{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:51:44Z","timestamp":1759092704587},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642230813"},{"type":"electronic","value":"9783642230820"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23082-0_1","type":"book-chapter","created":{"date-parts":[[2011,8,9]],"date-time":"2011-08-09T08:24:32Z","timestamp":1312878272000},"page":"1-34","source":"Crossref","is-referenced-by-count":10,"title":["Protecting Privacy in Data Release"],"prefix":"10.1007","author":[{"given":"Sabrina","family":"De Capitani di Vimercati","sequence":"first","affiliation":[]},{"given":"Sara","family":"Foresti","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Livraga","sequence":"additional","affiliation":[]},{"given":"Pierangela","family":"Samarati","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Approximation algorithms for k-anonymity. Journal of Privacy Technology (November 2005)"},{"issue":"3","key":"1_CR2","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s10700-008-9034-1","volume":"7","author":"A. Azzini","year":"2008","unstructured":"Azzini, A., Marrara, S., Sassi, R., Scotti, F.: A fuzzy approach to multimodal biometric continuous authentication. Fuzzy Optimization and Decision Making\u00a07(3), 215\u2013302 (2008)","journal-title":"Fuzzy Optimization and Decision Making"},{"key":"1_CR3","unstructured":"Barbaro, M., Zeller, T.: A face is exposed for AOL searcher no. 4417749. New York Times, August 9 (2006)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proc. of the 21st IEEE International Conference on Data Engineering (ICDE 2005), Tokyo, Japan (April 2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Bezzi, M., De Capitani di Vimercati, S., Livraga, G., Samarati, P.: Protecting privacy of sensitive value distributions in data release. In: Proc. of the 6th Workshop on Security and Trust Management (STM 2010), Athens, Greece (September 2010)","DOI":"10.1007\/978-3-642-22444-7_17"},{"key":"1_CR6","unstructured":"Chen, B.C., LeFevre, K., Ramakrishnan, R.: Privacy skyline: Privacy with multi-dimensional adversarial knowledge. In: Proc. of the 33rd International Conference on Very Large Data Bases (VLDB 2007), Vienna, Austria (September 2007)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: Privacy-aware biometrics: Design and implementation of a multimodal verification system. In: Proc. of the 24th Annual Computer Security Applications Conference (ACSAC 2008), Anaheim, CA, USA (December 2008)","DOI":"10.1109\/ACSAC.2008.13"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation design for efficient query execution over sensitive distributed databases. In: Proc. of the 29th International Conference on Distributed Computing Systems (ICDCS 2009), Montreal, Canada (June 2009)","DOI":"10.1109\/ICDCS.2009.52"},{"issue":"3","key":"1_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1805974.1805978","volume":"13","author":"V. Ciriani","year":"2010","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Transactions on Information and System Security (TISSEC)\u00a013(3), 22:1\u201322:33 (2010)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"1_CR10","volume-title":"Secure Data Management in Decentralized Systems","author":"V. Ciriani","year":"2007","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: k-Anonymity. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems. Springer, Heidelberg (2007)"},{"key":"1_CR11","volume-title":"Secure Data Management in Decentralized Systems","author":"V. Ciriani","year":"2007","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Microdata protection. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems. Springer, Heidelberg (2007)"},{"key":"1_CR12","volume-title":"Algorithms and Theory of Computation Handbook","author":"V. Ciriani","year":"2009","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Theory of privacy and anonymity. In: Atallah, M., Blanton, M. (eds.) Algorithms and Theory of Computation Handbook, 2nd edn. CRC Press, Boca Raton (2009)","edition":"2"},{"key":"1_CR13","first-page":"429","volume":"15","author":"T. Dalenius","year":"1977","unstructured":"Dalenius, T.: Towards a methodology for statistical disclosure control. Statistik Tidskrift\u00a015, 429\u2013444 (1977)","journal-title":"Statistik Tidskrift"},{"issue":"2","key":"1_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1735886.1735891","volume":"35","author":"S. De Capitani di Vimercati","year":"2010","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM Transactions on Database Systems (TODS)\u00a035(2), 12:1\u201312:46 (2010)","journal-title":"ACM Transactions on Database Systems (TODS)"},{"issue":"1","key":"1_CR15","doi-asserted-by":"publisher","first-page":"1370","DOI":"10.14778\/1920841.1921009","volume":"3","author":"S. De Capitani di Vimercati","year":"2010","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragments and loose associations: Respecting privacy in data publishing. Proc. of the VLDB Endowment\u00a03(1), 1370\u20131381 (2010)","journal-title":"Proc. of the VLDB Endowment"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.