{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:35:02Z","timestamp":1725672902859},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642290374"},{"type":"electronic","value":"9783642290381"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29038-1_24","type":"book-chapter","created":{"date-parts":[[2012,4,5]],"date-time":"2012-04-05T07:57:38Z","timestamp":1333612658000},"page":"320-334","source":"Crossref","is-referenced-by-count":4,"title":["Data Privacy against Composition Attack"],"prefix":"10.1007","author":[{"given":"Muzammil M.","family":"Baig","sequence":"first","affiliation":[]},{"given":"Jiuyong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jixue","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. In: KDD 2008, pp. 265\u2013273 (2008)","DOI":"10.1145\/1401890.1401926"},{"key":"24_CR3","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/s00778-006-0008-z","volume":"15","author":"W. Jiang","year":"2006","unstructured":"Jiang, W., Clifton, C.: A secure distributed framework for achieving k-anonymity. JVLDB\u00a015, 316\u2013333 (2006)","journal-title":"JVLDB"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Jin, X., Zhang, M., Zhang, N., Das, G.: Versatile publishing for privacy preservation. In: KDD 2010, pp. 353\u2013362 (2010)","DOI":"10.1145\/1835804.1835851"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: ICDE 2006, p. 25 (2006)","DOI":"10.1109\/ICDE.2006.101"},{"key":"24_CR6","first-page":"1181","volume":"20","author":"J. Li","year":"2008","unstructured":"Li, J., Wong, R.C.-W., Fu, A.W.-C., Pei, J.: Anonymization by local recoding in data with attribute hierarchical taxonomies. TKDE\u00a020, 1181\u20131194 (2008)","journal-title":"TKDE"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and \u2113-diversity. In: ICDE 2007, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: \u2113-diversity: Privacy beyond k-anonymity. In: TKDD (2007)","DOI":"10.1145\/1217299.1217302"},{"issue":"1","key":"24_CR9","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.datak.2007.06.016","volume":"64","author":"B. Malin","year":"2008","unstructured":"Malin, B.: k-unlinkability: A privacy protection model for distributed data. DKE\u00a064(1), 294\u2013311 (2008)","journal-title":"DKE"},{"key":"24_CR10","first-page":"493","volume-title":"KDD 2011","author":"N. Mohammed","year":"2011","unstructured":"Mohammed, N., Chen, R., Fung, B.C., Yu, P.S.: Differentially private data release for data mining. In: KDD 2011, pp. 493\u2013501. ACM, New York (2011)"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. IJUFKS, 557\u2013570 (2002)","DOI":"10.1142\/S0218488502001648"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Tao, Y., Xiao, X., Li, J., Zhang, D.: On anti-corruption privacy preserving publication. In: ICDE 2008, pp. 725\u2013734 (2008)","DOI":"10.1109\/ICDE.2008.4497481"},{"key":"24_CR13","unstructured":"Wong, R.C.-W., Fu, A.W.-C., Wang, K., Pei, J.: Minimality attack in privacy preserving data publishing. In: VLDB 2007, pp. 543\u2013554 (2007)"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Wong, R.-W., Fu, A.-C., Liu, J., Wang, K., Xu, Y.: Global privacy guarantee in serial data publishing. In: ICDE 2010, pp. 956\u2013959 (2010)","DOI":"10.1109\/ICDE.2010.5447859"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: m-invariance: towards privacy preserving re-publication of dynamic datasets. In: SIGMOD 2007, pp. 689\u2013700 (2007)","DOI":"10.1145\/1247480.1247556"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Yang, B., Nakagawa, H., Sato, I., Sakuma, J.: Collusion-resistant privacy-preserving data mining. In: KDD 2010, pp. 483\u2013492 (2010)","DOI":"10.1145\/1835804.1835867"},{"key":"24_CR17","unstructured":"Yao, C., Wang, X.S., Jajodia, S.: Checking for k-anonymity violation by views. In: VLDB 2005, pp. 910\u2013921 (2005)"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29038-1_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:19:47Z","timestamp":1620127187000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29038-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642290374","9783642290381"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29038-1_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}