{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T12:16:15Z","timestamp":1775736975852,"version":"3.50.1"},"reference-count":48,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/icdew.2013.6547433","type":"proceedings-article","created":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T14:58:15Z","timestamp":1373381895000},"page":"88-93","source":"Crossref","is-referenced-by-count":101,"title":["On syntactic anonymity and differential privacy"],"prefix":"10.1109","author":[{"given":"C.","family":"Clifton","sequence":"first","affiliation":[]},{"given":"T.","family":"Tassa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.85"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.12.020"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374464"},{"key":"36","first-page":"414","article-title":"Anonymizing sequential release","author":"wang","year":"2006","journal-title":"KDD"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536467"},{"key":"33","first-page":"901","article-title":"On k-anonymity and the curse of dimensionality","author":"aggarwal","year":"2005","journal-title":"VLDB"},{"key":"15","author":"moore","year":"1996","journal-title":"Controlled Data-Swapping Techniques for Masking Public Use Microdata Sets"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.11.005"},{"key":"16","article-title":"On sampling, anonymization, and differential privacy: Or, k-anonymization meets differential privacy","author":"li","year":"2012","journal-title":"7th ACM Symposium on Information Computer and Communications Security (ASIACCS'2012)"},{"key":"39","first-page":"1","article-title":"Evaluating laplace noise addition to satisfy differential privacy for numeric data","volume":"4","author":"sarathy","year":"2011","journal-title":"Transactions on Data Privacy"},{"key":"13","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"TCC"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1743546.1743558"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M3144"},{"key":"11","first-page":"1","article-title":"Differential privacy","author":"dwork","year":"2006","journal-title":"ICALP"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2716"},{"key":"12","first-page":"53181","article-title":"Standard for privacy of individually identifiable health information","volume":"67","year":"2002","journal-title":"Federal Register"},{"key":"21","first-page":"1087","article-title":"Publishing set-valued data via differential privacy","volume":"4","author":"chen","year":"2011","journal-title":"PVLDB"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806794"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339695"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24861-0_22"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2009.tm08651"},{"key":"48","first-page":"31","volume":"1","year":"1995","journal-title":"Official Journal of the European Communities"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.73"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989345"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1145\/2213556.2213571"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_26"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1015"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775089"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.03.009"},{"key":"25","first-page":"149","article-title":"Efficient anonymizations with enhanced utility","volume":"3","author":"goldberger","year":"2010","journal-title":"TDP"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1386118.1386123"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557157"},{"key":"28","first-page":"602","article-title":"From statistics to beliefs","author":"bacchus","year":"1992","journal-title":"AAAI"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559861"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807248"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"30","first-page":"1253","article-title":"Personal privacy vs population privacy: Learning to attack anonymization","author":"cormode","year":"2011","journal-title":"KDD"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497483"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350255"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920972"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"31","first-page":"543","article-title":"Minimality attack in privacy preserving data publishing","author":"wong","year":"2007","journal-title":"VLDB"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.07.034"},{"key":"8","first-page":"189","article-title":"K-concealment: An alternative model of k-type anonymity","volume":"5","author":"tassa","year":"2012","journal-title":"Transactions on Data Privacy"}],"event":{"name":"2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW 2013)","location":"Brisbane, QLD","start":{"date-parts":[[2013,4,8]]},"end":{"date-parts":[[2013,4,12]]}},"container-title":["2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6530813\/6547400\/06547433.pdf?arnumber=6547433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:42:49Z","timestamp":1490229769000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6547433\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/icdew.2013.6547433","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}