\u00a03876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Frikken, K.B., Zhang, Y.: Yet another privacy metric for publishing micro-data. In: Proc. of the 7th Workshop on Privacy in Electronic Society (WPES 2008), Alexandria, VA, USA (October 2008)","DOI":"10.1145\/1456403.1456423"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Gamassi, M., Lazzaroni, M., Misino, M., Piuri, V., Sana, D., Scotti, F.: Accuracy and performance of biometric systems. In: Proc. of the 2004 IEEE Instrumentation & Measurement Technology Conference (IMTC 2004), Como, Italy (May 2004)","DOI":"10.1109\/IMTC.2004.1351099"},{"key":"1_CR20","unstructured":"Gamassi, M., Piuri, V., Sana, D., Scotti, F.: Robust fingerprint detection for access control. In: Proc. of the 2nd RoboCare Workshop (RoboCare 2005), Rome, Italy (May 2005)"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Golle, P.: Revisiting the uniqueness of simple demographics in the US population. In: Proc. of the 5th Workshop on Privacy in the Electronic Society (WPES 2006), Alexandria, VA, USA (October 2006)","DOI":"10.1145\/1179601.1179615"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Kifer, D.: Attacks on privacy and deFinetti\u2019s theorem. In: Proc. of the 2009 ACM SIGMOD International Conference on Management of Data (SIGMOD 2009), Providence, RI, USA (June 2009)","DOI":"10.1145\/1559845.1559861"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient full-domain k-anonymity. In: Proc. of the 2005 ACM SIGMOD International Conference on Management of Data (SIGMOD 2005), Baltimore, MD, USA (June 2005)","DOI":"10.1145\/1066157.1066164"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: Proc. of the 22nd IEEE International Conference on Data Engineering (ICDE 2006), Atlanta, GA, USA (April 2006)","DOI":"10.1109\/ICDE.2006.101"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Li, F., Sun, J., Papadimitriou, S., Mihaila, G., Stanoi, I.: Hiding in the crowd: Privacy preservation on evolving streams through correlation tracking. In: Proc. of the 23rd IEEE International Conference on Data Engineering (ICDE 2007), Istanbul, Turkey (April 2007)","DOI":"10.1109\/ICDE.2007.367914"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and \u2113-diversity. In: Proc.of the 23rd IEEE International Conference on Data Engineering (ICDE 2007), Istanbul, Turkey (April 2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Li, T., Li, N.: On the tradeoff between privacy and utility in data publishing. In: Proc. of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2009), Paris, France (June-July 2009)","DOI":"10.1145\/1557019.1557079"},{"issue":"1","key":"1_CR28","doi-asserted-by":"publisher","first-page":"790","DOI":"10.14778\/1687627.1687717","volume":"2","author":"A. Machanavajjhala","year":"2009","unstructured":"Machanavajjhala, A., Gehrke, J., G\u00f6tz, M.: Data publishing against realistic adversaries. Proc. of the VLDB Endowment\u00a02(1), 790\u2013801 (2009)","journal-title":"Proc. of the VLDB Endowment"},{"issue":"1","key":"1_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A. Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: \u2113-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD)\u00a01(1), 3:1\u20133:52 (2007)","journal-title":"ACM Transactions on Knowledge Discovery from Data (TKDD)"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Martin, D.J., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.Y.: Worst-case background knowledge for privacy-preserving data publishing. In: Proc. of the 23rd IEEE International Conference on Data Engineering (ICDE 2007), Istanbul, Turkey (April 2007)","DOI":"10.1109\/ICDE.2007.367858"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: Proc. of the 23rd ACM-SIGMOD-SIGACT-SIGART Symposium on the Principles of Database Systems (PODS 2004), Paris, France (June 