{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:49:08Z","timestamp":1759092548427,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545672"},{"type":"electronic","value":"9783642545689"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54568-9_10","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:35Z","timestamp":1395325895000},"page":"148-161","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Using Search Results to Microaggregate Query Logs Semantically"],"prefix":"10.1007","author":[{"given":"Arnau","family":"Erola","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jordi","family":"Castell\u00e0-Roca","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1409220.1409224","volume":"2","author":"M Richardson","year":"2008","unstructured":"Richardson, M.: Learning about the world through long-term query logs. ACM Trans. Web 2, 1\u201327 (2008)","journal-title":"ACM Trans. Web"},{"key":"10_CR2","unstructured":"Xiong, L., Agichtein, E.: Towards privacy-preserving query log publishing. In: Amitay, E., Murray, C.G., Teevan, J. (eds) Query Log Analysis: Social and Technological Challenges. A Workshop at the 16th International World Wide Web Conference (WWW 2007) (2007)"},{"issue":"1","key":"10_CR3","doi-asserted-by":"crossref","first-page":"934","DOI":"10.14778\/1687627.1687733","volume":"2","author":"Y He","year":"2009","unstructured":"He, Y., Naughton, J.: Anonymization of set-valued data via top-down, local generalization. Proc. VLDB Endowment 2(1), 934\u2013945 (2009)","journal-title":"Proc. VLDB Endowment"},{"key":"10_CR4","unstructured":"Adar, E.: User 4XXXXX9: anonymizing query logs. In: Query Log Analysis: Social and Technological Challenges. A Workshop at the 16th International World Wide Web Conference (WWW 2007) (2007)"},{"key":"10_CR5","unstructured":"Jiang, J.J., Conrath, D.W.: Semantic similarity based on corpus statistics and lexical taxonomy (1997)"},{"issue":"2","key":"10_CR6","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1233321.1233324","volume":"8","author":"J Xu","year":"2006","unstructured":"Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W.: Utility-based anonymization for privacy preservation with less information loss. SIGKDD Explor. Newsl. 8(2), 21\u201330 (2006)","journal-title":"SIGKDD Explor. Newsl."},{"key":"10_CR7","unstructured":"Defays, D., Nanopoulos, P.: Panels of enterprises and confidentiality: the small aggregates method. In: Proceedings of the 92 Symposium on Design and Analysis of Longitudinal Surveys, Statistics Canada, pp. 195\u2013204 (1993)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Hong, Y., He, X., Vaidya, J., Adam, N., Atluri, V.: Effective anonymization of query logs. In: CIKM \u201909: Proceeding of the 18th ACM Conference on Information and Knowledge Management, pp. 1465\u20131468 (2009)","DOI":"10.1145\/1645953.1646146"},{"issue":"3","key":"10_CR9","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1016\/j.ipm.2011.01.004","volume":"48","author":"G Navarro-Arribas","year":"2012","unstructured":"Navarro-Arribas, G., Torra, V., Erola, A., Castell\u00e0-Roca, J.: User k-anonymity for privacy preserving data mining of query logs. Inf. Process. Manage. 48(3), 476\u2013487 (2012)","journal-title":"Inf. Process. Manage."},{"key":"10_CR10","series-title":"LNCS","first-page":"127","volume-title":"PSD 2010","author":"A Erola","year":"2010","unstructured":"Erola, A., Castell\u00e0-Roca, J., Navarro-Arribas, G., Torra, V.: Semantic microaggregation for the anonymization of query logs. In: Domingo-Ferrer, J., Magkos, E. (eds.) PSD 2010. LNCS, vol. 6344, pp. 127\u2013137. Springer, Heidelberg (2010)"},{"issue":"Special issue","key":"10_CR11","first-page":"25","volume":"35","author":"A Erola","year":"2011","unstructured":"Erola, A., Castell\u00e0-Roca, J., Navarro-Arribas, G., Torra, V.: Semantic microaggregation for the anonymization of query logs using the open directory project. SORT-Stat. Oper. Res. Trans. 35(Special issue), 25\u201340 (2011)","journal-title":"SORT-Stat. Oper. Res. Trans."},{"issue":"6","key":"10_CR12","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J.M.: Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans. Knowl. Data Eng. 14, 189\u2013201 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"10_CR14","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1016\/j.camwa.2007.04.034","volume":"55","author":"J Domingo-Ferrer","year":"2008","unstructured":"Domingo-Ferrer, J., Seb\u00e9, F., Solanas, A.: A polynomial-time approximation to optimal multivariate microaggregation. Comput. Math. Appl. 55(4), 714\u2013732 (2008)","journal-title":"Comput. Math. Appl."},{"issue":"4","key":"10_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1409220.1409222","volume":"2","author":"A Cooper","year":"2008","unstructured":"Cooper, A.: A survey of query log privacy-enhancing techniques from a policy perspective. ACM Trans. Web 2(4), 1\u201327 (2008)","journal-title":"ACM Trans. Web"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Korolova, A., Kenthapadi, K., Mishra, N., Ntoulas, A.: Releasing search queries and clicks privately. In: WWW \u201909: Proceedings of the 18th International Conference on World Wide Web, pp. 171\u2013180 (2009)","DOI":"10.1145\/1526709.1526733"},{"key":"10_CR17","series-title":"LNCS","first-page":"80","volume-title":"PInKDD 2007","author":"B Poblete","year":"2008","unstructured":"Poblete, B., Spiliopoulou, M., Baeza-Yates, R.: Website privacy preservation for query log publishing. In: Bonchi, F., Malin, B., Sayg\u0131n, Y. (eds.) PInKDD 2007. LNCS, vol. 4890, pp. 80\u201396. Springer, Heidelberg (2008)"},{"key":"10_CR18","volume-title":"WordNet - About Us. WordNet.","author":"G Miller","year":"2009","unstructured":"Miller, G.: WordNet - About Us. WordNet. Princeton University, Princeton (2009)"},{"key":"10_CR19","unstructured":"ODP. Open directory project (2011)"},{"key":"10_CR20","first-page":"327","volume":"3","author":"R S\u00e6tre","year":"2005","unstructured":"S\u00e6tre, R., Tveit, A., Steigedal, T.S., L\u00e6greid, A.: Semantic annotation of biomedical literature using google. ICCSA 3, 327\u2013337 (2005)","journal-title":"ICCSA"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Gligorov, R., Aleksovski, Z., Kate, W., F. Van Harmelen, B.: Using google distance to weight approximate ontology matches. In: Proceedings of the WWW-07, pp. 767\u2013776. ACM Press (2007)","DOI":"10.1145\/1242572.1242676"},{"key":"10_CR22","unstructured":"iprospect.com, inc, iProspect Blended Search Results Study. http:\/\/www.iProspect.com (2009)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54568-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T05:11:53Z","timestamp":1674537113000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54568-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545672","9783642545689"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54568-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}