{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:08:20Z","timestamp":1775279300043,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":50,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662583838","type":"print"},{"value":"9783662583845","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-662-58384-5_2","type":"book-chapter","created":{"date-parts":[[2018,11,21]],"date-time":"2018-11-21T05:27:33Z","timestamp":1542778053000},"page":"27-60","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Syntactic Anonymisation of Shared Datasets in Resource Constrained Environments"],"prefix":"10.1007","author":[{"given":"Anne V. D. M.","family":"Kayem","sequence":"first","affiliation":[]},{"given":"C. T.","family":"Vester","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,22]]},"reference":[{"key":"2_CR1","unstructured":"Aggarwal, C.C.: On k-anonymity and the curse of dimensionality. In: Proceedings of the 31st International Conference on Very Large Data Bases, VLDB 2005, pp. 901\u2013909. VLDB Endowment (2005)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C.: On unifying privacy and uncertain data models. In: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, ICDE 2008, pp. 386\u2013395. IEEE Computer Society, Washington, DC, USA (2008)","DOI":"10.1109\/ICDE.2008.4497447"},{"key":"2_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5","volume-title":"Privacy-Preserving Data Mining: Models and Algorithms","author":"CC Aggarwal","year":"2008","unstructured":"Aggarwal, C.C., Yu, P.S.: Privacy-Preserving Data Mining: Models and Algorithms, 1st edn. Springer Publishing Company Incorporated, New York (2008). https:\/\/doi.org\/10.1007\/978-0-387-70992-5","edition":"1"},{"issue":"3","key":"2_CR4","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1016\/S0377-2217(99)00321-5","volume":"126","author":"H Aytug","year":"2000","unstructured":"Aytug, H., Koehler, G.J.: New stopping criterion for genetic algorithms. Eur. J. Oper. Res. 126(3), 662\u2013674 (2000)","journal-title":"Eur. J. Oper. Res."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: 21st International Conference on Data Engineering (ICDE 2005), pp. 217\u2013228, April 2005","DOI":"10.1109\/ICDE.2005.42"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Burke, M., Kayem, A.V.D.M.: K-anonymity for privacy preserving crime data publishing in resource constrained environments. In: 28th International Conference on Advanced Information Networking and Applications Workshops, AINA 2014 Workshops, Victoria, BC, Canada, 13\u201316 May 2014, pp. 833\u2013840 (2014)","DOI":"10.1109\/WAINA.2014.131"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-319-10073-9_27","volume-title":"Database and Expert Systems Applications","author":"M Ciglic","year":"2014","unstructured":"Ciglic, M., Eder, J., Koncilia, C.: k-anonymity of microdata with NULL values. In: Decker, H., Lhotsk\u00e1, L., Link, S., Spies, M., Wagner, R.R. (eds.) DEXA 2014. LNCS, vol. 8644, pp. 328\u2013342. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10073-9_27"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-0-387-70992-5_5","volume-title":"Privacy-Preserving Data Mining: Models and Algorithms","author":"V Ciriani","year":"2008","unstructured":"Ciriani, V., Vimercati, S.D.C., Foresti, S., Samarati, P.: k-Anonymous data mining: a survey. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining: Models and Algorithms, vol. 34, pp. 105\u2013136. Springer, Boston (2008). https:\/\/doi.org\/10.1007\/978-0-387-70992-5_5"},{"issue":"2","key":"2_CR9","first-page":"161","volume":"6","author":"C Clifton","year":"2013","unstructured":"Clifton, C., Tassa, T.: On syntactic anonymity and differential privacy. Trans. Data Priv. 6(2), 161\u2013183 (2013)","journal-title":"Trans. Data Priv."},{"issue":"5","key":"2_CR10","doi-asserted-by":"publisher","first-page":"935","DOI":"10.3233\/JCS-2011-0428","volume":"19","author":"R Dewri","year":"2011","unstructured":"Dewri, R., Ray, I., Ray, I., Whitley, D.: Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization. J. Comput. Secur. 19(5), 935\u2013974 (2011)","journal-title":"J. Comput. Secur."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Dewri, R., Whitley, D., Ray, I., Ray, I.: A multi-objective approach to data sharing with privacy constraints and preference based objectives. In: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation, GECCO 2009, pp. 1499\u20131506. ACM, New York (2009)","DOI":"10.1145\/1569901.1570102"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"issue":"3\u20134","key":"2_CR14","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends Theor. Comput. Sci."},{"issue":"1","key":"2_CR15","first-page":"10","volume":"4","author":"SE Fienberg","year":"2012","unstructured":"Fienberg, S.E., Jin, J.: Privacy-preserving data sharing in high dimensional regression and classification settings. J. Priv. Confid. 4(1), 10 (2012)","journal-title":"J. Priv. Confid."