{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T04:31:15Z","timestamp":1744173075557,"version":"3.40.3"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/iri.2012.6303012","type":"proceedings-article","created":{"date-parts":[[2012,9,19]],"date-time":"2012-09-19T20:50:59Z","timestamp":1348087859000},"page":"207-214","source":"Crossref","is-referenced-by-count":3,"title":["A Comparison of anonymization protection principles"],"prefix":"10.1109","author":[{"given":"Alexandre M.","family":"Pinto","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"139","article-title":"Anatomy: Simple and effective privacy preservation","author":"xiao","year":"2006","journal-title":"Proceedings of the 32nd international conference on Very large data bases"},{"key":"17","article-title":"P-sensitive k-anonymity property","author":"traian","year":"2006","journal-title":"Proceedings of International Workshop of Privacy Data in Conjunction with ICDE 2006"},{"key":"18","doi-asserted-by":"crossref","first-page":"754","DOI":"10.1145\/1150402.1150499","article-title":"(?, k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing","author":"wong","year":"2006","journal-title":"KDD"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2010.09.001"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-2053-8","author":"shabtai","year":"2012","journal-title":"A Survey of Data Leakage Detection and Prevention Solutions"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.23"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"journal-title":"Protecting Privacy when Disclosing Information k-anonymity and its Enforcement Through Generalization and Suppression","year":"1998","author":"samarati","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367857"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"key":"2","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/1456403.1456423","article-title":"Yet another privacy metric for publishing microdata","author":"frikken","year":"2008","journal-title":"Proceedings of WPES '08 Alexandria Virginia USA"},{"key":"1","doi-asserted-by":"crossref","first-page":"43","DOI":"10.3233\/JCS-2009-0316","article-title":"Privacy-preserving incremental data dissemination","volume":"17","author":"byun","year":"2009","journal-title":"J Comput Secur"},{"key":"10","first-page":"423","article-title":"Re-identification of dna through an automated linkage process","author":"malin","year":"2001","journal-title":"Journal of the American Medical Informatics Association"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.139"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376666"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1201\/9781420091502","author":"fung","year":"2010","journal-title":"Introduction to Privacy-Preserving Data Publishing Concepts and Techniques"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1353343.1353378"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"8","first-page":"213","article-title":"On optimal anonymization for ?+-diversity","author":"liu","year":"2010","journal-title":"ICDE"}],"event":{"name":"2012 IEEE 13th International Conference on Information Reuse & Integration (IRI)","start":{"date-parts":[[2012,8,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2012,8,10]]}},"container-title":["2012 IEEE 13th International Conference on Information Reuse &amp; Integration (IRI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6294629\/6302564\/06303012.pdf?arnumber=6303012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T02:05:12Z","timestamp":1744164312000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6303012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iri.2012.6303012","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}