{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:56Z","timestamp":1750307516308,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,28]],"date-time":"2009-06-28T00:00:00Z","timestamp":1246147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,28]]},"DOI":"10.1145\/1599272.1599284","type":"proceedings-article","created":{"date-parts":[[2009,9,8]],"date-time":"2009-09-08T12:53:09Z","timestamp":1252414389000},"page":"53-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Social networks integration and privacy preservation using subgraph generalization"],"prefix":"10.1145","author":[{"given":"Christopher C.","family":"Yang","sequence":"first","affiliation":[{"name":"Drexel University, Philadelphia, PA"}]},{"given":"Xuning","family":"Tang","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA"}]}],"member":"320","published-online":{"date-parts":[[2009,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242598"},{"volume-title":"Markle Foundation","year":"2003","author":"Baird Z.","key":"e_1_3_2_1_2_1"},{"volume-title":"Markle Foundation","year":"2006","author":"Baird Z.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1093\/publius\/pji003"},{"issue":"4","key":"e_1_3_2_1_5_1","first-page":"1","article-title":"Homeland Security and Community Policing: Competing or Complementing Public Safety Policies","volume":"4","author":"Friedmann R. R.","year":"2005","journal-title":"Journal of Homeland Security and Emergency Management"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"N. Li and T. Li \"t-closeness: Privacy Beyond k-anonymity and l-diversity \" in ICDE'07 2007.  N. Li and T. Li \" t -closeness: Privacy Beyond k-anonymity and l-diversity \" in ICDE'07 2007.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376629"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247554"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"M. Sageman Understanding Terror Networks University of Pennsylvania Press 2004.   M. Sageman Understanding Terror Networks University of Pennsylvania Press 2004.","DOI":"10.9783\/9780812206791"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"issue":"3","key":"e_1_3_2_1_14_1","first-page":"557","article-title":"The Local Role in Homeland Security","volume":"39","author":"Thacher D.","year":"2005","journal-title":"Law&amp;Society"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(91)90139-5"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"B. Thuraisingham Chapter 1. Assured Information Sharing: Technologies: Challenges and Directions Intelligence and Security Informatics: Applications and Technique Editors: H. Chen and C. C. Yang Springer-Verlag to appear in 2008.  B. Thuraisingham Chapter 1. Assured Information Sharing: Technologies: Challenges and Directions Intelligence and Security Informatics: Applications and Technique Editors: H. Chen and C. C. Yang Springer-Verlag to appear in 2008.","DOI":"10.1007\/978-3-540-69209-6_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150499"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142500"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_29"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69304-8"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551508099089"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"X. Ying and X. Wu \"Randomizing Social Networks: A Spectrum Preserving Approach \" in SIAM International Conference on Data Mining (SDM'08) Atlanta GA 2008  X. Ying and X. Wu \"Randomizing Social Networks: A Spectrum Preserving Approach \" in SIAM International Conference on Data Mining (SDM'08) Atlanta GA 2008","DOI":"10.1137\/1.9781611972788.67"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497459"}],"event":{"name":"KDD09: The 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Paris France","acronym":"KDD09"},"container-title":["Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1599272.1599284","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1599272.1599284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:09Z","timestamp":1750249089000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1599272.1599284"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,28]]},"references-count":23,"alternative-id":["10.1145\/1599272.1599284","10.1145\/1599272"],"URL":"https:\/\/doi.org\/10.1145\/1599272.1599284","relation":{},"subject":[],"published":{"date-parts":[[2009,6,28]]},"assertion":[{"value":"2009-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}