{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T00:40:02Z","timestamp":1743986402732,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642325991"},{"type":"electronic","value":"9783642326004"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32600-4_23","type":"book-chapter","created":{"date-parts":[[2012,8,20]],"date-time":"2012-08-20T05:02:17Z","timestamp":1345438937000},"page":"311-325","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing Utility and Privacy-Safety via Semi-homogenous Generalization"],"prefix":"10.1007","author":[{"given":"Xianmang","family":"He","sequence":"first","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"HuaHui","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Guang","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Yefang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yihong","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/1066157.1066164","volume-title":"SIGMOD 2005: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data","author":"K. LeFevre","year":"2005","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: SIGMOD 2005: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 49\u201360. ACM, New York (2005)"},{"key":"23_CR2","first-page":"25","volume-title":"ICDE 2006: Proceedings of the 22nd International Conference on Data Engineering","author":"K. LeFevre","year":"2006","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: ICDE 2006: Proceedings of the 22nd International Conference on Data Engineering, p. 25. IEEE Computer Society, Washington, DC (2006)"},{"key":"23_CR3","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1145\/1150402.1150504","volume-title":"KDD 2006: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"J. Xu","year":"2006","unstructured":"Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W.-C.: Utility-based anonymization using local recoding. In: KDD 2006: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013790. ACM, New York (2006)"},{"doi-asserted-by":"crossref","unstructured":"Iwuchukwu, T., Naughton, J.F.: K-anonymization as spatial indexing: toward scalable and incremental anonymization. In: VLDB 2007: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 746\u2013757. VLDB Endowment (2007)","key":"23_CR4","DOI":"10.1109\/ICDE.2007.369024"},{"unstructured":"Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast data anonymization with low information loss. In: VLDB 2007: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 758\u2013769. VLDB Endowment (2007)","key":"23_CR5"},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1145\/275487.275508","volume-title":"PODS 1998: Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems","author":"P. Samarati","year":"1998","unstructured":"Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: PODS 1998: Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, p. 188. ACM, New York (1998)"},{"issue":"5","key":"23_CR7","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst.\u00a010(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"issue":"6","key":"23_CR8","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Trans. on Knowl. and Data Eng.\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. on Knowl. and Data Eng."},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1145\/1247480.1247556","volume-title":"SIGMOD 2007: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data","author":"X. Xiao","year":"2007","unstructured":"Xiao, X., Tao, Y.: M-invariance: towards privacy preserving re-publication of dynamic datasets. In: SIGMOD 2007: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, pp. 689\u2013700. ACM, New York (2007)"},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1109\/TKDE.2009.65","volume":"21","author":"Y. Tao","year":"2009","unstructured":"Tao, Y., Chen, H., Xiao, X., Zhou, S., Zhang, D.: Angel: Enhancing the utility of generalization for privacy preserving publication. IEEE Transactions on Knowledge and Data Engineering\u00a021, 1073\u20131087 (2009)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1145\/1807167.1807248","volume-title":"SIGMOD 2010: Proceedings of the 2010 International Conference on Management of Data","author":"W.K. Wong","year":"2010","unstructured":"Wong, W.K., Mamoulis, N., Cheung, D.W.L.: Non-homogeneous generalization in privacy preserving data publishing. In: SIGMOD 2010: Proceedings of the 2010 International Conference on Management of Data, pp. 747\u2013758. ACM, New York (2010)"},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1145\/1055558.1055591","volume-title":"PODS 2004: Proceedings of the 23nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems","author":"A. Meyerson","year":"2004","unstructured":"Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: PODS 2004: Proceedings of the 23nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 223\u2013228. ACM, New York (2004)"},{"key":"23_CR13","first-page":"217","volume-title":"ICDE 2005: Proceedings of the 21st International Conference on Data Engineering","author":"R.J. Bayardo","year":"2005","unstructured":"Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE 2005: Proceedings of the 21st International Conference on Data Engineering, pp. 217\u2013228. IEEE Computer Society, Washington, DC (2005)"},{"key":"23_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-540-30570-5_17","volume-title":"Database Theory - ICDT 2005","author":"G. Aggarwal","year":"2005","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing Tables. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol.\u00a03363, pp. 246\u2013258. Springer, Heidelberg (2005)"},{"doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Wang, K., Yu, P.S.: Top-down specialization for information and privacy preservation. In: International Conference on Data Engineering, pp. 205\u2013216 (2005)","key":"23_CR15","DOI":"10.1109\/ICDE.2005.143"},{"key":"23_CR16","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1145\/1150402.1150435","volume-title":"KDD 2006: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"K. LeFevre","year":"2006","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Workload-aware anonymization. In: KDD 2006: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 277\u2013286. ACM, New York (2006)"},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/ICDE.2008.4497483","volume-title":"ICDE 2008: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering","author":"A. Gionis","year":"2008","unstructured":"Gionis, A., Mazza, A., Tassa, T.: k-anonymization revisited. In: ICDE 2008: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, pp. 744\u2013753. IEEE Computer Society, Washington, DC (2008)"}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32600-4_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T23:58:29Z","timestamp":1743983909000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32600-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642325991","9783642326004"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32600-4_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}