{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T23:12:15Z","timestamp":1768432335049,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,6,14]],"date-time":"2005-06-14T00:00:00Z","timestamp":1118707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,6,14]]},"DOI":"10.1145\/1066157.1066164","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"49-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":727,"title":["Incognito"],"prefix":"10.1145","author":[{"given":"Kristen","family":"LeFevre","sequence":"first","affiliation":[{"name":"University of Wisconsin - Madison, Madison, WI"}]},{"given":"David J.","family":"DeWitt","sequence":"additional","affiliation":[{"name":"University of Wisconsin - Madison, Madison, WI"}]},{"given":"Raghu","family":"Ramakrishnan","sequence":"additional","affiliation":[{"name":"University of Wisconsin - Madison, Madison, WI"}]}],"member":"320","published-online":{"date-parts":[[2005,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30570-5_17"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/645920.672836"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"e_1_3_2_1_4_1","volume-title":"Princeton University Press","author":"Bellman R.","year":"1957","unstructured":"R. Bellman . Dynamic Programming . Princeton University Press , Princeton, NJ , 1957 . R. Bellman. Dynamic Programming. Princeton University Press, Princeton, NJ, 1957."},{"key":"e_1_3_2_1_5_1","volume-title":"UCI repository of machine learning databases","author":"Blake C.","year":"1998","unstructured":"C. Blake and C. Merz . UCI repository of machine learning databases , 1998 . C. Blake and C. Merz. UCI repository of machine learning databases, 1998."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/248603.248616"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.143"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009726021843"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/233269.233333"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of the Third Int'l Seminar on Statistical Confidentiality","author":"Hundepool A.","year":"1996","unstructured":"A. Hundepool and L. Willenborg . &mu;- and &mu;-ARGUS: Software for statistical disclosure control . In Proc. of the Third Int'l Seminar on Statistical Confidentiality , 1996 . A. Hundepool and L. Willenborg. &mu;- and &mu;-ARGUS: Software for statistical disclosure control. In Proc. of the Third Int'l Seminar on Statistical Confidentiality, 1996."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775089"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055591"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of the 21st Int'l Conference on Very Large D\u00e1tabases","author":"Srikant R.","year":"1995","unstructured":"R. Srikant and R. Agrawal . Mining generalized association rules . In Proc. of the 21st Int'l Conference on Very Large D\u00e1tabases , August 1995 . R. Srikant and R. Agrawal. Mining generalized association rules. In Proc. of the 21st Int'l Conference on Very Large D\u00e1tabases, August 1995."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1032649.1033461"},{"key":"e_1_3_2_1_20_1","volume-title":"Elements of Statistical Disclosure Control","author":"Willenborg L.","year":"2000","unstructured":"L. Willenborg and T. deWaal . Elements of Statistical Disclosure Control . Springer Verlag Lecture Notes in Statistics, 2000 . L. Willenborg and T. deWaal. Elements of Statistical Disclosure Control. Springer Verlag Lecture Notes in Statistics, 2000."}],"event":{"name":"SIGMOD\/PODS05: International Conference on Management of Data and Symposium on Principles Database and Systems","location":"Baltimore Maryland","acronym":"SIGMOD\/PODS05","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2005 ACM SIGMOD international conference on Management of data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1066157.1066164","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1066157.1066164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:18Z","timestamp":1750262898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1066157.1066164"}},"subtitle":["efficient full-domain K-anonymity"],"short-title":[],"issued":{"date-parts":[[2005,6,14]]},"references-count":18,"alternative-id":["10.1145\/1066157.1066164","10.1145\/1066157"],"URL":"https:\/\/doi.org\/10.1145\/1066157.1066164","relation":{},"subject":[],"published":{"date-parts":[[2005,6,14]]},"assertion":[{"value":"2005-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}