{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T16:06:27Z","timestamp":1775145987090,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642387081","type":"print"},{"value":"9783642387098","type":"electronic"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40994-3_23","type":"book-chapter","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T13:07:10Z","timestamp":1377695230000},"page":"353-369","source":"Crossref","is-referenced-by-count":31,"title":["Anonymizing Data with Relational and Transaction Attributes"],"prefix":"10.1007","author":[{"given":"Giorgos","family":"Poulis","sequence":"first","affiliation":[]},{"given":"Grigorios","family":"Loukides","sequence":"additional","affiliation":[]},{"given":"Aris","family":"Gkoulalas-Divanis","sequence":"additional","affiliation":[]},{"given":"Spiros","family":"Skiadopoulos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE, pp. 217\u2013228 (2005)"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-540-71703-4_18","volume-title":"Advances in Databases: Concepts, Systems and Applications","author":"J.-W. Byun","year":"2007","unstructured":"Byun, J.-W., Kamra, A., Bertino, E., Li, N.: Efficient k-anonymization using clustering techniques. In: Kotagiri, R., Radha Krishna, P., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol.\u00a04443, pp. 188\u2013200. Springer, Heidelberg (2007)"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"issue":"2","key":"23_CR4","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/1046456.1046467","volume":"6","author":"A.A. Freitas","year":"2004","unstructured":"Freitas, A.A.: A critical review of multi-objective optimization in data mining: a position paper. SIGKDD Explorations\u00a06(2), 77\u201386 (2004)","journal-title":"SIGKDD Explorations"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey on recent developments. ACM Comput. Surv.\u00a042 (2010)","DOI":"10.1145\/1749603.1749605"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: A framework for efficient data anonymization under privacy and accuracy constraints. TODS\u00a034(2) (2009)","DOI":"10.1145\/1538909.1538911"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Tao, Y., Kalnis, P.: On the anonymization of sparse high-dimensional data. In: ICDE, pp. 715\u2013724 (2008)","DOI":"10.1109\/ICDE.2008.4497480"},{"issue":"1","key":"23_CR8","first-page":"223","volume":"5","author":"A. Gkoulalas-Divanis","year":"2012","unstructured":"Gkoulalas-Divanis, A., Loukides, G.: Utility-guided clustering-based transaction data anonymization. Trans. on Data Privacy\u00a05(1), 223\u2013251 (2012)","journal-title":"Trans. on Data Privacy"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: ICDE, p. 25 (2006)","DOI":"10.1109\/ICDE.2006.101"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Lii, N., Qardaji, W., Su, D.: On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. In: ASIACCS, pp. 32\u201333 (2012)","DOI":"10.1145\/2414456.2414474"},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"7898","DOI":"10.1073\/pnas.0911686107","volume":"17","author":"G. Loukides","year":"2010","unstructured":"Loukides, G., Gkoulalas-Divanis, A., Malin, B.: Anonymization of electronic medical records for validating genome-wide association studies. Proceedings of the National Academy of Sciences\u00a017, 7898\u20137903 (2010)","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"2","key":"23_CR12","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s10115-010-0354-4","volume":"28","author":"G. Loukides","year":"2011","unstructured":"Loukides, G., Gkoulalas-Divanis, A., Malin, B.: COAT: Constraint-based anonymization of transactions. Knowledge and Information Systems\u00a028(2), 251\u2013282 (2011)","journal-title":"Knowledge and Information Systems"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1007\/978-3-540-74469-6_74","volume-title":"Database and Expert Systems Applications","author":"G. Loukides","year":"2007","unstructured":"Loukides, G., Shao, J.: Clustering-based K-anonymisation algorithms. In: Wagner, R., Revell, N., Pernul, G. (eds.) DEXA 2007. LNCS, vol.\u00a04653, pp. 761\u2013771. Springer, Heidelberg (2007)"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: ICDE, p. 24 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: PODS, p. 188 (1998)","DOI":"10.1145\/275487.275508"},{"issue":"10","key":"23_CR16","first-page":"944","volume":"5","author":"M. Terrovitis","year":"2012","unstructured":"Terrovitis, M., Liagouris, J., Mamoulis, N., Skiadopoulos, S.: Privacy preservation by disassociation. PVLDB\u00a05(10), 944\u2013955 (2012)","journal-title":"PVLDB"},{"issue":"1","key":"23_CR17","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s00778-010-0192-8","volume":"20","author":"M. Terrovitis","year":"2011","unstructured":"Terrovitis, M., Mamoulis, N., Kalnis, P.: Local and global recoding methods for anonymizing set-valued data. VLDB J.\u00a020(1), 83\u2013106 (2011)","journal-title":"VLDB J."},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W.-C.: Utility-based anonymization using local recoding. In: KDD, pp. 785\u2013790 (2006)","DOI":"10.1145\/1150402.1150504"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Xu, Y., Wang, K., Fu, A.W.-C., Yu, P.S.: Anonymizing transaction databases for publication. In: KDD, pp. 767\u2013775 (2008)","DOI":"10.1145\/1401890.1401982"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Xue, M., Karras, P., Ra\u00efssi, C., Vaidya, J., Tan, K.: Anonymizing set-valued data by nonreciprocal recoding. In: KDD, pp. 1050\u20131058 (2012)","DOI":"10.1145\/2339530.2339696"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40994-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T23:41:02Z","timestamp":1558050062000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40994-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642387081","9783642387098"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40994-3_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}