},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.procs.2015.08.120","volume":"60","author":"FB Fredj","year":"2015","unstructured":"Fredj, F.B., Lammari, N., Comyn-Wattiau, I.: Abstracting anonymization techniques: a prerequisite for selecting a generalization algorithm. Procedia Comput. Sci. 60, 206\u2013215 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"2_CR17","unstructured":"Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast data anonymization with low information loss. In: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB 2007, pp. 758\u2013769. VLDB Endowment (2007)"},{"issue":"6","key":"2_CR18","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1137\/09076828X","volume":"41","author":"A Ghosh","year":"2012","unstructured":"Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. SIAM J. Comput. 41(6), 1673\u20131693 (2012)","journal-title":"SIAM J. Comput."},{"key":"2_CR19","unstructured":"Gould, C., Burger, J., Newham, G.: The SAPS crime statistics: What they tell us and what they don\u2019t. S. Afr. Crime Quaterly, December 2012. https:\/\/www.issafrica.org\/uploads\/1crimestats.pdf"},{"issue":"8","key":"2_CR20","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1016\/j.knosys.2011.05.011","volume":"24","author":"MZ Islam","year":"2011","unstructured":"Islam, M.Z., Brankovic, L.: Privacy preserving data mining: a noise addition framework using a novel clustering technique. Knowl. Based Syst. 24(8), 1214\u20131223 (2011)","journal-title":"Knowl. Based Syst."},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2002, pp. 279\u2013288. ACM, New York (2002)","DOI":"10.1145\/775047.775089"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-319-64471-4_3","volume-title":"Database and Expert Systems Applications","author":"AVDM Kayem","year":"2017","unstructured":"Kayem, A.V.D.M., Meinel, C.: Clustering heuristics for efficient t-closeness anonymisation. In: Benslimane, D., Damiani, E., Grosky, W.I., Hameurlain, A., Sheth, A., Wagner, R.R. (eds.) DEXA 2017. LNCS, vol. 10439, pp. 27\u201334. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64471-4_3"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-319-44403-1_7","volume-title":"Database and Expert Systems Applications","author":"AVDM Kayem","year":"2016","unstructured":"Kayem, A.V.D.M., Vester, C.T., Meinel, C.: Automated k-anonymization and l-diversity for shared data privacy. In: Hartmann, S., Ma, H. (eds.) DEXA 2016. LNCS, vol. 9827, pp. 105\u2013120. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-44403-1_7"},{"key":"2_CR24","unstructured":"Koufogiannis, F., Han, S., Pappas, G.J.: Optimality of the laplace mechanism in differential privacy. arXiv preprint arXiv:1504.00065 (2015)"},{"key":"2_CR25","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.ins.2013.07.034","volume":"256","author":"Mark Last","year":"2014","unstructured":"Last, M., Tassa, T., Zhmudyak, A., Shmueli, E.: Improving accuracy of classification models induced from anonymized datasets. Inf. Sci. 256, 138\u2013161 (2014). Business Intelligence in Risk Management","journal-title":"Information Sciences"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, SIGMOD 2005, pp. 49\u201360. ACM, New York (2005). http:\/\/doi.acm.org\/10.1145\/1066157.1066164","DOI":"10.1145\/1066157.1066164"},{"issue":"3","key":"2_CR27","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/1386118.1386123","volume":"33","author":"K LeFevre","year":"2008","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Workload-aware anonymization techniques for large-scale datasets. ACM Trans. Database Syst. (TODS) 33(3), 17 (2008)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"issue":"6","key":"2_CR28","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1007\/s00778-015-0398-x","volume":"24","author":"Chao Li","year":"2015","unstructured":"Li, C., Miklau, G., Hay, M., McGregor, A., Rastogi, V.: The matrix mechanism: optimizing linear counting queries under differential privacy. VLDB J. 24(6), 757\u2013781 (2015). http:\/\/dx.doi.org\/10.1007\/s00778-015-0398-x","journal-title":"The VLDB Journal"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: $$t$$-closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering, pp. 106\u2013115, April 2007","DOI":"10.1109\/ICDE.2007.367856"},{"key":"2_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/978-3-642-37487-6_26","volume-title":"Database Systems for Advanced Applications","author":"H Liang","year":"2013","unstructured":"Liang, H., Yuan, H.: On the complexity of t-closeness anonymization and related problems. In: Meng, W., Feng, L., Bressan, S., Winiwarter, W., Song, W. (eds.) DASFAA 2013. LNCS, vol. 7825, pp. 331\u2013345. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37487-6_26"},{"issue":"6","key":"2_CR31","doi-asserted-by":"publisher","first-page":"9784","DOI":"10.1016\/j.eswa.2009.02.009","volume":"36","author":"JL Lin","year":"2009","unstructured":"Lin, J.L., Wei, M.C.: Genetic algorithm-based clustering approach for $$k$$-anonymization. Expert. Syst. Appl. 36(6), 9784\u20139792 (2009)","journal-title":"Expert. Syst. Appl."},{"key":"2_CR32","unstructured":"Liu, F.: Generalized Gaussian mechanism for differential privacy. arXiv preprint arXiv:1602.06028 (2016)"},{"key":"2_CR33","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/978-0-387-70992-5_15","volume-title":"Privacy-Preserving Data Mining: Models and Algorithms","author":"K Liu","year":"2008","unstructured":"Liu, K., Giannella, C., Kargupta, H.: A survey of attack techniques on privacy-preserving data perturbation methods. