{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:32:56Z","timestamp":1762623176882,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,24]],"date-time":"2009-03-24T00:00:00Z","timestamp":1237852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,24]]},"DOI":"10.1145\/1516360.1516434","type":"proceedings-article","created":{"date-parts":[[2009,4,6]],"date-time":"2009-04-06T16:34:53Z","timestamp":1239035693000},"page":"636-647","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An efficient online auditing approach to limit private data disclosure"],"prefix":"10.1145","author":[{"given":"Haibing","family":"Lu","sequence":"first","affiliation":[{"name":"Rutgers University"}]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[{"name":"Singapore Management University"}]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[{"name":"Rutgers University"}]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[{"name":"Rutgers University"}]}],"member":"320","published-online":{"date-parts":[[2009,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/76894.76895"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/504704.504705"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/320613.320617"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.121"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/5925.5928"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(84)90025-2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/319540.319558"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.236161"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1980.10477481"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1995.10476652"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1983.1654444"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/320064.320068"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.979982"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772864"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.47.7.1008.9805"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021927424942"},{"key":"e_1_3_2_1_19_1","volume-title":"Linear programming","author":"Goldman A. J.","year":"1956","unstructured":"Goldman , A. J. , and Tucker , A. W . Linear programming . Princeton Unviersity Press ( 1956 ). Goldman, A. J., and Tucker, A. W. Linear programming. Princeton Unviersity Press (1956)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066163"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775089"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/951949.952160"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065183"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(02)00036-3"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.31"},{"key":"e_1_3_2_1_27_1","first-page":"160","volume-title":"Privacy Enhancing Technologies","author":"Li Y.","year":"2002","unstructured":"Li , Y. , Wang , L. , and Jajodia , S . Preventing interval-based inference by random data perturbation . In Privacy Enhancing Technologies ( 2002 ), pp. 160 -- 170 . Li, Y., Wang, L., and Jajodia, S. Preventing interval-based inference by random data perturbation. In Privacy Enhancing Technologies (2002), pp. 160--170."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/646090.680380"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.14"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142351.1142375"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127347"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2006.10.004"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497437"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.45.10.1399"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1571225"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1182635.1164142"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/1316689.1316735"},{"key":"e_1_3_2_1_39_1","volume-title":"SRI International","author":"Samarati P.","year":"1998","unstructured":"Samarati , P. , and Sweeney , L . Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report , SRI International , 1998 . Samarati, P., and Sweeney, L. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International, 1998."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/319540.319555"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/26.3.218"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1994.383392"},{"key":"e_1_3_2_1_44_1","volume-title":"J","author":"Vanderbei R.","year":"2008","unstructured":"Vanderbei , R. J . Linear Programming : Foundations and Extensions (3rd edition). Springer , 2008 . Vanderbei, R. J. Linear Programming: Foundations and Extensions (3rd edition). Springer, 2008."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1032649.1033461"},{"key":"e_1_3_2_1_46_1","first-page":"161","volume-title":"IEEE Symposium on Security and Privacy","author":"Wang L.","year":"2004","unstructured":"Wang , L. , Jajodia , S. , and Wijesekera , D . Securing olap data cubes against privacy breaches . In IEEE Symposium on Security and Privacy ( 2004 ), pp. 161 -- 175 . Wang, L., Jajodia, S., and Wijesekera, D. Securing olap data cubes against privacy breaches. In IEEE Symposium on Security and Privacy (2004), pp. 161--175."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39650-5_6"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4028-0"}],"event":{"name":"EDBT\/ICDT '09: EDBT\/ICDT '09 joint conference","acronym":"EDBT\/ICDT '09","location":"Saint Petersburg Russia"},"container-title":["Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1516360.1516434","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1516360.1516434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:57Z","timestamp":1750253397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1516360.1516434"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,24]]},"references-count":48,"alternative-id":["10.1145\/1516360.1516434","10.1145\/1516360"],"URL":"https:\/\/doi.org\/10.1145\/1516360.1516434","relation":{},"subject":[],"published":{"date-parts":[[2009,3,24]]},"assertion":[{"value":"2009-03-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}