{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:24:34Z","timestamp":1760783074326,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,31]],"date-time":"2008-10-31T00:00:00Z","timestamp":1225411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,31]]},"DOI":"10.1145\/1456441.1456453","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"31-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["A survey of state-of-the-art in anonymity metrics"],"prefix":"10.1145","author":[{"given":"Douglas J.","family":"Kelly","sequence":"first","affiliation":[{"name":"Air Force Institute of Technology, Dayton, OH, USA"}]},{"given":"Richard A.","family":"Raines","sequence":"additional","affiliation":[{"name":"Air Force Institute of Technology, Dayton, OH, USA"}]},{"given":"Michael R.","family":"Grimaila","sequence":"additional","affiliation":[{"name":"Air Force Institute of Technology, Dayton, OH, USA"}]},{"given":"Rusty O.","family":"Baldwin","sequence":"additional","affiliation":[{"name":"Air Force Institute of Technology, Dayton, OH, USA"}]},{"given":"Barry E.","family":"Mullins","sequence":"additional","affiliation":[{"name":"Air Force Institute of Technology, Dayton, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Taming the Devil: Techniques for Evaluating Anonymized Network Data,\" presented at Internet Society (ISOC) Symposium on Network and Distributed Systems Security (SNDSS)","author":"Coull G. F.","year":"2008","unstructured":"G. F. Coull , C. V. Wright , A. D. Keromytis , F. Monrose , and M. Reiter , \" Taming the Devil: Techniques for Evaluating Anonymized Network Data,\" presented at Internet Society (ISOC) Symposium on Network and Distributed Systems Security (SNDSS) , San Diego, CA , 2008 . G. F. Coull, C. V. Wright, A. D. Keromytis, F. Monrose, and M. Reiter, \"Taming the Devil: Techniques for Evaluating Anonymized Network Data,\" presented at Internet Society (ISOC) Symposium on Network and Distributed Systems Security (SNDSS), San Diego, CA, 2008."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"e_1_3_2_1_3_1","volume-title":"Towards Measuring Anonymity,\" presented at Privacy Enhancing Technologies Workshop (PET)","author":"Diaz C.","year":"2002","unstructured":"C. Diaz , S. Seys , J. Claessens , and B. Preneel , \" Towards Measuring Anonymity,\" presented at Privacy Enhancing Technologies Workshop (PET) , 2002 . C. Diaz, S. Seys, J. Claessens, and B. Preneel, \"Towards Measuring Anonymity,\" presented at Privacy Enhancing Technologies Workshop (PET), 2002."},{"key":"e_1_3_2_1_4_1","volume-title":"Belgium","author":"Diaz C.","year":"2002","unstructured":"C. Diaz , J. Claessens , S. Seys , and B. Preneel , \" Information Theory and Anonymity,\" presented at 23rd Symposium on Information Theory in the Benelux, Louvain la Neuve , Belgium , 2002 . C. Diaz, J. Claessens, S. Seys, and B. Preneel, \"Information Theory and Anonymity,\" presented at 23rd Symposium on Information Theory in the Benelux, Louvain la Neuve, Belgium, 2002."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_3_2_1_6_1","volume-title":"An Analysis of the Degradation of Anonymous Protocols,\" presented at Network and Distributed Security Symposium (NDSS)","author":"Wright M.","year":"2002","unstructured":"M. Wright , M. Adler , B. Levine , and C. Shields , \" An Analysis of the Degradation of Anonymous Protocols,\" presented at Network and Distributed Security Symposium (NDSS) , 2002 . M. Wright, M. Adler, B. Levine, and C. Shields, \"An Analysis of the Degradation of Anonymous Protocols,\" presented at Network and Distributed Security Symposium (NDSS), 2002."},{"key":"e_1_3_2_1_7_1","volume-title":"15th IEEE on Computer Security Foundations Workshop","author":"Shmatikov V.","year":"2002","unstructured":"V. Shmatikov , \" Probabilistic Analysis of Anonymity ,\" presented at 15th IEEE on Computer Security Foundations Workshop , 2002 . V. Shmatikov, \"Probabilistic Analysis of Anonymity,\" presented at 15th IEEE on Computer Security Foundations Workshop, 2002."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"Shafer G.","year":"1976","unstructured":"G. Shafer , A Mathematical Theory of Evidence . Princeton, NJ : Princeton University Press , 1976 . G. Shafer, A Mathematical Theory of Evidence. Princeton, NJ: Princeton University Press, 1976."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/03081078308960825"},{"key":"e_1_3_2_1_10_1","unstructured":"F. Cuzzolin \"The Theory of Evidence \" 2005.  F. Cuzzolin \"The Theory of Evidence \" 2005."},{"key":"e_1_3_2_1_11_1","volume-title":"31st IEEE Local Computer Networks Conference","author":"Dijiang H.","year":"2006","unstructured":"H. Dijiang , \" On Measuring Anonymity For Wireless Mobile Ad-hoc Networks ,\" presented at 31st IEEE Local Computer Networks Conference , 2006 . H. Dijiang, \"On Measuring Anonymity For Wireless Mobile Ad-hoc Networks,\" presented at 31st IEEE Local Computer Networks Conference, 2006."