{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:32:02Z","timestamp":1761597122207},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2009,1,8]],"date-time":"2009-01-08T00:00:00Z","timestamp":1231372800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1007\/s10844-008-0075-2","type":"journal-article","created":{"date-parts":[[2009,1,7]],"date-time":"2009-01-07T04:52:11Z","timestamp":1231303931000},"page":"209-234","source":"Crossref","is-referenced-by-count":33,"title":["(\u03b1, k)-anonymous data publishing"],"prefix":"10.1007","volume":"33","author":[{"given":"Raymond","family":"Wong","sequence":"first","affiliation":[]},{"given":"Jiuyong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ada","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,1,8]]},"reference":[{"key":"75_CR1","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., et al. (2005). Anonymizing tables. In ICDT (pp. 246\u2013258)."},{"key":"75_CR2","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1145\/375551.375602","volume-title":"PODS \u201901: Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems","author":"D. Agrawal","year":"2001","unstructured":"Agrawal, D., & Aggarwal, C. C. (2001). On the design and quantification of privacy preserving data mining algorithms. In PODS \u201901: Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (pp. 247\u2013255). New York: ACM."},{"key":"75_CR3","unstructured":"Agrawal, R., & Srikant, R. (1994). Fast algorithms for mining association rules. In VLDB."},{"key":"75_CR4","first-page":"439","volume-title":"Proc. of the ACM SIGMOD conference on management of data","author":"R. Agrawal","year":"2000","unstructured":"Agrawal, R., & Srikant, R. (2000). Privacy-preserving data mining. In Proc. of the ACM SIGMOD conference on management of data (pp. 439\u2013450). New York: ACM."},{"key":"75_CR5","doi-asserted-by":"crossref","unstructured":"Bayardo, R., & Agrawal, R. (2005). Data privacy through optimal k-anonymization. In ICDE (pp. 217\u2013228).","DOI":"10.1109\/ICDE.2005.42"},{"key":"75_CR6","unstructured":"Blake, E. K. C., & Merz, C. J. (1998). UCI repository of machine learning databases. http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html ."},{"key":"75_CR7","doi-asserted-by":"crossref","unstructured":"Bu, Y., Fu, A. W.-C., Wong, R. C.-W., Chen, L., & Li, J. (2008). Privacy preserving serial data publishing by role composition. In VLDB.","DOI":"10.14778\/1453856.1453948"},{"key":"75_CR8","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1080\/01621459.1980.10477481","volume":"75","author":"L. Cox","year":"1980","unstructured":"Cox, L. (1980). Suppression methodology and statistical disclosure control. Journal of the American Statistical Association, 75, 377\u2013385.","journal-title":"Journal of the American Statistical Association"},{"key":"75_CR9","first-page":"1022","volume-title":"Proceedings of the thirteenth international joint conference on artificial intelligence (IJCAI-93)","author":"U. M. Fayyad","year":"1993","unstructured":"Fayyad, U. M., & Irani, K. B. (1993). Multi-interval discretization of continuous-valued attributes for classification learning. In Proceedings of the thirteenth international joint conference on artificial intelligence (IJCAI-93) (pp. 1022\u20131027). San Francisco: Morgan Kaufmann."},{"key":"75_CR10","doi-asserted-by":"crossref","unstructured":"Fung, B. C. M., Wang, K., & Yu, P. S. (2005). Top-down specialization for information and privacy preservation. In ICDE (pp. 205\u2013216).","DOI":"10.1109\/ICDE.2005.143"},{"key":"75_CR11","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1137\/0210054","volume":"10","author":"I. Holyer","year":"1981","unstructured":"Holyer, I. (1981). The np-completeness of some edge-partition problems. SIAM Journal on Computing, 10(4), 713\u2013717.","journal-title":"SIAM Journal on Computing"},{"key":"75_CR12","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/978-3-540-25955-8_26","volume-title":"Privacy in statistical databases. Lecture notes in computer science (Vol. 3050)","author":"A. Hundepool","year":"2004","unstructured":"Hundepool, A. (2004). The argus software in the casc-project: Casc project international workshop. In Privacy in statistical databases. Lecture notes in computer science (Vol. 3050, pp. 323\u2013335). Barcelona: Springer."},{"key":"75_CR13","unstructured":"Hundepool, A., & Willenborg, L. (1996). \u03bc-and \u03c4- argus: Software for statistical disclosure control. In Third international seminar on statsitcal confidentiality, Bled."},{"key":"75_CR14","unstructured":"Iyengar, V. S. (2002). Transforming data to satisfy privacy constraints. In KDD \u201902: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 279\u2013288)."