{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T09:12:21Z","timestamp":1726218741511},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642317231"},{"type":"electronic","value":"9783642317248"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31724-8_54","type":"book-chapter","created":{"date-parts":[[2012,7,21]],"date-time":"2012-07-21T15:32:34Z","timestamp":1342884754000},"page":"519-528","source":"Crossref","is-referenced-by-count":8,"title":["Towards k-Anonymous Non-numerical Data via Semantic Resampling"],"prefix":"10.1007","author":[{"given":"Sergio","family":"Mart\u00ednez","sequence":"first","affiliation":[]},{"given":"David","family":"S\u00e1nchez","sequence":"additional","affiliation":[]},{"given":"A\u00efda","family":"Valls","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Samarati, P., Sweeney, L.: Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression. Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory (1998)","key":"54_CR1"},{"doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer, J.: A Survey of Inference Control Methods for Privacy-Preserving Data Mining. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining, vol.\u00a034, pp. 53\u201380. Springer US (2008)","key":"54_CR2","DOI":"10.1007\/978-0-387-70992-5_3"},{"unstructured":"Heer, G.R.: A bootstrap procedure to preserve statistical confidentiality in contingency tables. In: Int. Seminar on Statistical Confidentiality, Eurostat, pp. 261\u2013271 (1993)","key":"54_CR3"},{"key":"54_CR4","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J. Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J.M.: Practical Data-Oriented Microaggregation for Statistical Disclosure Control. IEEE Trans. on Knowl. and Data Eng.\u00a014, 189\u2013201 (2002)","journal-title":"IEEE Trans. on Knowl. and Data Eng."},{"key":"54_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-11207-2_4","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"J. Herranz","year":"2010","unstructured":"Herranz, J., Nin, J., Torra, V.: Distributed Privacy-Preserving Methods for Statistical Disclosure Control. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., Roudier, Y. (eds.) DPM 2009. LNCS, vol.\u00a05939, pp. 33\u201347. Springer, Heidelberg (2010)"},{"key":"54_CR6","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1198\/000313006X124640","volume":"60","author":"A.F. Karr","year":"2006","unstructured":"Karr, A.F., Kohnen, C.N., Oganian, A., Reiter, J.P., Sanil, A.P.: A Framework for Evaluating the Utility of Data Altered to Protect Confidentiality. The American Statistician\u00a060, 224\u2013232 (2006)","journal-title":"The American Statistician"},{"key":"54_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-19348-4_1","volume-title":"Proceedings of the 5th International Workshop on Data Privacy Management, and 3rd International Conference on Autonomous Spontaneous Security","author":"V. Torra","year":"2011","unstructured":"Torra, V.: Towards knowledge intensive data privacy. In: Proceedings of the 5th International Workshop on Data Privacy Management, and 3rd International Conference on Autonomous Spontaneous Security, pp. 1\u20137. Springer, Athens (2011)"},{"key":"54_CR8","first-page":"304","volume":"13","author":"S. Mart\u00ednez","year":"2012","unstructured":"Mart\u00ednez, S., S\u00e1nchez, D., Valls, A., Batet, M.: Privacy protection of textual attributes through a semantic-based masking method. Information Fusion. Special Issue on Privacy and Security\u00a013, 304\u2013314 (2012)","journal-title":"Information Fusion. Special Issue on Privacy and Security"},{"key":"54_CR9","doi-asserted-by":"publisher","first-page":"133","DOI":"10.3115\/981732.981751","volume-title":"The 32nd Annual Meeting on Association for Computational Linguistics","author":"Z. Wu","year":"1994","unstructured":"Wu, Z., Palmer, M.: Verbs semantics and lexical selection. In: The 32nd Annual Meeting on Association for Computational Linguistics, pp. 133\u2013138. Association for Computational Linguistics, Las Cruces (1994)"},{"key":"54_CR10","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0898-1221(99)00281-3","volume":"38","author":"J. Domingo-Ferrer","year":"1999","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J.M.: Resampling for statistical confidentiality in contingency tables. Computers & Mathematics with Applications\u00a038, 13\u201332 (1999)","journal-title":"Computers & Mathematics with Applications"},{"unstructured":"Jones, D.H., Adam, N.R.: Disclosure avoidance using the bootstrap and other resampling schemes. In: Proceedings of the Fifth Annual Research Conference, U.S. Bureau of the Census, pp. 446\u2013455 (1989)","key":"54_CR11"},{"key":"54_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-642-16292-3_26","volume-title":"Modeling Decisions for Artificial Intelligence","author":"D. Abril","year":"2010","unstructured":"Abril, D., Navarro-Arribas, G., Torra, V.: Towards Semantic Microaggregation of Categorical Data for Confidential Documents. In: Torra, V., Narukawa, Y., Daumas, M. (eds.) MDAI 2010. LNCS, vol.\u00a06408, pp. 266\u2013276. Springer, Heidelberg (2010)"},{"key":"54_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-25955-8_13","volume-title":"Privacy in Statistical Databases","author":"V. Torra","year":"2004","unstructured":"Torra, V.: Microaggregation for Categorical Variables: A Median Based Approach. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol.\u00a03050, pp. 162\u2013174. Springer, Heidelberg (2004)"},{"key":"54_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-16292-3_24","volume-title":"Modeling Decisions for Artificial Intelligence","author":"S. Mart\u00ednez","year":"2010","unstructured":"Mart\u00ednez, S., S\u00e1nchez, D., Valls, A.: Ontology-Based Anonymization of Categorical Values. In: Torra, V., Narukawa, Y., Daumas, M. (eds.) MDAI 2010. LNCS, vol.\u00a06408, pp. 243\u2013254. Springer, Heidelberg (2010)"},{"unstructured":"Mart\u00ednez, S., S\u00e1nchez, D., Valls, A., Batet, M.: The Role of Ontologies in the Anonymization of Textual Variables. In: Artificial Intelligence Research and Development: Proceedings of the 13th International Conference of the Catalan Association for Artificial Intelligence, pp. 153\u2013162. IOS Press (2010)","key":"54_CR15"},{"doi-asserted-by":"crossref","unstructured":"Fellbaum, C.: WordNet: An Electronic Lexical Database (Language, Speech, and Communication). The MIT Press (1998)","key":"54_CR16","DOI":"10.7551\/mitpress\/7287.001.0001"},{"key":"54_CR17","doi-asserted-by":"crossref","first-page":"652","DOI":"10.1145\/1031171.1031289","volume-title":"Proceedings of the Thirteenth ACM International Conference on Information and Knowledge Management","author":"L. Ding","year":"2004","unstructured":"Ding, L., Finin, T., Joshi, A., Pan, R., Cost, R.S., Peng, Y., Reddivari, P., Doshi, V., Sachs, J.: Swoogle: a search and metadata engine for the semantic web. In: Proceedings of the Thirteenth ACM International Conference on Information and Knowledge Management, pp. 652\u2013659. ACM, Washington, D.C. (2004)"},{"unstructured":"Hettich, S., Bay, S.D.: The UCI KDD Archive (1999)","key":"54_CR18"}],"container-title":["Communications in Computer and Information Science","Advances in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31724-8_54.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T15:56:27Z","timestamp":1642866987000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31724-8_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642317231","9783642317248"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31724-8_54","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}