{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:59:30Z","timestamp":1725562770919},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137389"},{"type":"electronic","value":"9783642137396"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_6","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T11:23:50Z","timestamp":1282649030000},"page":"81-96","source":"Crossref","is-referenced-by-count":0,"title":["On the Identification of Property Based Generalizations in Microdata Anonymization"],"prefix":"10.1007","author":[{"given":"Rinku","family":"Dewri","sequence":"first","affiliation":[]},{"given":"Indrajit","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Indrakshi","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Darrell","family":"Whitley","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"6_CR1","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting Respondents\u2019 Identities in Microdata Release. IEEE Transactions on Knowledge and Data Engineering\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Samarati, P., Sweeney, L.: Generalizing Data to Provide Anonymity when Disclosing Information. In: Proceedings of the 17th ACM Symposium on Principles of Database Systems, vol.\u00a0188 (1998)","DOI":"10.1145\/275487.275508"},{"issue":"5","key":"6_CR3","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k\u2013Anonymity Privacy Protection Using Generalization and Suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 571\u2013588 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J., Agrawal, R.: Data Privacy Through Optimal k-Anonymization. In: Proceedings of the 21st International Conference on Data Engineering, pp. 217\u2013228 (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"6_CR5","unstructured":"Hundepool, A., Willenborg, L.: Mu and Tau Argus: Software for Statistical Disclosure Control. In: Proceedings of the Third International Seminar on Statistical Confidentiality (1996)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Iyengar, V.S.: Transforming Data to Satisfy Privacy Constraints. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 279\u2013288 (2002)","DOI":"10.1145\/775047.775089"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramaniam, S.: t\u2013Closeness: Privacy Beyond k\u2013Anonymity and \u2113\u2013Diversity. In: Proceedings of the 23rd International Conference on Data Engineering, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: \u2113\u2013Diversity: Privacy Beyond k\u2013Anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, p.\u00a024 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Truta, T.M., Vinay, B.: Privacy Protection: p-Sensitive k-Anonymity Property. In: Proceedings of the 22nd International Conference on Data Engineering Workshops, p. 94 (2006)","DOI":"10.1109\/ICDEW.2006.116"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Dewri, R., Ray, I., Ray, I., Whitley, D.: On the Comparison of Microdata Disclosure Control Algorithms. In: 12th International Conference on Extending Database Technology, pp. 240\u2013251 (2009)","DOI":"10.1145\/1516360.1516389"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Meyerson, A., Williams, R.: On the Complexity of Optimal k-Anonymity. In: Proceedings of the 23rd ACM Symposium on the Principles of Database Systems, pp. 223\u2013228 (2004)","DOI":"10.1145\/1055558.1055591"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient Full-Domain k-Anonymity. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Wang, K., Yu, P.S.: Top-Down Specialization for Information and Privacy Preservation. In: Proceedings of the 21st International Conference in Data Engineering, pp. 205\u2013216 (2005)","DOI":"10.1109\/ICDE.2005.143"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian Multidimensional K-Anonymity. In: Proceedings of the 22nd International Conference in Data Engineering, p. 25 (2006)","DOI":"10.1109\/ICDE.2006.101"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Dewri, R., Ray, I., Ray, I., Whitley, D.: On the Optimal Selection of k in the k-Anonymity Problem. In: Proceedings of the 24th International Conference on Data Engineering, pp. 1364\u20131366 (2008)","DOI":"10.1109\/ICDE.2008.4497557"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Huang, Z., Du, W.: OptRR: Optimizing Randomized Response Schemes for Privacy-Preserving Data Mining. In: Proceedings of the 24th International Conference on Data Engineering, pp. 705\u2013714 (2008)","DOI":"10.1109\/ICDE.2008.4497479"},{"key":"6_CR17","unstructured":"Zitzler, E., Laumanns, M., Thiele, L.: SPEA2: Improving the Strength Pareto Evolutionary Algorithm. In: Evolutionary Methods for Design, Optimization and Control with Applications to Industrial Problems, pp. 95\u2013100 (2002)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:42:38Z","timestamp":1606185758000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}