},{"key":"e_1_3_2_1_12_1","volume-title":"CSP and Anonymity,\" presented at Fourth European Symposium on Research in Computer Security (ESORICS)","author":"Schneider S.","year":"1996","unstructured":"S. Schneider and A. Sdiropoulos , \" CSP and Anonymity,\" presented at Fourth European Symposium on Research in Computer Security (ESORICS) 1996 . S. Schneider and A. Sdiropoulos, \"CSP and Anonymity,\" presented at Fourth European Symposium on Research in Computer Security (ESORICS) 1996."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1297352.1297359"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103576.1103585"},{"key":"e_1_3_2_1_15_1","volume-title":"Ireland","author":"Syverson P. F.","year":"1995","unstructured":"P. F. Syverson and J. W. Gray , III, \"The Epistemic Representation of Information Flow Security in Probabilistic Systems,\" presented at Eighth IEEE in Computer Security Foundations Workshop County Kerry , Ireland , 1995 . P. F. Syverson and J. W. Gray, III, \"The Epistemic Representation of Information Flow Security in Probabilistic Systems,\" presented at Eighth IEEE in Computer Security Foundations Workshop County Kerry, Ireland, 1995."},{"key":"e_1_3_2_1_16_1","volume-title":"Group Principals and the Formalization of Anonymity,\" presented at World Congress on Formal Methods in the Development of Computing Systems (FM)","author":"Syverson P. F.","year":"1999","unstructured":"P. F. Syverson and S. G. Stuart , \" Group Principals and the Formalization of Anonymity,\" presented at World Congress on Formal Methods in the Development of Computing Systems (FM) , Berlin , 1999 . P. F. Syverson and S. G. Stuart, \"Group Principals and the Formalization of Anonymity,\" presented at World Congress on Formal Methods in the Development of Computing Systems (FM), Berlin, 1999."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.08.026"},{"key":"e_1_3_2_1_18_1","volume-title":"USA","author":"Pfitzmann A.","year":"2000","unstructured":"A. Pfitzmann and M. Kohntopp , \" Anonymity, Unobservability, and Pseudonymity -- A Proposal for Terminology,\" presented at Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA , USA , 2000 . A. Pfitzmann and M. Kohntopp, \"Anonymity, Unobservability, and Pseudonymity -- A Proposal for Terminology,\" presented at Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, 2000."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293778"},{"key":"e_1_3_2_1_22_1","volume-title":"Towards an Information Theoretic Metric for Anonymity,\" presented at Privacy Enhancing Technologies Workshop (PET)","author":"Serjantov A.","year":"2002","unstructured":"A. Serjantov and G. Danezis , \" Towards an Information Theoretic Metric for Anonymity,\" presented at Privacy Enhancing Technologies Workshop (PET) , 2002 . A. Serjantov and G. Danezis, \"Towards an Information Theoretic Metric for Anonymity,\" presented at Privacy Enhancing Technologies Workshop (PET), 2002."},{"key":"e_1_3_2_1_23_1","volume-title":"t-Closeness: Privacy Beyond k-Anonymity and l-Diversity,\" presented at IEEE 23rd International Conference on Data Engineering","author":"Li N.","year":"2007","unstructured":"N. Li , T. Li , and S. Venkatasubramanian , \" t-Closeness: Privacy Beyond k-Anonymity and l-Diversity,\" presented at IEEE 23rd International Conference on Data Engineering , 2007 . N. Li, T. Li, and S. Venkatasubramanian, \"t-Closeness: Privacy Beyond k-Anonymity and l-Diversity,\" presented at IEEE 23rd International Conference on Data Engineering, 2007."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"key":"e_1_3_2_1_25_1","volume-title":"A Combinatorial Approach to Measuring Anonymity,\" presented at IEEE Intelligence and Security Informatics","author":"Edman M.","year":"2007","unstructured":"M. Edman , F. Sivrikaya , and B. Yener , \" A Combinatorial Approach to Measuring Anonymity,\" presented at IEEE Intelligence and Security Informatics , 2007 . M. Edman, F. Sivrikaya, and B. Yener, \"A Combinatorial Approach to Measuring Anonymity,\" presented at IEEE Intelligence and Security Informatics, 2007."},{"key":"e_1_3_2_1_26_1","volume-title":"Achieving K-anonymity in Mobile Ad Hoc Networks,\" presented at 1st IEEE ICNP Workshop on Secure Network Protocols (NPSec'05)","author":"Xiaoxin W.","year":"2005","unstructured":"W. Xiaoxin and E. Bertino , \" Achieving K-anonymity in Mobile Ad Hoc Networks,\" presented at 1st IEEE ICNP Workshop on Secure Network Protocols (NPSec'05) . , 2005 . W. Xiaoxin and E. Bertino, \"Achieving K-anonymity in Mobile Ad Hoc Networks,\" presented at 1st IEEE ICNP Workshop on Secure Network Protocols (NPSec'05). , 2005."}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 1st ACM workshop on Network data anonymization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456441.1456453","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456441.1456453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:54Z","timestamp":1750253394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456441.1456453"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,31]]},"references-count":26,"alternative-id":["10.1145\/1456441.1456453","10.1145\/1456441"],"URL":"https:\/\/doi.org\/10.1145\/1456441.1456453","relation":{},"subject":[],"published":{"date-parts":[[2008,10,31]]},"assertion":[{"value":"2008-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}