{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:10:18Z","timestamp":1743037818729,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":34,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400751842"},{"type":"electronic","value":"9789400751705"}],"license":[{"start":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T00:00:00Z","timestamp":1350000000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T00:00:00Z","timestamp":1350000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-94-007-5170-5_4","type":"book-chapter","created":{"date-parts":[[2012,11,22]],"date-time":"2012-11-22T19:14:18Z","timestamp":1353611658000},"page":"85-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Anonymity: A Comparison Between the Legal and Computer Science Perspectives"],"prefix":"10.1007","author":[{"given":"Sergio","family":"Mascetti","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anna","family":"Monreale","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Annarita","family":"Ricci","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrea","family":"Gerino","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2012,10,12]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, Rakesh, and Ramakrishnan Srikant. 2000. Privacy-preserving data mining. InProceedings of the 2000 ACM SIGMOD international conference on management of data, 439\u2013450. New York: ACM.","DOI":"10.1145\/342009.335438"},{"key":"4_CR2","volume-title":"Privacy-aware knowledge discovery: Novel applications and new techniques","author":"C Bettini","year":"2010","unstructured":"Bettini, Claudio. 2010. Privacy and anonymity in location data management. InPrivacy-aware knowledge discovery: Novel applications and new techniques, ed. F. Bonchi and E. Ferrari. Boca Raton: Chapman & Hall\/CRC Data Mining and Knowledge Discovery Series."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Bettini, Claudio, Sergio Mascetti, X. Sean Wang, and Sushil Jajodia. 2007. Anonymity in location-based services: Towards a general framework. InProceedings of the 2007 international conference on mobile data management, 69\u201376. Washington, DC: IEEE Computer Society.","DOI":"10.1109\/MDM.2007.19"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Chaum, David. 1990. Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms. InAdvances in Cryptology \u2013 AUSCRYPT \u201990, ed. J. Seberry, J. Pieprzyk, 453:245\u2013264. Berlin\/Heidelberg: Springer.","DOI":"10.1007\/BFb0030366"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-0-387-27696-0_9","volume-title":"Secure data management in decentralized systems","author":"V Ciriani","year":"2007","unstructured":"Ciriani, Valentina, Sabrina di Vimercati, Sara Foresti, and Pierangela Samarati. 2007. Microdata protection. InSecure data management in decentralized systems, vol. 33, ed. Yu Ting and Sushil Jajodia, 291\u2013321. New York: Springer."},{"key":"4_CR6","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281, 23.11.1995, 31\u201350."},{"key":"4_CR7","unstructured":"Directive 2002\/58\/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications), OJ L 201, 31.7.2002, 37\u201347."},{"key":"4_CR8","unstructured":"Dwork, Cynthia. 2006. Differential privacy. InAutomata, languages and programming, 4052:1\u201312, ed. Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener. Berlin\/Heidelberg: Springer."},{"key":"4_CR9","first-page":"523","volume-title":"Movement-aware applications for sustainable mobility: Technologies and approaches","author":"G Finocchiaro","year":"2009","unstructured":"Finocchiaro, Giusella. 2009. Anonymity and the law in Italy. InMovement-aware applications for sustainable mobility: Technologies and approaches, ed. Ian Kerr, Valerie M. Steeves, and Carole Lucock, 523\u2013536. Oxford: Oxford University Press."},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"140","DOI":"10.4018\/978-1-61520-769-5.ch009","volume-title":"Movement-aware applications for sustainable mobility: Technologies and approaches","author":"G Finocchiaro","year":"2010","unstructured":"Finocchiaro, Giusella, and Claire Vishik. 2010. Law and technology: Anonymity and right to anonymity in a connected world. InMovement-aware applications for sustainable mobility: Technologies and approaches, ed. Monica Wachowicz, 140\u2013156. Hershey: IGI Global."},{"issue":"5","key":"4_CR11","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/TKDE.2007.1015","volume":"19","author":"BCM Fung","year":"2007","unstructured":"Fung, Benjamin C.M., Ke Wang, and Philip S. Yu. May 2007. Anonymizing classification data for privacy preservation.IEEE Transactions on Knowledge and Data Engineering19(5): 711\u2013725.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Gruteser, Marco, and Dirk Grunwald. 2003. Anonymous usage of location-based services through spatial and temporal cloaking. InProceedings of the 1st international conference on mobile systems, applications and services, 31\u201342. MobiSys \u201903. New York: ACM.","DOI":"10.1145\/1066116.1189037"},{"key":"4_CR13","unstructured":"Italian Personal Protection Code, Legislative Decree no. 196, 30\/06\/2003, art. 4, co. 1, lett. n."},{"issue":"12","key":"4_CR14","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1109\/TKDE.2007.190662","volume":"19","author":"P Kalnis","year":"2007","unstructured":"Kalnis, Panos, Gabriel Ghinita, Kyriakos Mouratidis, and Dimitris Papadias. December 2007. Preventing location-based identity inference in anonymous spatial queries.IEEE Transactions on Knowledge and Data Engineering19(12): 1719\u20131733.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Li, Tiancheng, and Ninghui Li. 2009. On the tradeoff between privacy and utility in data publishing. InProceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, 517\u2013526. New York: ACM.","DOI":"10.1145\/1557019.1557079"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Li, Ninghui, Tiancheng Li, and S. Venkatasubramanian. 