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining: Models and Algorithms, vol. 34, pp. 359\u2013381. Springer, Boston (2008). https:\/\/doi.org\/10.1007\/978-0-387-70992-5_15"},{"issue":"1","key":"2_CR34","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"Ashwin Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), Article no. 3 (2007)","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: 48th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2007, pp. 94\u2013103. IEEE (2007)","DOI":"10.1109\/FOCS.2007.66"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: Proceedings of the Twenty-Third ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 223\u2013228. ACM (2004)","DOI":"10.1145\/1055558.1055591"},{"issue":"1","key":"2_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1929934.1929936","volume":"36","author":"Mehmet Ercan Nergiz","year":"2011","unstructured":"Nergiz, M.E., Tamersoy, A., Saygin, Y.: Instant anonymization. ACM Trans. Database Syst. 36(1), 2:1\u20132:33 (2011)","journal-title":"ACM Transactions on Database Systems"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Sakpere, A.B., Kayem, A.V.D.M., Ndlovu, T.: A usable and secure crime reporting system for technology resource constrained context. In: 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, AINA 2015 Workshops, Gwangju, South Korea, 24\u201327 March 2015, pp. 424\u2013429 (2015)","DOI":"10.1109\/WAINA.2015.97"},{"key":"2_CR39","unstructured":"Seckan, B.: Violent crime in the developing world: research roundup. In: Journalist\u2019s Resource: Research on today\u2019s New topics, October 2012. http:\/\/journalistsresource.org\/studies\/international\/development\/crime-violence-developing-world-research-roundup"},{"issue":"5","key":"2_CR40","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over vertically partitioned data. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 206\u2013215. ACM (2003)","DOI":"10.1145\/956750.956776"},{"issue":"4","key":"2_CR42","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1007\/s00778-006-0041-y","volume":"17","author":"Jaideep Vaidya","year":"2007","unstructured":"Vaidya, J., Kantarc\u0131o\u011flu, M., Clifton, C.: Privacy-preserving Naive Bayes classification. VLDB J. Int. J. Very Large Data Bases 17(4), 879\u2013898 (2008)","journal-title":"The VLDB Journal"},{"key":"2_CR43","unstructured":"Website: South africa\u2019s police: Something very rotten. The Economist: Middle East and Africa, June 2012. http:\/\/www.economist.com\/node\/21557385"},{"issue":"8","key":"2_CR44","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/2240236.2240255","volume":"55","author":"SB Wicker","year":"2012","unstructured":"Wicker, S.B.: The loss of location privacy in the cellular age. Commun. ACM 55(8), 60\u201368 (2012)","journal-title":"Commun. ACM"},{"key":"2_CR45","doi-asserted-by":"crossref","unstructured":"Wimmer, H., Powell, L.: A comparison of the effects of k-anonymity on machine learning algorithms. In: Proceedings of the Conference for Information Systems Applied Research ISSN, vol. 2167, p. 1508 (2014)","DOI":"10.14569\/IJACSA.2014.051126"},{"key":"2_CR46","doi-asserted-by":"crossref","unstructured":"Xiao, Q., Reiter, M.K., Zhang, Y.: Mitigating storage side channels using statistical privacy mechanisms. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 1582\u20131594. ACM, New York (2015)","DOI":"10.1145\/2810103.2813645"},{"key":"2_CR47","doi-asserted-by":"crossref","unstructured":"Xiao, X., Yi, K., Tao, Y.: The hardness and approximation algorithms for l-diversity. In: Proceedings of the 13th International Conference on Extending Database Technology, EDBT 2010, pp. 135\u2013146. ACM, New York (2010)","DOI":"10.1145\/1739041.1739060"},{"key":"2_CR48","doi-asserted-by":"crossref","unstructured":"Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W.C.: Utility-based anonymization using local recoding. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2006, pp. 785\u2013790. ACM, New York (2006)","DOI":"10.1145\/1150402.1150504"},{"key":"2_CR49","unstructured":"Zhang, B., Dave, V., Mohammed, N., Hasan, M.A.: Feature selection for classification under anonymity constraint. arXiv preprint arXiv:1512.07158 (2015)"},{"key":"2_CR50","doi-asserted-by":"crossref","unstructured":"Zhang, J., Cormode, G., Procopiuc, C.M., Srivastava, D., Xiao, X.: Privbayes: private data release via Bayesian networks. In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, pp. 1423\u20131434. ACM (2014)","DOI":"10.1145\/2588555.2588573"}],"container-title":["Lecture Notes in Computer Science","Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-58384-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T04:27:09Z","timestamp":1775276829000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-58384-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783662583838","9783662583845"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-58384-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}