{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T05:34:42Z","timestamp":1769319282074,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,6,9]],"date-time":"2008-06-09T00:00:00Z","timestamp":1212969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,6,9]]},"DOI":"10.1145\/1376616.1376666","type":"proceedings-article","created":{"date-parts":[[2008,6,10]],"date-time":"2008-06-10T14:13:22Z","timestamp":1213107202000},"page":"473-486","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":72,"title":["Preservation of proximity privacy in publishing numerical sensitive data"],"prefix":"10.1145","author":[{"given":"Jiexing","family":"Li","sequence":"first","affiliation":[{"name":"Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Yufei","family":"Tao","sequence":"additional","affiliation":[{"name":"Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Xiaokui","family":"Xiao","sequence":"additional","affiliation":[{"name":"Chinese University of Hong Kong, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2008,6,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24741-8_12"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142351.1142374"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30570-5_17"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1287369.1287383"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066187"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/293910.293151"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545190"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065184"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11844662_4"},{"key":"e_1_3_2_1_12_1","first-page":"770","volume-title":"Proc. of Very Large Data Bases (VLDB)","author":"Chen B.-C.","year":"2007","unstructured":"B.-C. Chen , R. Ramakrishnan , and K. LeFevre . Privacy skyline: Privacy with multidimensional adversarial knowledge . In Proc. of Very Large Data Bases (VLDB) , pages 770 -- 781 , 2007 . B.-C. Chen, R. Ramakrishnan, and K. LeFevre. Privacy skyline: Privacy with multidimensional adversarial knowledge. In Proc. of Very Large Data Bases (VLDB), pages 770--781, 2007."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.369026"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/360680.360691"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.143"},{"key":"e_1_3_2_1_18_1","first-page":"758","volume-title":"Proc. of Very Large Data Bases (VLDB)","author":"Ghinita G.","year":"2007","unstructured":"G. Ghinita , P. Karras , P. Kalnis , and N. Mamoulis . Fast data anonymization with low information loss . In Proc. of Very Large Data Bases (VLDB) , pages 758 -- 769 , 2007 . G. Ghinita, P. Karras, P. Kalnis, and N. Mamoulis. Fast data anonymization with low information loss. In Proc. of Very Large Data Bases (VLDB), pages 758--769, 2007."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1325851.1325937"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775089"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0008-z"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142499"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150435"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. of International Conference on Data Engineering (ICDE)","author":"Martin D.","year":"2007","unstructured":"D. Martin , D. Kifer , A. Machanavajjhala , J. Gehrke , and J. Halpern . Worst-case background knowledge in privacy . In Proc. of International Conference on Data Engineering (ICDE) , 2007 . D. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, and J. Halpern. Worst-case background knowledge in privacy. In Proc. of International Conference on Data Engineering (ICDE), 2007."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055591"},{"key":"e_1_3_2_1_30_1","first-page":"151","volume-title":"Proc. of Very Large Data Bases (VLDB)","author":"Nabar S. U.","year":"2006","unstructured":"S. U. Nabar , B. Marthi , K. Kenthapadi , N. Mishra , and R. Motwani . Towards robustness in query auditing . In Proc. of Very Large Data Bases (VLDB) , pages 151 -- 162 , 2006 . S. U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra, and R. Motwani. Towards robustness in query auditing. In Proc. of Very Large Data Bases (VLDB), pages 151--162, 2006."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247554"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247490"},{"key":"e_1_3_2_1_33_1","first-page":"531","volume-title":"Proc. of Very Large Data Bases (VLDB)","author":"Rastogi V.","year":"2007","unstructured":"V. Rastogi , S. Hong , and D. Suciu . The boundary between privacy and utility in data publishing . In Proc. of Very Large Data Bases (VLDB) , pages 531 -- 542 , 2007 . V. Rastogi, S. Hong, and D. Suciu. The boundary between privacy and utility in data publishing. In Proc. of Very Large Data Bases (VLDB), pages 531--542, 2007."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/592642.592646"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956776"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150449"},{"key":"e_1_3_2_1_39_1","first-page":"543","volume-title":"Proc. of Very Large Data Bases (VLDB)","author":"Wong R. C.-W.","year":"2007","unstructured":"R. C.-W. Wong , A. W.-C. Fu , K. Wang , and J. Pei . Minimality attack in privacy preserving data publishing . In Proc. of Very Large Data Bases (VLDB) , pages 543 -- 554 , 2007 . R. C.-W. Wong, A. W.-C. Fu, K. Wang, and J. Pei. Minimality attack in privacy preserving data publishing. In Proc. of Very Large Data Bases (VLDB), pages 543--554, 2007."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150499"},{"key":"e_1_3_2_1_41_1","first-page":"139","volume-title":"Proc. of Very Large Data Bases (VLDB)","author":"Xiao X.","year":"2006","unstructured":"X. Xiao and Y. Tao . Anatomy: Simple and effective privacy preservation . In Proc. of Very Large Data Bases (VLDB) , pages 139 -- 150 , 2006 . X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In Proc. of Very Large Data Bases (VLDB), pages 139--150, 2006."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150504"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367857"}],"event":{"name":"SIGMOD\/PODS '08: SIGMOD\/PODS '08 - International Conference on Management of Data","location":"Vancouver Canada","acronym":"SIGMOD\/PODS '08","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2008 ACM SIGMOD international conference on Management of data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1376616.1376666","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1376616.1376666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:58:01Z","timestamp":1750255081000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1376616.1376666"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,9]]},"references-count":44,"alternative-id":["10.1145\/1376616.1376666","10.1145\/1376616"],"URL":"https:\/\/doi.org\/10.1145\/1376616.1376666","relation":{},"subject":[],"published":{"date-parts":[[2008,6,9]]},"assertion":[{"value":"2008-06-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}