{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:40:10Z","timestamp":1743097210149,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642302169"},{"type":"electronic","value":"9783642302176"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30217-6_34","type":"book-chapter","created":{"date-parts":[[2012,5,9]],"date-time":"2012-05-09T10:14:58Z","timestamp":1336558498000},"page":"405-417","source":"Crossref","is-referenced-by-count":11,"title":["Clustering-Based k-Anonymity"],"prefix":"10.1007","author":[{"given":"Xianmang","family":"He","sequence":"first","affiliation":[]},{"given":"HuaHui","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yefang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yihong","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhenhua","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"34_CR1","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst.\u00a010(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"issue":"6","key":"34_CR2","first-page":"1010","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. TKDE\u00a013(6), 1010\u20131027 (2001)","journal-title":"TKDE"},{"key":"34_CR3","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1145\/275487.275508","volume-title":"PODS 1998","author":"P. Samarati","year":"1998","unstructured":"Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information. In: PODS 1998, p. 188. ACM, New York (1998)"},{"key":"34_CR4","unstructured":"MacQueen, J.B.: Some methods for classification and analysis of multivariate observations, Berkeley, pp. 281\u2013297 (1967)"},{"issue":"12","key":"34_CR5","first-page":"1719","volume":"19","author":"P. Kalnis","year":"2007","unstructured":"Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. TKDE\u00a019(12), 1719\u20131733 (2007)","journal-title":"TKDE"},{"key":"34_CR6","unstructured":"Mokbel, M.F., Chow, C.-Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: VLDB 2006, pp. 763\u2013774 (2006)"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: ICDE 2006, p. 24 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: KDD 2007, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W.-C.: Utility-based anonymization using local recoding. In: KDD 2006, pp. 785\u2013790. ACM (2006)","DOI":"10.1145\/1150402.1150504"},{"key":"34_CR10","unstructured":"Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast data anonymization with low information loss. In: VLDB 2007, pp. 758\u2013769. VLDB Endowment (2007)"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Wang, K., Yu, P.S.: Top-down specialization for information and privacy preservation, pp. 205\u2013216 (2005)","DOI":"10.1109\/ICDE.2005.143"},{"key":"34_CR12","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1145\/1150402.1150435","volume-title":"KDD 2006","author":"K. LeFevre","year":"2006","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Workload-aware anonymization. In: KDD 2006, pp. 277\u2013286. ACM, New York (2006)"},{"key":"34_CR13","first-page":"747","volume-title":"SIGMOD 2010","author":"W.K. Wong","year":"2010","unstructured":"Wong, W.K., Mamoulis, N., Cheung, D.W.L.: Non-homogeneous generalization in privacy preserving data publishing. In: SIGMOD 2010, pp. 747\u2013758. ACM, New York (2010)"},{"key":"34_CR14","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/1066157.1066164","volume-title":"SIGMOD 2005","author":"K. LeFevre","year":"2005","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: SIGMOD 2005, pp. 49\u201360. ACM, New York (2005)"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Iwuchukwu, T., Naughton, J.F.: K-anonymization as spatial indexing: toward scalable and incremental anonymization. In: VLDB 2007, pp. 746\u2013757 (2007)","DOI":"10.1109\/ICDE.2007.369024"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: ICDE 2006, Washington, DC, USA, p. 25 (2006)","DOI":"10.1109\/ICDE.2006.101"},{"key":"34_CR17","first-page":"744","volume-title":"ICDE 2008","author":"A. Gionis","year":"2008","unstructured":"Gionis, A., Mazza, A., Tassa, T.: k-anonymization revisited. In: ICDE 2008, pp. 744\u2013753. IEEE Computer Society, Washington, DC (2008)"},{"key":"34_CR18","first-page":"217","volume-title":"ICDE 2005","author":"R.J. Bayardo","year":"2005","unstructured":"Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE 2005, pp. 217\u2013228. IEEE Computer Society, Washington, DC (2005)"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30217-6_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:08:27Z","timestamp":1743095307000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30217-6_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642302169","9783642302176"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30217-6_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}