{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T02:43:03Z","timestamp":1751337783675,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T00:00:00Z","timestamp":1564358400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T00:00:00Z","timestamp":1564358400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Guidelines for the Application of Big Data in Housing&Urban-Rural Development areas","award":["335016"],"award-info":[{"award-number":["335016"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s13198-019-00834-5","type":"journal-article","created":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T16:02:46Z","timestamp":1564416166000},"page":"768-773","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Clustering-based privacy preserving anonymity approach for table data sharing"],"prefix":"10.1007","volume":"11","author":[{"given":"Chunhui","family":"Piao","sequence":"first","affiliation":[]},{"given":"Liping","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yajuan","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Xuehong","family":"Jiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2646-9195","authenticated-orcid":false,"given":"Ning","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,29]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Aggarwal G, Feder T, Kenthapadi K (2006) Achieving anonymity via clustering. In: Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems. ACM, pp 153\u2013162","key":"834_CR1","DOI":"10.1145\/1142351.1142374"},{"key":"834_CR2","volume-title":"Mathematical methods of statistics (PMS-9)","author":"H Cram\u00e9r","year":"2016","unstructured":"Cram\u00e9r H (2016) Mathematical methods of statistics (PMS-9). Princeton University Press, Princeton"},{"unstructured":"Dong L (2013) Classification mining based on privacy protection. Urban Construction Theory Research: Electronic Edition 22","key":"834_CR3"},{"issue":"01","key":"834_CR4","first-page":"1","volume":"2","author":"B Fang","year":"2016","unstructured":"Fang B, Jia Y, Li A, Jiang R (2016) Summary of big data privacy protection technology. Big Data 2(01):1\u201318","journal-title":"Big Data"},{"unstructured":"Gao Y (2017) Research on key technologies of privacy protection in data publishing. Beijing University of Posts and Telecommunications","key":"834_CR5"},{"unstructured":"Greenacre M, Primicerio R (2013) Measures of distance between samples: noneuclidean. Multivariate analysis of ecological data 5-1","key":"834_CR6"},{"key":"834_CR7","first-page":"2","volume":"3","author":"Z He","year":"2005","unstructured":"He Z, He Z (2005) E-government information resource sharing and protection of personal information privacy. J Intell 3:2\u20134","journal-title":"J Intell"},{"key":"834_CR8","first-page":"1","volume":"10","author":"R Huang","year":"2017","unstructured":"Huang R, Liu L (2017) Personal privacy protection issues and countermeasures in the government data opening of China. Library 10:1\u20135","journal-title":"Library"},{"key":"834_CR9","first-page":"28","volume":"5","author":"R Huang","year":"2017","unstructured":"Huang R, Miao W (2017) Security protection countermeasures of Chinese government open data. E-Government 5:28\u201336","journal-title":"E-Government"},{"issue":"02","key":"834_CR10","first-page":"341","volume":"28","author":"H Jiang","year":"2017","unstructured":"Jiang H, Zeng G, Ma H (2017) Greedy clustering anonymous method for table data publishing privacy protection. Softw J 28(02):341\u2013351","journal-title":"Softw J"},{"issue":"4","key":"834_CR11","doi-asserted-by":"crossref","first-page":"3256","DOI":"10.1016\/j.eswa.2009.09.054","volume":"37","author":"JL Lin","year":"2010","unstructured":"Lin JL, Wen TH, Hsieh JC et al (2010) Density-based microaggregation for statistical disclosure control. Expert Syst Appl 37(4):3256\u20133263","journal-title":"Expert Syst Appl"},{"issue":"05","key":"834_CR12","first-page":"125","volume":"37","author":"X Liu","year":"2016","unstructured":"Liu X, Li Q (2016) Differential privacy protection data publishing method based on clustering anonymization. Commun J 37(05):125\u2013129","journal-title":"Commun J"},{"issue":"2","key":"834_CR13","first-page":"112","volume":"35","author":"L Liu","year":"2017","unstructured":"Liu L, Luo R (2017) Research on government data opening and personal privacy protection from the perspective of big data. Inf Sci 35(2):112\u2013118","journal-title":"Inf Sci"},{"key":"834_CR14","first-page":"199","volume":"08","author":"F Liu","year":"2012","unstructured":"Liu F, Fan H, Jin S, Jia Y (2012) A new k-anonymous privacy protection algorithm. Inf Netw Secur 08:199\u2013202","journal-title":"Inf Netw Secur"},{"key":"834_CR15","first-page":"149","volume":"22","author":"Y Meng","year":"2017","unstructured":"Meng Y (2017) Research on inter-departmental sharing mechanism of government information resources under E-government. China Manag Informationization 22:149\u2013150","journal-title":"China Manag Informationization"},{"key":"834_CR16","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","volume":"20","author":"PJ Rousseeuw","year":"1987","unstructured":"Rousseeuw PJ (1987) Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J Comput Appl Math 20:53\u201365","journal-title":"J Comput Appl Math"},{"unstructured":"The General Office of the State Council (2017) Notice of the general office of the state council on printing and distributing the implementation plan for the integration and sharing of the government information system [EB\/OL]","key":"834_CR17"},{"issue":"06","key":"834_CR18","first-page":"2016","volume":"27","author":"P Wang","year":"2010","unstructured":"Wang P, Wang J (2010) Research progress on anonymized privacy preserving technology. Appl Res Comput 27(06):2016\u20132019","journal-title":"Appl Res Comput"},{"key":"834_CR19","first-page":"54","volume":"5","author":"F Wang","year":"2017","unstructured":"Wang F, Chu J, Zhang Q et al (2017) Inter-departmental government data sharing: problems, reason and countermeasures. Libr Inf 5:54\u201362","journal-title":"Libr Inf"},{"issue":"1","key":"834_CR20","first-page":"82","volume":"32","author":"L Xin","year":"2012","unstructured":"Xin L, Feng GAO (2012) Privacy protection method in E-government information sharing. J Comput Appl 32(1):82\u201385","journal-title":"J Comput Appl"},{"unstructured":"Yongbin Y (2014) Research on privacy preserving method data sharing, PhD thesis. Harbin Engineering University","key":"834_CR21"},{"unstructured":"Yuan Y (2014) Privacy protection method and research in data sharing. Harbin Engineering University","key":"834_CR22"},{"issue":"11","key":"834_CR23","first-page":"12","volume":"38","author":"S Yue","year":"2017","unstructured":"Yue S, Wu W, Gu Y (2017) Research on k-anonymity privacy preserving technology in data release. Software 38(11):12\u201317","journal-title":"Software"},{"unstructured":"Zhang Y (2012) Research on sensitive information protection in data sharing. Dalian Maritime University","key":"834_CR24"},{"issue":"1","key":"834_CR25","first-page":"38","volume":"39","author":"X Zhang","year":"2016","unstructured":"Zhang X, Wang W, Tang C (2016) Research on policy and regulations of Chinese and American government data opening and personal privacy protection. Inf Stud Theory Appl 39(1):38\u201343","journal-title":"Inf Stud Theory Appl"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-019-00834-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13198-019-00834-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-019-00834-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,9]],"date-time":"2020-08-09T06:04:16Z","timestamp":1596953056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13198-019-00834-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,29]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["834"],"URL":"https:\/\/doi.org\/10.1007\/s13198-019-00834-5","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"type":"print","value":"0975-6809"},{"type":"electronic","value":"0976-4348"}],"subject":[],"published":{"date-parts":[[2019,7,29]]},"assertion":[{"value":"7 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}