{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:52:31Z","timestamp":1743105151382,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_25","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"324-335","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On Minimality Attack for Privacy-Preserving Data Publishing"],"prefix":"10.1007","author":[{"given":"K.","family":"Hemantha","sequence":"first","affiliation":[]},{"given":"Nidhi","family":"Desai","sequence":"additional","affiliation":[]},{"given":"Manik Lal","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-540-30570-5_17","volume-title":"Database Theory - ICDT 2005","author":"G Aggarwal","year":"2004","unstructured":"Aggarwal, G., et al.: Anonymizing tables. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol. 3363, pp. 246\u2013258. Springer, Heidelberg (2004). \n                  https:\/\/doi.org\/10.1007\/978-3-540-30570-5_17"},{"issue":"3","key":"25_CR2","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TKDE.2009.91","volume":"22","author":"S Kisilevich","year":"2010","unstructured":"Kisilevich, S., Rokach, L., Elovici, Y., Shapira, B.: Efficient multidimensional suppression for \n                  \n                    \n                  \n                  $$k$$\n                -anonymity. IEEE Trans. Knowl. Data Eng. 22(3), 334\u2013347 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain \n                  \n                    \n                  \n                  $$k$$\n                -anonymity. In: Proceedings of ACM SIGMOD International Conference on Management of Data, pp. 49\u201360. ACM (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional \n                  \n                    \n                  \n                  $$k$$\n                -anonymity. In: Proceedings of the International Conference on Data Engineering, p. 25. IEEE (2006)","DOI":"10.1109\/ICDE.2006.101"},{"issue":"3","key":"25_CR5","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TKDE.2010.236","volume":"24","author":"T Li","year":"2012","unstructured":"Li, T., Li, N., Zhang, J., Molloy, I.: Slicing: a new approach for privacy preserving data publishing. IEEE Trans. Knowl. Data Eng. 24(3), 561\u2013574 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"25_CR6","unstructured":"Wong, R.C.W., Fu, A.W.C., Wang, K., Pei, J.: Minimality attack in privacy preserving data publishing. In: Proceedings of the International Conference on VLDB Endowment, pp. 543\u2013554 (2007)"},{"issue":"1","key":"25_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: \n                  \n                    \n                  \n                  $$l$$\n                -diversity: privacy beyond \n                  \n                    \n                  \n                  $$k$$\n                -anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3 (2007)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"issue":"2","key":"25_CR8","first-page":"101","volume":"4","author":"N Hamza","year":"2013","unstructured":"Hamza, N., Hefny, H.A.: Attacks on anonymization-based privacy-preserving: a survey for data mining and data publishing. Inf. Secur. 4(2), 101 (2013)","journal-title":"Inf. Secur."},{"issue":"5","key":"25_CR9","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: \n                  \n                    \n                  \n                  $$k$$\n                -anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"key":"25_CR10","unstructured":"Adult Data Set, UCI Machine Learning Repository. \n                  https:\/\/archive.ics.uci.edu\/ml\/datasets\/Adult"},{"key":"25_CR11","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proceedings of International Conference Data Mining, pp. 99\u2013106 (2003)"},{"issue":"1\u20132","key":"25_CR12","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.14778\/1920841.1920972","volume":"3","author":"G Cormode","year":"2010","unstructured":"Cormode, G., Srivastava, D., Li, N., Li, T.: Minimizing minimality and maximizing utility: analyzing method-based attacks on anonymized data. Proc. VLDB Endow. 3(1\u20132), 1045\u20131056 (2010)","journal-title":"Proc. VLDB Endow."},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Li, T., Li, N.: On the tradeoff between privacy and utility in data publishing. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 517\u2013526 (2009)","DOI":"10.1145\/1557019.1557079"},{"key":"25_CR14","unstructured":"ARX \u2013 Data Anonymization tool a comprehensive software for privacy-preserving microdata publishing. \n                  http:\/\/arx.deidentifier.org\/overview\/metrics-for-information-loss\/"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 279\u2013288 (2002)","DOI":"10.1145\/775047.775089"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:50:10Z","timestamp":1558396210000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}