{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:45:30Z","timestamp":1758267930535,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545672"},{"type":"electronic","value":"9783642545689"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54568-9_24","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:35Z","timestamp":1395325895000},"page":"369-379","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Are On-Line Personae Really Unlinkable?"],"prefix":"10.1007","author":[{"given":"Meilof","family":"Veeningen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Antonio","family":"Piepoli","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nicola","family":"Zannone","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Arenas, A., Fern\u00e1ndez, A., G\u00f3mez, S.: Analysis of the structure of complex networks at different resolution levels. New J. Phys. 10(5) (2008)","DOI":"10.1088\/1367-2630\/10\/5\/053039"},{"key":"24_CR2","series-title":"LNCS","first-page":"320","volume-title":"DASFAA 2012, Part I","author":"MM Baig","year":"2012","unstructured":"Baig, M.M., Li, J., Liu, J., Ding, X., Wang, H.: Data privacy against composition attack. In: Lee, S., Peng, Z., Zhou, X., Moon, Y.-S., Unland, R., Yoo, J. (eds.) DASFAA 2012, Part I. LNCS, vol. 7238, pp. 320\u2013334. Springer, Heidelberg (2012)"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Bhattacharya, I., Getoor, L.: Collective entity resolution in relational data. ACM Trans. Knowl. Discov. Data 1(1) (2007)","DOI":"10.1145\/1217299.1217304"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Bilenko, M., Basu, S., Sahami, M.: Adaptive product normalization: Using online learning for record linkage in comparison shopping. In: Proceedings of the Fifth IEEE International Conference on Data Mining, pp. 58\u201365. IEEE (2005)","DOI":"10.1109\/ICDM.2005.18"},{"issue":"1","key":"24_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jlap.2007.06.002","volume":"75","author":"B Blanchet","year":"2008","unstructured":"Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. J. Log. Algebr. Program. 75(1), 3\u201351 (2008)","journal-title":"J. Log. Algebr. Program."},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Blondel, V.D., Guillaume, J.L., Lambiott, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech.-Theory Exp. 2008(10) (2008)","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Chaudhuri, S., Ganti, V., Motwani, R.: Robust identification of fuzzy duplicates. In: Proceedings of the 21st International Conference on Data Engineering, pp. 865\u2013876. IEEE (2005)","DOI":"10.1109\/ICDE.2005.125"},{"key":"24_CR8","series-title":"LNCS","first-page":"507","volume-title":"PAKDD 2009","author":"P Christen","year":"2009","unstructured":"Christen, P., Pudjijono, A.: Accurate synthetic generation of realistic personal information. In: Theeramunkong, T., Kijsirikul, B., Cercone, N., Ho, T.-B. (eds.) PAKDD 2009. LNCS, vol. 5476, pp. 507\u2013514. Springer, Heidelberg (2009)"},{"key":"24_CR9","series-title":"Advances in Information Security","first-page":"353","volume-title":"Secure Data Management in Decentralized Systems","author":"V Ciriani","year":"2007","unstructured":"Ciriani, V., de Capitani di Vimercati, S., Foresti, S., Samarati, P.: k-anonymity. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems. Advances in Information Security, 323rd edn, p. 353. Springer, Heidelberg (2007)","edition":"323"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Delaune, S., Ryan, M., Smyth, B.: Automatic verification of privacy properties in the applied pi calculus. In: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, IFIP, vol. 263, pp. 263\u2013278. Springer, Heidelberg (2008)","DOI":"10.1007\/978-0-387-09428-1_17"},{"key":"24_CR11","series-title":"LNCS","first-page":"1","volume-title":"ICALP 2006, Part II","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"issue":"328","key":"24_CR12","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1080\/01621459.1969.10501049","volume":"64","author":"IP Fellegi","year":"1969","unstructured":"Fellegi, I.P., Sunter, A.B.: A theory for record linkage. J. Am. Stat. Assoc. 64(328), 1183\u20131210 (1969)","journal-title":"J. Am. Stat. Assoc."},{"issue":"12","key":"24_CR13","doi-asserted-by":"crossref","first-page":"2018","DOI":"10.14778\/2367502.2367564","volume":"5","author":"L Getoor","year":"2012","unstructured":"Getoor, L., Machanavajjhala, A.: Entity resolution: theory, practice & open challenges. Proc. VLDB Endow. 5(12), 2018\u20132019 (2012)","journal-title":"Proc. VLDB Endow."},{"issue":"4","key":"24_CR14","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2479942.2479955","volume":"40","author":"M Gupta","year":"2013","unstructured":"Gupta, M., Wu, Y.M., Joshi, S.S., Tiwari, A., Nair, A., Ilangovan, E.: On the linkability of complementary information from free versions of people databases. SIGMETRICS Perform. Eval. Rev. 40(4), 96\u2013100 (2013)","journal-title":"SIGMETRICS Perform. Eval. Rev."