},{"key":"75_CR15","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D. J., & Ramakrishnan, R. (2005). Incognito: Efficient full-domain k-anonymity. In SIGMOD conference (pp. 49\u201360).","DOI":"10.1145\/1066157.1066164"},{"key":"75_CR16","doi-asserted-by":"crossref","unstructured":"Li, J., Wong, R. C.-W., Fu, A. W.-C., & Pei, J. (2006). Achieving k-anonymity by clustering in attribute hierarchical structures. In DaWaK.","DOI":"10.1007\/11823728_39"},{"key":"75_CR17","doi-asserted-by":"crossref","unstructured":"Li, N., & Li, T. (2007). t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"75_CR18","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., & Kifer, D. (2006). l-diversity: Privacy beyond k-anonymity. In ICDE06.","DOI":"10.1109\/ICDE.2006.1"},{"key":"75_CR19","doi-asserted-by":"crossref","unstructured":"Meyerson, A., & Williams, R. (2004). On the complexity of optimal k-anonymity. In PODS (pp. 223\u2013228).","DOI":"10.1145\/1055558.1055591"},{"key":"75_CR20","doi-asserted-by":"crossref","unstructured":"Rizvi, S., & Haritsa, J. (2002). Maintaining data privacy in association rule mining. In Proceedings of the 28th conference on very large data base (VLDB02) (pp. 682\u2013693). VLDB Endowment.","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"issue":"6","key":"75_CR21","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P. (2001). Protecting respondents\u2019 identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6), 1010\u20131027.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"5","key":"75_CR22","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L. (2002a). Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowldege Based Systems, 10(5), 571\u2013588.","journal-title":"International Journal on Uncertainty, Fuzziness and Knowldege Based Systems"},{"issue":"5","key":"75_CR23","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L. (2002b). k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowldeg Based Systems, 10(5), 557\u2013570.","journal-title":"International Journal on Uncertainty, Fuzziness and Knowldeg Based Systems"},{"issue":"4","key":"75_CR24","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1109\/TKDE.2004.1269668","volume":"16","author":"V. S. Verykios","year":"2004","unstructured":"Verykios, V. S., Elmagarmid, A. K., Bertino, E., Saygin, Y., & Dasseni, E. (2004). Association rule hiding. IEEE Transactions on Knowledge and Data Engineering, 16(4), 434\u2013447.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"75_CR25","doi-asserted-by":"crossref","unstructured":"Wang, K., Fung, B. C. M., & Yu, P. S. (2005). Template-based privacy preservation in classification problems. In ICDM05.","DOI":"10.1109\/ICDM.2005.142"},{"issue":"3","key":"75_CR26","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/s10115-006-0035-5","volume":"11","author":"K. Wang","year":"2007","unstructured":"Wang, K., Fung, B., & Yu, P. (2007). Handicapping attacker\u2019s confidence: An alternative to k-anonymization. Knowledge and Information Systems: An International Journal, 11(3), 345\u2013368.","journal-title":"Knowledge and Information Systems: An International Journal"},{"key":"75_CR27","doi-asserted-by":"crossref","unstructured":"Wang, K., Yu, P. S., & Chakraborty, S. (2004). Bottom-up generalization: A data mining solution to privacy protection. In ICDM (pp. 249\u2013256).","DOI":"10.1109\/ICDM.2004.10110"},{"key":"75_CR28","doi-asserted-by":"crossref","unstructured":"Willenborg, L., & de\u00a0Waal, T. (1996). Statistical disclosure control in practice. Lecture Notes in Statistics, 111.","DOI":"10.1007\/978-1-4612-4028-0_1"},{"key":"75_CR29","doi-asserted-by":"crossref","unstructured":"Xiao, X., & Tao, Y. (2006). Personalized privacy preservation. In SIGMOD.","DOI":"10.1145\/1142473.1142500"},{"key":"75_CR30","doi-asserted-by":"crossref","unstructured":"Xiao, X., & Tao, Y. (2007). m-invariance: Towards privacy preserving re-publication of dynamic datasets. In SIGMOD.","DOI":"10.1145\/1247480.1247556"},{"key":"75_CR31","doi-asserted-by":"crossref","unstructured":"Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., & Fu, A. (2006). Utility-based anonymization using local recoding. In KDD.","DOI":"10.1145\/1150402.1150504"}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-008-0075-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-008-0075-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-008-0075-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T18:24:29Z","timestamp":1709922269000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-008-0075-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1,8]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["75"],"URL":"https:\/\/doi.org\/10.1007\/s10844-008-0075-2","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"value":"0925-9902","type":"print"},{"value":"1573-7675","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,1,8]]}}}