2007.t-closeness: Privacy beyondk-anonymity andl-diversity. InIEEE 23rd international conference on data engineering, 2007(ICDE 2007), 106\u2013115. Istanbul, Turkey: IEEE Computer Society.","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"1","key":"4_CR17","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, Ashwin, Daniel Kifer, Johannes Gehrke, and Muthuramakrishnan Venkitasubramaniam. March 2007.l-diversity: Privacy beyondk-anonymity.ACM Transactions on Knowledge Discovery from Data1(1): 24.","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Mascetti, Sergio, Claudio Bettini, X. Sean Wang, and Sushil Jajodia. 2006.k-anonymity in databases with timestamped data. InProceedings of the thirteenth international symposium on temporal representation and reasoning, 177\u2013186. Washington, DC: IEEE Computer Society.","DOI":"10.1109\/TIME.2006.20"},{"issue":"3","key":"4_CR19","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1080\/17489720801941789","volume":"1","author":"S Mascetti","year":"2007","unstructured":"Mascetti, Sergio, Claudio Bettini, Dario Freni, and X. Sean Wang. September 2007. Spatial generalisation algorithms for LBS privacy preservation.Journal of Location Based Services1(3): 179\u2013207.","journal-title":"Journal of Location Based Services"},{"key":"4_CR20","unstructured":"Mokbel, Mohamed F., Chi-Yin Chow, and Walid G. Aref. 2006. The new casper: Query processing for location services without compromising privacy. InProceedings of the 32nd international conference on very large data bases, 763\u2013774. VLDB \u201906. Seoul, Korea: VLDB Endowment."},{"key":"4_CR21","volume-title":"Privacy-aware knowledge discovery: Novel applications and new techniques","author":"A Monreale","year":"2010","unstructured":"Monreale, Anna, Dino Pedreschi, and Ruggero G. Pensa. 2010. Anonymity technologies for privacy-preserving data publishing and mining. InPrivacy-aware knowledge discovery: Novel applications and new techniques, ed. F. Bonchi and E. Ferrari. Boca Raton: Chapman & Hall\/CRC Data Mining and Knowledge Discovery Series."},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Narayanan, Arvind, and Vitaly Shmatikov. 2008. Robust de-anonymization of large sparse datasets. InProceedings of 29th IEEE symposium on security and privacy, vol. 0, 111\u2013125. Los Alamitos: IEEE Computer Society.","DOI":"10.1109\/SP.2008.33"},{"key":"4_CR23","first-page":"1701","volume":"57","author":"Paul Ohm","year":"2009","unstructured":"Ohm, Paul. 2009. Broken promises of privacy: Responding to the surprising failure of anonymization.UCLA Law Review57:1701, 2010.","journal-title":"UCLA Law Review"},{"key":"4_CR24","unstructured":"Opinion 4\/2007 of the Article 29 data protection working party on the concept of personal data, WP 136, 20.06.2007."},{"key":"4_CR25","unstructured":"Recommendation No. R (97) 5 of the Committee of Ministers to Member States on the protection of medical data, 13\/02\/1997."},{"key":"4_CR26","unstructured":"Recommendation No. R (97) 18 of the Committee of Ministers to Member States on the protection of personal data collected and processed for statistical purposes, 30\/09\/1997."},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Riboni, Daniele, Linda Pareschi, Claudio Bettini, and Sushil Jajodia. 2009. Preserving anonymity of recurrent location-based queries. InProceedings of the 16th international symposium on temporal representation and reasoning, 62\u201369. TIME \u201909. Washington, DC: IEEE Computer Society.","DOI":"10.1109\/TIME.2009.8"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Samarati, Pierangela, and Latanya Sweeney. 1998. Generalizing data to provide anonymity when disclosing information (abstract). InProceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems, PODS \u201998. New York: ACM.","DOI":"10.1145\/275487.275508"},{"key":"4_CR29","first-page":"1814","volume":"86","author":"PM Schwartz","year":"2011","unstructured":"Schwartz, Paul M., and Daniel J. Solove. 2011. The PII problem: Privacy and a new concept of personally identifiable information.New York University Law Review86: 1814\u20131894.","journal-title":"New York University Law Review"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Terrovitis, Manolis, and Nikos Mamoulis. 2008. Privacy preservation in the publication of trajectories. InProceedings of the ninth international conference on mobile data management, 65\u201372. Washington, DC: IEEE Computer Society.","DOI":"10.1109\/MDM.2008.29"},{"key":"4_CR31","volume-title":"The state of record linkage and current research problems","author":"WE Winkler","year":"1999","unstructured":"Winkler, William E. 1999.The state of record linkage and current research problems. Washington, DC: Statistical Research Division, U.S. Bureau of the Census."},{"key":"4_CR32","unstructured":"Working Party document on data protection issues related to RFID technology, WP 105, 19\/01\/2005, Art. 8."},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Xiao, Xiaokui, and Yufei Tao. 2006. Personalized privacy preservation. InProceedings of the 2006 ACM SIGMOD international conference on management of data, 229\u2013240. SIGMOD \u201906. New York: ACM.","DOI":"10.1145\/1142473.1142500"},{"key":"4_CR34","unstructured":"Yakowitz, Jane. 2011.Tragedy of the data commons. Harvard Journal of Law and Technology, vol. 25, 1."}],"container-title":["European Data Protection: Coming of Age"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-5170-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T05:45:00Z","timestamp":1674193500000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-5170-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,12]]},"ISBN":["9789400751842","9789400751705"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-5170-5_4","relation":{},"subject":[],"published":{"date-parts":[[2012,10,12]]},"assertion":[{"value":"12 October 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}