{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T02:26:39Z","timestamp":1766888799722,"version":"3.40.4"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,5,19]],"date-time":"2010-05-19T00:00:00Z","timestamp":1274227200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,5,19]],"date-time":"2010-05-19T00:00:00Z","timestamp":1274227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["The VLDB Journal"],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1007\/s00778-010-0191-9","type":"journal-article","created":{"date-parts":[[2010,5,18]],"date-time":"2010-05-18T15:35:52Z","timestamp":1274196952000},"page":"59-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":53,"title":["SABRE: a Sensitive Attribute Bucketization and REdistribution framework for t-closeness"],"prefix":"10.1007","volume":"20","author":[{"given":"Jianneng","family":"Cao","sequence":"first","affiliation":[]},{"given":"Panagiotis","family":"Karras","sequence":"additional","affiliation":[]},{"given":"Panos","family":"Kalnis","sequence":"additional","affiliation":[]},{"given":"Kian-Lee","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,5,19]]},"reference":[{"key":"191_CR1","unstructured":"http:\/\/www.ipums.org"},{"key":"191_CR2","doi-asserted-by":"crossref","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Khuller, S., Panigrahy, R., Thomas, D., Zhu A.: Achieving anonymity via clustering. In: Proceedings of PODS (2006)","DOI":"10.1145\/1142351.1142374"},{"key":"191_CR3","doi-asserted-by":"crossref","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing tables. In: Proceedings of ICDT (2005)","DOI":"10.1007\/978-3-540-30570-5_17"},{"key":"191_CR4","unstructured":"Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proceedings of ICDE (2005)"},{"key":"191_CR5","doi-asserted-by":"crossref","unstructured":"Byun, J.-W., Sohn, Y., Bertino, E., Li, N.: Secure anonymization for incremental datasets. In: Secure Data Management, pp. 48\u201363 (2006)","DOI":"10.1007\/11844662_4"},{"key":"191_CR6","doi-asserted-by":"crossref","unstructured":"Cao, J., Carminati, B., Ferrari, E., Tan, K.-L.: Castle: A delay- constrained scheme for ks-anonymizing data streams. In: Proceedings of ICDE (2008)","DOI":"10.1109\/ICDE.2008.4497561"},{"key":"191_CR7","unstructured":"Cao, J., Carminati, B., Ferrari, E., Tan, K.-L.: Castle: Continuously anonymizing data streams. Accepted by IEEE Transactions on Dependable and Secure Computing (2009)"},{"key":"191_CR8","doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Wang, K., Fu, A.W.-C., Pei, J.: Anonymity for continuous data publishing. In: Proceedings of EDBT (2008)","DOI":"10.1145\/1352431.1352466"},{"key":"191_CR9","unstructured":"Fung, B.C.M., Wang, K., Yu, P.S.: Top-down specialization for information and privacy preservation. In: Proceedings of ICDE (2005)"},{"key":"191_CR10","unstructured":"Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast data anonymization with low information loss. In: Proceedings of VLDB (2007)"},{"issue":"2","key":"191_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1538909.1538911","volume":"34","author":"G. Ghinita","year":"2009","unstructured":"Ghinita G., Karras P., Kalnis P., Mamoulis N.: A framework for efficient data anonymization under privacy and accuracy constraints. ACM Trans. Database Syst. 34(2), 1\u201347 (2009)","journal-title":"ACM Trans. Database Syst."},{"key":"191_CR12","doi-asserted-by":"crossref","unstructured":"Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: Proceedings of KDD (2002)","DOI":"10.1145\/775088.775089"},{"key":"191_CR13","unstructured":"Kooiman, P., Willenborg, L., Gouweleeuw, J.: Pram: A method for disclosure limitation for microdata. Research paper\/Statistics Netherlands (9705) (1997)"},{"key":"191_CR14","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan R.: Incognito: Efficient full-domain k-anonymity. In: Proceedings of SIGMOD (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"191_CR15","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: ICDE (2006)","DOI":"10.1109\/ICDE.2006.101"},{"key":"191_CR16","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Workload-aware anonymization. In: Proceedings of KDD (2006)","DOI":"10.1145\/1150402.1150435"},{"key":"191_CR17","doi-asserted-by":"crossref","unstructured":"Li, J., Tao, Y., Xiao, X.: Preservation of proximity privacy in publishing numerical sensitive data. In: Proceedings of SIGMOD (2008)","DOI":"10.1145\/1376616.1376666"},{"key":"191_CR18","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian S.: t-closeness: Privacy beyond k-anonymity and \u2113-diversity. In: Proceedings of ICDE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"191_CR19","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: Closeness: a new privacy measure for data publishing. In: To appear in IEEE Transactions on Knowledge and Data Engineering (2009)"},{"key":"191_CR20","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: \u2113-diversity: privacy beyond k-anonymity. In: Proceedings of ICDE (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"191_CR21","doi-asserted-by":"crossref","unstructured":"Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: Proceedings of PODS (2004)","DOI":"10.1145\/1055558.1055591"},{"issue":"1","key":"191_CR22","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/69.908985","volume":"13","author":"B. Moon","year":"2001","unstructured":"Moon B., Jagadish H.V., Faloutsos C., Saltz J.H.: Analysis of the clustering properties of the hilbert space-filling curve. IEEE Trans. Knowl. Data Eng. 13(1), 124\u2013141 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"191_CR23","doi-asserted-by":"crossref","unstructured":"Pei, J., Xu, J., Wang, Z., Wang, W., Wang, K.: Maintaining k-anonymity against incremental updates. In: Proceedings of SSDBM (2007)","DOI":"10.1109\/SSDBM.2007.16"},{"key":"191_CR24","doi-asserted-by":"crossref","unstructured":"Rebollo-Monedero, D., Forn\u00e9, J., Domingo-Ferrer, J.: From t-closeness-like privacy to postrandomization via information theory. In: To appear in IEEE Transactions on Knowledge and Data Engineering (2009)","DOI":"10.1109\/TKDE.2009.190"},{"key":"191_CR25","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1023\/A:1026543900054","volume":"40","author":"Y. Rubner","year":"2000","unstructured":"Rubner Y., Tomasi C., Guibas L.J.: The earth mover\u2019s distance as a metric for image retrieval. Int. J. Comput. Vis. 40, 99\u2013121 (2000)","journal-title":"Int. J. Comput. Vis."},{"issue":"6","key":"191_CR26","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati P.: Protecting respondents\u2019 identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"191_CR27","doi-asserted-by":"crossref","unstructured":"Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: Proceedings of PODS (1998)","DOI":"10.1145\/275487.275508"},{"key":"191_CR28","doi-asserted-by":"crossref","unstructured":"Wang, K., Fung, B.C.M.: Anonymizing sequential releases. In: Proceedings of KDD (2006)","DOI":"10.1145\/1150402.1150449"},{"key":"191_CR29","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation. In: Proceedings of VLDB (2006)","DOI":"10.1145\/1142473.1142500"},{"key":"191_CR30","doi-asserted-by":"crossref","unstructured":"Xiao, X., Ta,o Y.: M-invariance: towards privacy preserving re-publication of dynamic datasets. In: Proceedings of SIGMOD (2007)","DOI":"10.1145\/1247480.1247556"},{"key":"191_CR31","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Dynamic anonymization: accurate statistical analysis with privacy preservation. In: Proceedings of SIGMOD (2008)","DOI":"10.1145\/1376616.1376630"},{"key":"191_CR32","doi-asserted-by":"crossref","unstructured":"Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W.-C. Utility-based anonymization using local recoding. In: Proceedings of KDD (2006)","DOI":"10.1145\/1150402.1150504"},{"key":"191_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Koudas, N., Srivastava, D., Yu, T.: Aggregate query answering on anonymized tables. In: Proceedings of ICDE (2007)","DOI":"10.1109\/ICDE.2007.367857"}],"container-title":["The VLDB Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-010-0191-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00778-010-0191-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-010-0191-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-010-0191-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T03:36:57Z","timestamp":1744169817000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00778-010-0191-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5,19]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,2]]}},"alternative-id":["191"],"URL":"https:\/\/doi.org\/10.1007\/s00778-010-0191-9","relation":{},"ISSN":["1066-8888","0949-877X"],"issn-type":[{"type":"print","value":"1066-8888"},{"type":"electronic","value":"0949-877X"}],"subject":[],"published":{"date-parts":[[2010,5,19]]},"assertion":[{"value":"1 July 2009","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2010","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2010","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2010","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}