{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:37:44Z","timestamp":1743079064697,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545672"},{"type":"electronic","value":"9783642545689"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54568-9_23","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:35Z","timestamp":1395325895000},"page":"362-368","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Dynamic Anonymous Index for Confidential Data"],"prefix":"10.1007","author":[{"given":"Guillermo","family":"Navarro-Arribas","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel","family":"Abril","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vicen\u00e7","family":"Torra","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"key":"23_CR1","unstructured":"Abril, D., Navarro-Arribas, G., Torra, V.: Vector space model anonymization. In: Sixteenth International Conference of the Catalan Association of Artificial Intelligence (CCIA 2013) (to appear)"},{"key":"23_CR2","series-title":"LNCS","first-page":"48","volume-title":"SDM 2006","author":"J-W Byun","year":"2006","unstructured":"Byun, J.-W., Sohn, Y., Bertino, E., Li, N.: Secure anonymization for incremental datasets. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 48\u201363. Springer, Heidelberg (2006)"},{"key":"23_CR3","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J.M.: Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans. Knowl. Data Eng. 14, 189\u2013201 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"23_CR4","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TDSC.2009.47","volume":"8","author":"J Cao","year":"2011","unstructured":"Cao, J., Carminati, B., Ferrari, E., Tan, K.-L.: CASTLE: continuously anonymizing data streams. IEEE Trans. Dependable Secure Comput. 8(3), 337\u2013352 (2011)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"23_CR5","series-title":"LNCS","first-page":"8","volume-title":"DPM 2010 and SETOP 2010","author":"S De Capitani di Vimercati","year":"2011","unstructured":"De Capitani di Vimercati, S., Foresti, S., Livraga, G.: Privacy in data publishing. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. LNCS, vol. 6514, pp. 8\u201321. Springer, Heidelberg (2011)"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Iwuchukwu, T., Naughton, J.F.: K-anonymization as spatial indexing: toward scalable and incremental anonymization. In: Proceedings of the 33rd International Conference on Very Large Data Bases, Vienna, Austria, pp. 746\u2013757 (2007)","DOI":"10.1109\/ICDE.2007.369024"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Li, J., Ooi, B.C., Wang, W.: Anonymizing streaming data for privacy protection. In: IEEE 24th International Conference on Data Engineering, ICDE 2008, pp. 1367\u20131369 (2008)","DOI":"10.1109\/ICDE.2008.4497558"},{"key":"23_CR8","volume-title":"An Introduction to Information Retrieval","author":"CD Manning","year":"2009","unstructured":"Manning, C.D., Raghavan, P., Sch\u00fctze, H.: An Introduction to Information Retrieval. Cambridge University Press, Cambridge (2009)"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Pei, J., Xu, J., Wang, Z., Wang, W., Wang, K.: Maintaining K-anonymity against incremental updates. In: 19th International Conference on Scientific and Statistical Database Management, SSBDM 2007 (2007)","DOI":"10.1109\/SSDBM.2007.16"},{"issue":"3","key":"23_CR10","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1108\/eb046814","volume":"14","author":"MF Porter","year":"1980","unstructured":"Porter, M.F.: An algorithm for suffix stripping. Program 14(3), 130\u2013137 (1980)","journal-title":"Program"},{"key":"23_CR11","unstructured":"Reuters Ltd., Reuters-21578, Distribution 1.0 (2004). http:\/\/www.daviddlewis.com\/resources\/testcollections\/reuters21578"},{"issue":"6","key":"23_CR12","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"06","key":"23_CR13","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1142\/S0218488512400260","volume":"20","author":"K Stokes","year":"2012","unstructured":"Stokes, K., Torra, V.: Multiple releases of k-anonymous data sets and k-anonymous relational databases. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 20(06), 839\u2013853 (2012)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"issue":"5","key":"23_CR14","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Truta, T.M., Campan, A.: K-anonymization incremental maintenance and optimization techniques. In: Proceedings of the ACM Symposium on Applied Computing, pp. 380\u2013387 (2007)","DOI":"10.1145\/1244002.1244093"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: M-invariance: towards privacy preserving re-publication of dynamic datasets. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 689\u2013700 (2007)","DOI":"10.1145\/1247480.1247556"},{"key":"23_CR17","series-title":"LNCS","first-page":"36","volume-title":"DPM 2010 and SETOP 2010","author":"H Zakerzadeh","year":"2011","unstructured":"Zakerzadeh, H., Osborn, S.L.: FAANST: fast anonymizing algorithm for numerical streaming DaTa. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. LNCS, vol. 6514, pp. 36\u201350. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54568-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T23:26:20Z","timestamp":1676676380000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54568-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545672","9783642545689"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54568-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}