},{"key":"24_CR15","unstructured":"Koot, M.R.: Measuring and predicting anonymity. Ph.D. thesis, University of Amsterdam\u00a0(2012)"},{"issue":"2","key":"24_CR16","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.datak.2009.10.003","volume":"69","author":"H K\u00f6pcke","year":"2010","unstructured":"K\u00f6pcke, H., Rahm, E.: Frameworks for entity matching: a comparison. Data Knowl. Eng. 69(2), 197\u2013210 (2010)","journal-title":"Data Knowl. Eng."},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and $$\\ell $$-diversity. In: Proceedings of International Conference on Data Engineering, pp. 106\u2013115. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: $$\\ell $$-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1)\u00a0(2007)","DOI":"10.1145\/1217299.1217302"},{"issue":"1\u20132","key":"24_CR19","doi-asserted-by":"crossref","first-page":"208","DOI":"10.14778\/1920841.1920871","volume":"3","author":"D Menestrina","year":"2010","unstructured":"Menestrina, D., Whang, S.E., Garcia-Molina, H.: Evaluating entity resolution results. Proc. VLDB Endow. 3(1\u20132), 208\u2013219 (2010)","journal-title":"Proc. VLDB Endow."},{"key":"24_CR20","unstructured":"Michelson, M., Macskassy, S.A.: Record linkage measures in an entity centric world. In: Proceedings of the 4th workshop on Evaluation Methods for Machine Learning (2009)"},{"issue":"9","key":"24_CR21","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1016\/j.jclinepi.2006.11.021","volume":"60","author":"N M\u00e9ray","year":"2007","unstructured":"M\u00e9ray, N., Reitsma, J., Ravelli, A., Bonsel, G.: Probabilistic record linkage is a valid and transparent tool to combine databases without a patient identification number. J. Clin. Epidemiol. 60(9), 883\u2013891 (2007)","journal-title":"J. Clin. Epidemiol."},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 111\u2013125. IEEE (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"24_CR23","unstructured":"Northern, C.T., Nelson, M.L.: An unsupervised approach to discovering and disambiguating social media profiles. In: Proceedings of Mining Data Semantics Workshop (2011)"},{"key":"24_CR24","unstructured":"Singla, P., Domingos, P.: Multi-relational record linkage. In: Proceedings of the KDD-2004 Workshop on Multi-Relational Data Mining, pp. 31\u201348. ACM (2004)"},{"key":"24_CR25","unstructured":"Piepoli, A., Veeningen, M.: Implementation of identity clustering accompanying paper \u201care on-line personae really unlinkable?\u201d (version 1.0). http:\/\/www.mobiman.me\/downloads\/"},{"key":"24_CR26","doi-asserted-by":"publisher","first-page":"016110","DOI":"10.1103\/PhysRevE.74.016110","volume":"74","author":"J Reichardt","year":"2006","unstructured":"Reichardt, J., Bornholdt, S.: Statistical mechanics of community detection. Phys. Rev. E 74, 016110 (2006)","journal-title":"Phys. Rev. E"},{"key":"24_CR27","unstructured":"Sadinle, M., Fienberg, S.E.: A generalized fellegi-sunter framework for multiple record linkage with application to homicide record systems. arXiv 1205.3217 (2012)"},{"key":"24_CR28","series-title":"LNCS (LNAI)","first-page":"428","volume-title":"GoTAL 2008","author":"E Sapena","year":"2008","unstructured":"Sapena, E., Padr\u00f3, L., Turmo, J.: A graph partitioning approach to entity disambiguation using uncertain information. In: Nordstr\u00f6m, B., Ranta, A. (eds.) GoTAL 2008. LNCS (LNAI), vol. 5221, pp. 428\u2013439. Springer, Heidelberg (2008)"},{"key":"24_CR29","unstructured":"Troncoso, C.: Design and analysis methods for privacy technologies. Ph.D. thesis, KU Leuven (2011)"},{"key":"24_CR30","series-title":"LNCS","first-page":"235","volume-title":"ICISS 2011","author":"M Veeningen","year":"2011","unstructured":"Veeningen, M., de Weger, B., Zannone, N.: Formal privacy analysis of communication protocols for identity management. In: Jajodia, S., Mazumdar, Ch. (eds.) ICISS 2011. LNCS, vol. 7093, pp. 235\u2013249. Springer, Heidelberg (2011)"},{"key":"24_CR31","unstructured":"Winkler, W.E.: String comparator metrics and enhanced decision rules in the fellegi-sunter model of record linkage. In: Proceedings of the Section on Survey Research, pp. 354\u2013359 (1990)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54568-9_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T03:30:26Z","timestamp":1746156626000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54568-9_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545672","9783642545689"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54568-9_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}