{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:10:57Z","timestamp":1765887057931,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,6,9]],"date-time":"2008-06-09T00:00:00Z","timestamp":1212969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,6,9]]},"DOI":"10.1145\/1376616.1376665","type":"proceedings-article","created":{"date-parts":[[2008,6,10]],"date-time":"2008-06-10T14:13:22Z","timestamp":1213107202000},"page":"459-472","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Privacy-MaxEnt"],"prefix":"10.1145","author":[{"given":"Wenliang","family":"Du","sequence":"first","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Zhouxuan","family":"Teng","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Zutao","family":"Zhu","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,6,9]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/375551.375602"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/170035.170072"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/342009.335438"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/ICDE.2005.42"},{"key":"e_1_3_2_1_5_1","volume-title":"A maximum entropy approach to natural language processing. Computational Linguistics, 22(1)","author":"Berger A. L.","year":"1996","unstructured":"A. L. Berger , S. D. Pietra , and V. J. D. Pietra . A maximum entropy approach to natural language processing. Computational Linguistics, 22(1) , 1996 . A. L. Berger, S. D. Pietra, and V. J. D. Pietra. A maximum entropy approach to natural language processing. Computational Linguistics, 22(1), 1996."},{"key":"e_1_3_2_1_6_1","volume-title":"Nonlinear Programming","author":"Bertsekas D. P.","year":"1995","unstructured":"D. P. Bertsekas . Nonlinear Programming . Athena Scientific , Belmont, Massachusetts , 1995 . D. P. Bertsekas. Nonlinear Programming. Athena Scientific, Belmont, Massachusetts, 1995."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of VLDB","author":"Chen B.-C.","year":"2007","unstructured":"B.-C. Chen , K. LeFevre , and R. Ramakrishnan . Privacy skyline: Privacy with multidimensional adversarial knowledge . In Proceedings of VLDB , Vienna, Austria , September 23-28 2007 . B.-C. Chen, K. LeFevre, and R. Ramakrishnan. Privacy skyline: Privacy with multidimensional adversarial knowledge. In Proceedings of VLDB, Vienna, Austria, September 23-28 2007."},{"key":"e_1_3_2_1_8_1","article-title":"Generalized iterative scaling for log-linear models","author":"Darroch J. N.","unstructured":"J. N. Darroch and D. Ratcliff . Generalized iterative scaling for log-linear models . Annals of Mathematicsl Statistics, (32):1470--1480, 1872. J. N. Darroch and D. Ratcliff. Generalized iterative scaling for log-linear models. Annals of Mathematicsl Statistics, (32):1470--1480, 1872.","journal-title":"Annals of Mathematicsl Statistics, (32):1470--1480, 1872."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/775047.775080"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/ICDE.2005.143"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/s10994-005-0911-3"},{"key":"e_1_3_2_1_12_1","first-page":"79","volume-title":"On information and sufficiency","author":"Kullback S.","year":"1951","unstructured":"S. Kullback and R. A. Leibler . On information and sufficiency . pages 79 -- 86 , 1951 . S. Kullback and R. A. Leibler. On information and sufficiency. pages 79--86, 1951."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/1066157.1066164"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/ICDE.2006.101"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/ICDE.2007.367856"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1007\/BF01589116"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_18_1","volume-title":"A comparison of algorithms for maximum entropy parameter estimation","author":"Malouf R.","year":"2002","unstructured":"R. Malouf . A comparison of algorithms for maximum entropy parameter estimation , 2002 . R. Malouf. A comparison of algorithms for maximum entropy parameter estimation, 2002."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 23rd IEEE International Conference on Data Engineering (ICDE)","author":"Martin D. J.","year":"2007","unstructured":"D. J. Martin , D. Kifer , A. Machanavajjhala , J. E. Gehrke , and J. Halpern . Worst case background knowledge . In Proceedings of the 23rd IEEE International Conference on Data Engineering (ICDE) , Istanbul, Turkey , April 15-20 2007 . D. J. Martin, D. Kifer, A. Machanavajjhala, J. E. Gehrke, and J. Halpern. Worst case background knowledge. In Proceedings of the 23rd IEEE International Conference on Data Engineering (ICDE), Istanbul, Turkey, April 15-20 2007."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1109\/34.588021"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.5555\/1287369.1287428"},{"key":"e_1_3_2_1_22_1","volume-title":"Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report","author":"Samarati P.","year":"1998","unstructured":"P. Samarati and L. Sweeney . Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report , 1998 . P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, 1998."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.5555\/645483.656205"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/1150402.1150499"},{"key":"e_1_3_2_1_25_1","first-page":"139","volume-title":"Proceedings of the 32nd Very Large Data Bases conference (VLDB)","author":"Xiao X.","year":"2006","unstructured":"X. Xiao and Y. Tao . Anatomy: Simple and effective privacy preservation . In Proceedings of the 32nd Very Large Data Bases conference (VLDB) , pages 139 -- 150 , Seoul, Korea , September 12-15 2006 . X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In Proceedings of the 32nd Very Large Data Bases conference (VLDB), pages 139--150, Seoul, Korea, September 12-15 2006."}],"event":{"sponsor":["SIGMOD ACM Special Interest Group on Management of Data","ACM Association for Computing Machinery"],"acronym":"SIGMOD\/PODS '08","name":"SIGMOD\/PODS '08: SIGMOD\/PODS '08 - International Conference on Management of Data","location":"Vancouver Canada"},"container-title":["Proceedings of the 2008 ACM SIGMOD international conference on Management of data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1376616.1376665","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1376616.1376665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:58:01Z","timestamp":1750255081000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1376616.1376665"}},"subtitle":["integrating background knowledge in privacy quantification"],"short-title":[],"issued":{"date-parts":[[2008,6,9]]},"references-count":25,"alternative-id":["10.1145\/1376616.1376665","10.1145\/1376616"],"URL":"https:\/\/doi.org\/10.1145\/1376616.1376665","relation":{},"subject":[],"published":{"date-parts":[[2008,6,9]]},"assertion":[{"value":"2008-06-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}