{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:38:13Z","timestamp":1762004293871,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1109\/dbta.2010.5659106","type":"proceedings-article","created":{"date-parts":[[2010,12,11]],"date-time":"2010-12-11T13:53:44Z","timestamp":1292075624000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Research on Diversity of Sensitive Attribute of K-Anonymity"],"prefix":"10.1109","author":[{"given":"Xiangmin","family":"Ren","sequence":"first","affiliation":[]},{"given":"Jing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Fengmei","family":"Wei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"ref3","first-page":"2021","article-title":"Research in Microaggregation Algorithms for k-Anonymization","volume":"36","author":"han","year":"2008","journal-title":"Acta Electronica Sinica"},{"key":"ref10","first-page":"173","article-title":"K-anonymity via Twice Clustering for Privacy Preservation","volume":"27","author":"li","year":"2009","journal-title":"Journal of Jilin University"},{"key":"ref6","first-page":"94","article-title":"Privacy protection: P-Sensitive K-Anonymity property","author":"truta t","year":"2006","journal-title":"Proceedings of the 22nd International Conference on Data Engineering Workshops 2006"},{"key":"ref11","first-page":"1109","article-title":"Anonymity model based on expectation of sensitive attribute value","volume":"26","author":"wang","year":"2009","journal-title":"Application Research of Computers"},{"key":"ref5","first-page":"754","article-title":"$(\\alpha,{\\rm k})$-anonymity: an enhanced k-anonymity model for privacy preserving data publishing","author":"wong","year":"2006","journal-title":"KDD"},{"key":"ref12","first-page":"82","article-title":"(L,K)-anonmity based on clustering","volume":"31","author":"luo","year":"2007","journal-title":"JOURNAL OF YANSHAN UNIVERSITY"},{"key":"ref8","first-page":"116","article-title":"Aggregate query answering on anonymized tables","author":"koudas","year":"2007","journal-title":"Proceedings of the 23th International Conference on Data Engineering"},{"key":"ref7","first-page":"106","article-title":"LIT.t-closeness:Privacy beyond K-anonymity and 1-diversity","year":"2007","journal-title":"Proceedings of IEEE 23rd International Conference on Data Engineering"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref9","first-page":"59","article-title":"(p+, $\\alpha)$-sensitive k-anonymity: A new enhanced privacy protection model","author":"sun","year":"2008","journal-title":"Proceedings-2008 IEEE 8th International Conference on Computer and Information Technology CIT 2008"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"}],"event":{"name":"2010 2nd International Workshop on Database Technology and Applications (DBTA)","start":{"date-parts":[[2010,11,27]]},"location":"Wuhan, China","end":{"date-parts":[[2010,11,28]]}},"container-title":["2010 2nd International Workshop on Database Technology and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5658186\/5658597\/05659106.pdf?arnumber=5659106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T10:51:42Z","timestamp":1490093502000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5659106\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/dbta.2010.5659106","relation":{},"subject":[],"published":{"date-parts":[[2010,11]]}}}