2004)","DOI":"10.1145\/1055558.1055591"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proc. of the 2008 IEEE Symposium on Security and Privacy (SP 2008), Berkeley\/Oakland, CA, USA (May 2008)","DOI":"10.1109\/SP.2008.33"},{"key":"1_CR33","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/1743546.1743558","volume":"53","author":"A. Narayanan","year":"2010","unstructured":"Narayanan, A., Shmatikov, V.: Myths and fallacies of personally identifiable information. Communications of the ACM (CACM)\u00a053, 24\u201326 (2010)","journal-title":"Communications of the ACM (CACM)"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Nergiz, M.E., Atzori, M., Clifton, C.: Hiding the presence of individuals from shared databases. In: Proc. of the 2007 ACM SIGMOD International Conference on Management of Data (SIGMOD 2007), Beijing, China (June 2007)","DOI":"10.1145\/1247480.1247554"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Nergiz, M., Clifton, C., Nergiz, A.: Multirelational k-anonymity. In: Proc. of the 23rd IEEE International Conference on Data Engineering (ICDE 2007), Istanbul, Turkey (April 2007)","DOI":"10.1109\/ICDE.2007.369025"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Pei, J., Tao, Y., Li, J., Xiao, X.: Privacy preserving publishing on multiple quasi-identifiers. In: Proc. of the 25th IEEE International Conference on Data Engineering (ICDE 2009), Shanghai, China (March-April 2009)","DOI":"10.1109\/ICDE.2009.183"},{"issue":"6","key":"1_CR37","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Transactions on Knowledge and Data Engineering (TKDE)\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering (TKDE)"},{"key":"1_CR38","doi-asserted-by":"publisher","first-page":"115","DOI":"10.14778\/1453856.1453874","volume":"1","author":"M. Terrovitis","year":"2008","unstructured":"Terrovitis, M., Mamoulis, N., Kalnis, P.: Privacy-preserving anonymization of set-valued data. Proc. of the VLDB Endowment\u00a01, 115\u2013125 (2008)","journal-title":"Proc. of the VLDB Endowment"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Wang, K., Fung, B.C.M.: Anonymizing sequential releases. In: Proc. of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2006), Philadelphia, PA, USA (August 2006)","DOI":"10.1145\/1150402.1150449"},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Wang, K., Xu, Y., Wong, R., Fu, A.: Anonymizing temporal data. In: Proc. of the 2010 IEEE International Conference on Data Mining (ICDM 2010), Sydney, Australia (December 2010)","DOI":"10.1109\/ICDM.2010.96"},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Anatomy: Simple and effective privacy preservation. In: Proc. of the 32nd International Conference on Very Large Data Bases (VLDB 2006), Seoul, Korea (September 2006)","DOI":"10.1145\/1142473.1142500"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Personalized privacy preservation. In: Proc. of the 2006 ACM SIGMOD International Conference on Management of Data (SIGMOD 2006), Chicago, IL, USA (June 2006)","DOI":"10.1145\/1142473.1142500"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: m-invariance: Towards privacy preserving re-publication of dynamic datasets. In: Proc. of the 2007 ACM SIGMOD International Conference on Management of Data (SIGMOD 2007), Beijing, China (June 2007)","DOI":"10.1145\/1247480.1247556"},{"key":"1_CR44","doi-asserted-by":"crossref","unstructured":"Xiao, X., Yi, K., Tao, Y.: The hardness and approximation algorithms for \u2113-diversity. In: Proc. of the 13th International Conference on Extending Database Technology (EDBT 2010), Lausanne, Switzerland (March 2010)","DOI":"10.1145\/1739041.1739060"},{"key":"1_CR45","doi-asserted-by":"crossref","unstructured":"Zhou, B., Han, Y., Pei, J., Jiang, B., Tao, Y., Jia, Y.: Continuous privacy preserving publishing of data streams. In: Proc. of the 12th International Conference on Extending Database Technology (EDBT 2009), Saint Petersburg, Russia (March 2009)","DOI":"10.1145\/1516360.1516435"}],"container-title":["Lecture Notes in Computer Science","Foundations of Security Analysis and Design VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23082-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T22:47:48Z","timestamp":1560466068000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23082-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642230813","9783642230820"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23082-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}