{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:41:32Z","timestamp":1742974892307,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811359064"},{"type":"electronic","value":"9789811359071"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5907-1_25","type":"book-chapter","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T07:01:52Z","timestamp":1549522912000},"page":"240-249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Efficient Model and Algorithm for Privacy-Preserving Trajectory Data Publishing"],"prefix":"10.1007","author":[{"given":"Songyuan","family":"Li","sequence":"first","affiliation":[]},{"given":"Hong","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Yingpeng","family":"Sang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,8]]},"reference":[{"issue":"5","key":"25_CR1","first-page":"1","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-Anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness and Knowl.-Based Syst. 10(5), 1\u201314 (2002)","journal-title":"Int. J. Uncertain. Fuzziness and Knowl.-Based Syst."},{"issue":"1","key":"25_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., et al.: L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3 (2007)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-Anonymity and l-Diversity. In: IEEE, International Conference on Data Engineering, pp. 106\u2013115. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"25_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-21034-1_14","volume-title":"The Semantic Web: Research and Applications","author":"S Tramp","year":"2011","unstructured":"Tramp, S., Frischmuth, P., Arndt, N., Ermilov, T., Auer, S.: Weaving a distributed, semantic social network for mobile users. In: Antoniou, G., Grobelnik, M., Simperl, E., Parsia, B., Plexousakis, D., De Leenheer, P., Pan, J. (eds.) ESWC 2011, Part I. LNCS, vol. 6643, pp. 200\u2013214. Springer, Heidelberg (2011). \n                    https:\/\/doi.org\/10.1007\/978-3-642-21034-1_14"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/978-3-319-42553-5_31","volume-title":"Big Data Computing and Communications","author":"F Li","year":"2016","unstructured":"Li, F., Gao, F., Yao, L., Pan, Yu.: Privacy preserving in the publication of large-scale trajectory databases. In: Wang, Yu., Yu, G., Zhang, Y., Han, Z., Wang, G. (eds.) BigCom 2016. LNCS, vol. 9784, pp. 367\u2013376. Springer, Cham (2016). \n                    https:\/\/doi.org\/10.1007\/978-3-319-42553-5_31"},{"issue":"1","key":"25_CR6","first-page":"3","volume":"56","author":"L Liberti","year":"2012","unstructured":"Liberti, L., et al.: Euclidean distance geometry and applications. Quant. Biol. 56(1), 3\u201369 (2012)","journal-title":"Quant. Biol."},{"issue":"1","key":"25_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.laa.2007.05.049","volume":"408","author":"T Zhu","year":"2005","unstructured":"Zhu, T., et al.: Faces of the cone of Euclidean distance matrices: characterizations, structure and induced geometry. Linear Algebr. Its Appl. 408(1), 1\u201313 (2005)","journal-title":"Linear Algebr. Its Appl."},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Abul, O., Bonchi, F., Nanni, M.: Never walk alone: uncertainty for anonymity in moving objects databases. In: IEEE, International Conference on Data Engineering. IEEE Computer Society, pp. 376\u2013385 (2008)","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"25_CR9","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-662-43813-8_9","volume-title":"Trust Management VIII","author":"A Basu","year":"2014","unstructured":"Basu, A., et al.: A privacy risk model for trajectory data. In: Zhou, J., Gal-Oz, N., Zhang, J., Gudes, E. (eds.) IFIPTM 2014. IAICT, vol. 430, pp. 125\u2013140. Springer, Heidelberg (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-662-43813-8_9"},{"issue":"4","key":"25_CR10","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1016\/j.comcom.2010.03.020","volume":"34","author":"X Sun","year":"2011","unstructured":"Sun, X., Sun, L., Wang, H.: Extended k-anonymity models against sensitive attribute disclosure. Comput. Commun. 34(4), 526\u2013535 (2011)","journal-title":"Comput. Commun."},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Poulis, G., et al.: Distance-based k^m-anonymization of trajectory data. In: IEEE, International Conference on Mobile Data Management, pp. 57\u201362. IEEE (2013)","DOI":"10.1109\/MDM.2013.66"},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.ins.2016.10.038","volume":"378","author":"Y Xin","year":"2017","unstructured":"Xin, Y., Xie, Z.Q., Yang, J.: The privacy preserving method for dynamic trajectory releasing based on adaptive clustering. Inf. Sci. 378, 131\u2013143 (2017)","journal-title":"Inf. Sci."},{"key":"25_CR13","unstructured":"Geometry and applications. Quant. Biol. 56(1), 3\u201369 (2012)"},{"issue":"18","key":"25_CR14","first-page":"20","volume":"53","author":"P Kiran","year":"2013","unstructured":"Kiran, P., Kavya, N.P.: A survey on methods, attacks and metric for privacy preserving data publishing. Int. J. Comput. Appl. 53(18), 20\u201328 (2013)","journal-title":"Int. J. Comput. Appl."},{"issue":"6","key":"25_CR15","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"25_CR16","doi-asserted-by":"publisher","unstructured":"Gehrke, J., Kifer, D., Machanavajjhala, A.: \u2113-Diversity. In: van Tilborg H.C.A., Jajodia S. (eds.) Encyclopedia of Cryptography and Security, pp. 707\u2013709. Springer, Boston (2011). \n                    https:\/\/doi.org\/10.1007\/978-1-4419-5906-5","DOI":"10.1007\/978-1-4419-5906-5"},{"issue":"1","key":"25_CR17","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/2031331.2031336","volume":"13","author":"F Bonchi","year":"2011","unstructured":"Bonchi, F., Lakshmanan, L.V.S., Wang, H.: Trajectory anonymity in publishing personal mobility data. ACM Sigkdd Explor. Newsl. 13(1), 30\u201342 (2011)","journal-title":"ACM Sigkdd Explor. Newsl."},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Shin, H., et al. Ensuring Privacy and Security for LBS through Trajectory Partitioning. In: Eleventh International Conference on Mobile Data Management IEEE Computer Society, pp. 224\u2013226 (2010)","DOI":"10.1109\/MDM.2010.29"}],"container-title":["Communications in Computer and Information Science","Parallel and Distributed Computing, Applications and Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5907-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:01:30Z","timestamp":1558396890000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5907-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811359064","9789811359071"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5907-1_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PDCAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Parallel and Distributed Computing: Applications and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pdcat2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.pdcat2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}