{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:27:05Z","timestamp":1742912825991,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":22,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400706408"},{"type":"electronic","value":"9789400706415"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-94-007-0641-5_19","type":"book-chapter","created":{"date-parts":[[2011,2,25]],"date-time":"2011-02-25T16:20:59Z","timestamp":1298650859000},"page":"411-426","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Privacy-Preserving Data Mining from Outsourced Databases"],"prefix":"10.1007","author":[{"given":"Fosca","family":"Giannotti","sequence":"first","affiliation":[]},{"given":"Laks V.S.","family":"Lakshmanan","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Monreale","sequence":"additional","affiliation":[]},{"given":"Dino","family":"Pedreschi","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,2,22]]},"reference":[{"key":"19_CR1","unstructured":"Agrawal, R., and R. Srikant. \u201cFast Algorithms for Mining Association Rules.\u201d (Paper Presented at the Annual International Conference on Very Large Data Bases, 1994)."},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., and R. Srikant. \u201cPrivacy-Preserving Data Mining.\u201d (Paper Presented at the Annual International Conference SIGMOD, 2000).","DOI":"10.1145\/342009.335438"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., J. Kiernan, R. Srikant, Y. Xu. \u201cOrder Preserving Encryption for Numeric Data.\u201d (Paper Presented at the Annual International Conference SIGMOD, 2004).","DOI":"10.1145\/1007568.1007632"},{"key":"19_CR4","unstructured":"Agrawal, S., and J.R. Haritsa. \u201cA Framework for High-Accuracy Privacy-Preserving Mining.\u201d (Paper Presented at the Annual International Conference on Data Engineering, 2005)."},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1007\/s00778-006-0034-x","volume":"17","author":"M. Atzori","year":"2008","unstructured":"Atzori, M., F. Bonchi, F. Giannotti, and D. Pedreschi. \u201cAnonymity Preserving Pattern Discoery.\u201d VLDB Journal 17, (2008): 703.","journal-title":"VLDB Journal"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Bu, S., L.V.S. Lakshmanan, R.T. Ng, and G. Ramesh. \u201cPreservation of Patterns and Input-Output Privacy.\u201d (Paper Presented at the Annual International Conference on Data Engineering, 2007).","DOI":"10.1109\/ICDE.2007.367915"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Buyya, R., C.S. Yeo and S. Venugopal. \u201cMarket-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities.\u201d (Paper presented at the annual International Conference on High Performance Computing and Communications, 2008).","DOI":"10.1109\/HPCC.2008.172"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Chen, K., G. Sun, and L. Liu. \u201cToward Attack-Resilient Geometric Data Perturbation.\u201d (Paper Presented at the Annual SIAM International Conference on Data Mining, 2007).","DOI":"10.1137\/1.9781611972771.8"},{"key":"19_CR9","unstructured":"Clifton, C., M. Kantarcioglu, and J. Vaidya. \u201cDefining Privacy for Data Mining.\u201d (Paper Presented at the International NSF Workshop on Next Generation Data Mining, 2002)."},{"key":"19_CR12","first-page":"711","volume":"19","author":"B.C.M. Fung","year":"2007","unstructured":"Fung, B.C.M., K. Wang, and P.S. Yu. \u201cAnonymizing Classification Data for Privacy Preservation.\u201d TKDE 19, (2007): 711.","journal-title":"TKDE"},{"key":"19_CR15","unstructured":"Gilburd, B., A. Schuster and R. Wolff. \u201cA New Privacy Model and Association-Rule Mining Algorithm for Large-Scale Distributed Environments.\u201d (Paper Presented at the Annual International Conference on Very Large Data Bases, 2005)."},{"key":"19_CR16","unstructured":"Hacigumus, H., B. Iyer, and S. Mehrotra. \u201cProviding database as a service.\u201d (Paper Presented at the Annual International Conference ICDE, 2002)."},{"key":"19_CR18","first-page":"1026","volume":"16","author":"M. Kantarcioglu","year":"2004","unstructured":"Kantarcioglu, M., and C. Clifton. \u201cPrivacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data.\u201d TKDE 16, (2004): 1026.","journal-title":"TKDE"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Krishna Prasad, P., and C. Pandu Rangan. \u201cPrivacy Preserving BIRCH Algorithm for Clustering Over Vertically Partitioned Databases.\u201d Secure Data Management, (2006).","DOI":"10.1007\/11844662_7"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Lakshmanan, L.V.S., R.T. Ng, and G. Ramesh. \u201cTo Do or Not To Do: The Dilemma of Disclosing Anonymized Data.\u201d (Paper Presented at the Annual International Conference on SIGMOD, 2005).","DOI":"10.1145\/1066157.1066165"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., J. Gehrke, and D. Kifer. \u201cl-diversity: Privacy Beyond k-anonymity.\u201d (Paper Presented at the Annual International Conference on Data Engineering, 2006).","DOI":"10.1109\/ICDE.2006.1"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Rizvi, S., and J.R. Haritsa. \u201cMaintaining Data Privacy in Association Rule Mining.\u201d (Paper Presented at the Annual International Conference on Very Large Data Bases, 2002).","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"key":"19_CR24","first-page":"1010","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P. \u201cProtecting Respondents\u2019 Identities in Microdata Release.\u201d TKDE 13, (2001): 1010.","journal-title":"TKDE"},{"key":"19_CR25","unstructured":"Song, D.X., D. Wagner, and A. Perrig. \u201cPractical Techniques for Searches on Encrypted Data.\u201d (Paper Presented at the IEEE Symposium on Security and Privacy, 2000)."},{"key":"19_CR26","unstructured":"Wong, W.K., D.W. Cheung, E. Hung, B. Kao, and N. Mamoulis. \u201cSecurity in Outsourcing of Association Rule Mining.\u201d (Paper Presented at the Annual International Conference on Very Large Data Bases, 2007)."},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Xiao, X., and Y. Tao. \u201cAnatomy: Simple and Effective Privacy Preservation.\u201d (Paper Presented at the Annual International Conference on Very Large Data Bases, 2006).","DOI":"10.1145\/1142473.1142500"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Xu, Y., K. Wang, A.W. Fu, P.S. Yu. \u201cAnonymizing Transaction Databases for Publication.\u201d (Paper Presented at the Annual International Conference on Knowledge Discovery and Data Mining 2008).","DOI":"10.1145\/1401890.1401982"}],"container-title":["Computers, Privacy and Data Protection: an Element of Choice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-0641-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T14:50:03Z","timestamp":1674485403000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-0641-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9789400706408","9789400706415"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-0641-5_19","relation":{},"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"22 February 2011","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}