{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T16:45:46Z","timestamp":1762015546924},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1109\/icde.2010.5447793","type":"proceedings-article","created":{"date-parts":[[2010,12,8]],"date-time":"2010-12-08T12:25:00Z","timestamp":1291811100000},"page":"1081-1092","source":"Crossref","is-referenced-by-count":10,"title":["Data desensitization of customer data for use in optimizer performance experiments"],"prefix":"10.1109","author":[{"given":"Malu","family":"Castellanos","sequence":"first","affiliation":[]},{"given":"Bin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ivo","family":"Jimenez","sequence":"additional","affiliation":[]},{"given":"Perla","family":"Ruiz","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Durazo","sequence":"additional","affiliation":[]},{"given":"Umeshwar","family":"Dayal","sequence":"additional","affiliation":[]},{"given":"Lily","family":"Jow","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Order Preserving Encryption for Numeric Data","author":"srikant","year":"2004","journal-title":"Proceedings of the SIGMOD conference"},{"key":"ref3","article-title":"An O(n log n) algorithm for finding minimal perfect hash functions","author":"fox","year":"1989","journal-title":"Tech Rpt TR-89-10"},{"year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"key":"ref7","article-title":"Data Privacy through Optimal kanonymization","author":"bayardo","year":"2005","journal-title":"Proc ICDE"},{"journal-title":"Hewlett-Packard Internal Document","year":"2009","key":"ref2"},{"year":"0","key":"ref1"}],"event":{"name":"2010 IEEE 26th International Conference on Data Engineering (ICDE 2010)","start":{"date-parts":[[2010,3,1]]},"location":"Long Beach, CA, USA","end":{"date-parts":[[2010,3,6]]}},"container-title":["2010 IEEE 26th International Conference on Data Engineering (ICDE 2010)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5443872\/5447611\/05447793.pdf?arnumber=5447793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T15:54:50Z","timestamp":1489852490000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5447793\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/icde.2010.5447793","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}