM 2007. LNCS, vol.\u00a04505, pp. 733\u2013744. Springer, Heidelberg (2007)"},{"key":"19_CR21","first-page":"405","volume-title":"Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures","author":"J. Li","year":"2006","unstructured":"Li, J., Wong, R.C.-W., Fu, A.W.-C., Pei, J.: Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures, pp. 405\u2013416. Springer, Heidelberg (2006)"},{"key":"19_CR22","volume-title":"Very Large Data Bases (VLDB) Conference","author":"G. Ghinita","year":"2007","unstructured":"Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast Data Anonymization with Low Information Loss. In: Very Large Data Bases (VLDB) Conference. ACM, New York (2007)"},{"key":"19_CR23","unstructured":"Motwani, R., Xu, Y.: Efficient Algorithms for Masking and Finding Quasi-Identifiers. In: SIAM International Workshop on Practical Privacy-Preserving Data Mining (2008)"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Truta, T.M., Vinay, B.: Privacy Protection: p-Sensitive k-Anonymity Property. In: International Workshop of Privacy Data Management (PDM) Conjunction with 22th International Conference of Data Engineering, ICDE (2006)","DOI":"10.1109\/ICDEW.2006.116"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Mannila, H., Toivonen, H.: Levelwise Search and Borders of Theories in Knowledge Discovery. In: Data Mining and Knowledge Discovery, vol.\u00a01, pp. 241\u2013258 (1997)","DOI":"10.1023\/A:1009796218281"},{"issue":"6","key":"19_CR26","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Transactions on Knowledge and Data Engineering\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"19_CR27","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T.M. Cover","year":"1991","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. John Wiley & Sons, Chichester (1991)"},{"key":"19_CR28","volume-title":"The 2008 International Symposium on Computer Science and its Applications","author":"M.R. Zare Mirakabad","year":"2008","unstructured":"Zare Mirakabad, M.R., Jantan, A., Bressan, S.: Towards a Privacy Diagnosis Centre: Measuring k-anonymity. In: The 2008 International Symposium on Computer Science and its Applications. IEEE CS, Los Alamitos (2008)"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04205-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T13:19:15Z","timestamp":1685107155000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04205-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642042041","9783642042058"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04205-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}