{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:51:26Z","timestamp":1725580286273},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642201486"},{"type":"electronic","value":"9783642201493"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20149-3_8","type":"book-chapter","created":{"date-parts":[[2011,4,8]],"date-time":"2011-04-08T22:41:56Z","timestamp":1302302516000},"page":"78-92","source":"Crossref","is-referenced-by-count":6,"title":["Utility-Oriented K-Anonymization on Social Networks"],"prefix":"10.1007","author":[{"given":"Yazhe","family":"Wang","sequence":"first","affiliation":[]},{"given":"Long","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Baihua","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Ken C. K.","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Liu, K., Terzi, E.: Towards Identity Anonymization on Graphs. In: SIGMOD 2008, pp. 93\u2013106 (2008)","DOI":"10.1145\/1376616.1376629"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Wu, W., Xiao, Y., Wang, W., He, Z., Wang, Z.: K-Symmetry Model for Identity Anonymization in Social Networks. In: EDBT 2010, pp. 111\u2013122 (2010)","DOI":"10.1145\/1739041.1739058"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Zhou, B., Pei, J.: Preserving Privacy in Social Networks Against Neighborhood Attacks. In: ICDE 2008, pp. 506\u2013515 (2008)","DOI":"10.1109\/ICDE.2008.4497459"},{"issue":"1","key":"8_CR4","doi-asserted-by":"publisher","first-page":"946","DOI":"10.14778\/1687627.1687734","volume":"2","author":"L. Zou","year":"2009","unstructured":"Zou, L., Chen, L., \u00d6zsu, M.: K-Automorphism: A General Framework for Privacy Preserving Network Publication. VLDB Endowment\u00a02(1), 946\u2013957 (2009)","journal-title":"VLDB Endowment"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Li, T., Li, N.: On the Tradeoff Between Privacy and Utility in Data Publishing. In: SIGKDD 2009, pp. 517\u2013525 (2009)","DOI":"10.1145\/1557019.1557079"},{"issue":"1","key":"8_CR6","doi-asserted-by":"publisher","first-page":"102","DOI":"10.14778\/1453856.1453873","volume":"1","author":"M. Hay","year":"2008","unstructured":"Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting Structural Re-identification in Anonymized Social Networks. VLDB Endowment\u00a01(1), 102\u2013114 (2008)","journal-title":"VLDB Endowment"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography. In: WWW 2007, pp. 181\u2013190 (2007)","DOI":"10.1145\/1242572.1242598"},{"key":"8_CR8","unstructured":"Hay, M., Miklau, G., Jensen, D.: Anonymizing Social Networks. Technical report, UMass Amberst (2007)"},{"issue":"5","key":"8_CR9","first-page":"557","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: A Model for Protecting Privacy. IJUFKS\u00a010(5), 557\u2013570 (2002)","journal-title":"IJUFKS"},{"issue":"7191","key":"8_CR10","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1038\/nature06830","volume":"453","author":"A. Clauset","year":"2008","unstructured":"Clauset, A., Moore, C., Newman, M.E.J.: Hierarchical Structure and The Prediction of Missing Links in Networks.. Nature\u00a0453(7191), 98\u2013101 (2008)","journal-title":"Nature"},{"issue":"1","key":"8_CR11","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1080\/00018730601170527","volume":"56","author":"L.D.F. Costa","year":"2007","unstructured":"Costa, L.D.F., Rodrigues, F.A., Travieso, G., Boas, P.R.V.: Characterization of Complex Networks: A Survey of Measurements. Advances in Physics\u00a056(1), 167\u2013242 (2007)","journal-title":"Advances in Physics"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-1-4684-2001-2_9","volume-title":"Complexity of Computer Computations","author":"R.M. Karp","year":"1972","unstructured":"Karp, R.M.: Reducibility among combinatorial problems. In: Miller, R.E., Thatcher, J.W. (eds.) Complexity of Computer Computations, pp. 85\u2013103. Plenum Press, New York (1972)"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20149-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T21:10:04Z","timestamp":1558559404000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20149-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642201486","9783642201493"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20149-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}