{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T17:01:23Z","timestamp":1759683683986,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642370144"},{"type":"electronic","value":"9783642370151"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37015-1_16","type":"book-chapter","created":{"date-parts":[[2013,3,5]],"date-time":"2013-03-05T04:34:18Z","timestamp":1362458058000},"page":"194-208","source":"Crossref","is-referenced-by-count":4,"title":["AIM: A New Privacy Preservation Algorithm for Incomplete Microdata Based on Anatomy"],"prefix":"10.1007","author":[{"given":"Qiyuan","family":"Gong","sequence":"first","affiliation":[]},{"given":"Junzhou","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"16_CR1","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst.\u00a010(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"16_CR2","unstructured":"Pierangela Samarati, L.S.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: IEEE Symposium on Research in Security and Privacy (1998)"},{"issue":"1","key":"16_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A. Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data\u00a01(1), 3 (2007)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation. In: Proceedings of the 32nd International Conference on Very Large Data Bases, VLDB 2006, pp. 139\u2013150 (2006)","DOI":"10.1145\/1142473.1142500"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Xiao, X., Yi, K., Tao, Y.: The hardness and approximation algorithms for l-diversity. In: Proceedings of the 13th International Conference on Extending Database Technology (EDBT), New York, NY, USA, pp. 135\u2013146 (2010)","DOI":"10.1145\/1739041.1739060"},{"key":"16_CR6","unstructured":"Aggarwal, C.C.: On k-anonymity and the curse of dimensionality. In: Proceedings of the 31st International Conference on Very Large Data Bases, VLDB 2005, pp. 901\u2013909 (2005)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Personalized privacy preservation. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data (SIGMOD), New York, NY, USA, pp. 229\u2013240 (2006)","DOI":"10.1145\/1142473.1142500"},{"issue":"5","key":"16_CR8","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst.\u00a010(5), 571\u2013588 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"issue":"6","key":"16_CR9","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data(SIGMOD), New York, NY, USA, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: Proceedings of the eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining(SIGKDD), New York, NY, USA, pp. 279\u2013288 (2002)","DOI":"10.1145\/775047.775089"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proceedings of International Conference on Data Engineering (ICDE), Los Alamitos, CA, USA, pp. 217\u2013228 (2005)","DOI":"10.1109\/ICDE.2005.42"},{"issue":"7","key":"16_CR13","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1109\/TKDE.2009.65","volume":"21","author":"Y. Tao","year":"2009","unstructured":"Tao, Y., Chen, H., Xiao, X., Zhou, S., Zhang, D.: Angel: Enhancing the utility of generalization for privacy preserving publication. IEEE Transactions on Knowledge and Data Engineering\u00a021(7), 1073\u20131087 (2009)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-540-24741-8_12","volume-title":"Advances in Database Technology - EDBT 2004","author":"C.C. Aggarwal","year":"2004","unstructured":"Aggarwal, C.C., Yu, P.S.: A Condensation Approach to Privacy Preserving Data Mining. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B\u00f6hm, K. (eds.) EDBT 2004. LNCS, vol.\u00a02992, pp. 183\u2013199. Springer, Heidelberg (2004)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Truta, T.M., Vinay, B.: Privacy protection: p-sensitive k-anonymity property. In: Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW), Washington, DC, USA, p. 94 (2006)","DOI":"10.1109\/ICDEW.2006.116"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: Proceedings of International Conference on Data Engineering (ICDE), pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: Proceedings of the Twenty-Third ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), New York, NY, USA, pp. 223\u2013228 (2004)","DOI":"10.1145\/1055558.1055591"},{"key":"16_CR18","unstructured":"Yao, C., Wang, X.S., Jajodia, S.: Checking for k-anonymity violation by views. In: Proceedings of International Conference on Very Large Data Bases (VLDB), pp. 910\u2013921 (2005)"},{"issue":"2","key":"16_CR19","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/TKDE.2010.101","volume":"23","author":"G. Ghinita","year":"2011","unstructured":"Ghinita, G., Kalnis, P., Tao, Y.: Anonymous publication of sensitive transactional data. IEEE Transactions on Knowledge and Data Engineering\u00a023(2), 161\u2013174 (2011)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"}],"container-title":["Lecture Notes in Computer Science","Pervasive Computing and the Networked World"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37015-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T22:57:07Z","timestamp":1745967427000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37015-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642370144","9783642370151"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37015-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}