{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T11:47:31Z","timestamp":1772106451390,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2009-0063257"],"award-info":[{"award-number":["2009-0063257"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,24]]},"DOI":"10.1145\/1655925.1656186","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"1416-1421","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Employing PRBAC for privacy preserving data publishing"],"prefix":"10.1145","author":[{"given":"Anour F. A.","family":"Dafa-Alla","sequence":"first","affiliation":[{"name":"Chungbuk National University"}]},{"given":"Gyoyong","family":"Sohn","sequence":"additional","affiliation":[{"name":"Chungbuk National University"}]},{"given":"Keun Ho","family":"Ryu","sequence":"additional","affiliation":[{"name":"Chungbuk National University"}]}],"member":"320","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2005.103"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the IEEE Knolwedge and Data Engineering Workshop","author":"Atallah Mike J.","year":"1999","unstructured":"Mike J. Atallah , Elisa Bertino , Ahmed K. Elmagarmid , Mohamed Ibrahim , and Vassilios S . Verykios, Disclosure Limitation of Sensitive Rules , In Proceedings of the IEEE Knolwedge and Data Engineering Workshop ( 1999 ), 45.52. Mike J. Atallah, Elisa Bertino, Ahmed K. Elmagarmid, Mohamed Ibrahim, and Vassilios S. Verykios, Disclosure Limitation of Sensitive Rules, In Proceedings of the IEEE Knolwedge and Data Engineering Workshop (1999), 45.52."},{"key":"e_1_3_2_1_5_1","volume-title":"Hiding Association Rules by using Confidence and Support In Proceedings of the 4th Information Hiding Workshop","author":"Dasseni Elena","year":"2001","unstructured":"Elena Dasseni , Vassilios S. Verykios , Ahmed K. Elmagarmid , and Elisa Bertino , Hiding Association Rules by using Confidence and Support In Proceedings of the 4th Information Hiding Workshop ( 2001 ), 369.383. Elena Dasseni, Vassilios S. Verykios, Ahmed K. Elmagarmid, and Elisa Bertino, Hiding Association Rules by using Confidence and Support In Proceedings of the 4th Information Hiding Workshop (2001), 369.383."},{"key":"e_1_3_2_1_6_1","first-page":"151.158","volume-title":"Proceedings of the 12th International Workshop on Research Issues in Data Engineering","author":"Saygin Yucel","year":"2002","unstructured":"Yucel Saygin , Vassilios S. Verykios , and Ahmed K . Elmagarmid, Privacy preserving association rule mining , In Proceedings of the 12th International Workshop on Research Issues in Data Engineering ( 2002 ), pages 151.158 . Yucel Saygin, Vassilios S. Verykios, and Ahmed K. Elmagarmid, Privacy preserving association rule mining, In Proceedings of the 12th International Workshop on Research Issues in Data Engineering (2002), pages 151.158."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310921"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775080"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.45"},{"key":"e_1_3_2_1_12_1","volume-title":"Privacy Preserving Association Rule Mining in Vertically Partitioned Data","author":"Vaidya Jaideep","year":"2002","unstructured":"Jaideep Vaidya , Chris Clifton . Privacy Preserving Association Rule Mining in Vertically Partitioned Data . 2002 . Jaideep Vaidya, Chris Clifton. Privacy Preserving Association Rule Mining in Vertically Partitioned Data. 2002."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956776"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/850782.850786"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"e_1_3_2_1_17_1","volume-title":"Osmar R. Za\u00efane. Protecting Sensitive Knowledge By Data Sanitization. In Proceedings of the Third IEEE International Conference on Data Mining. 2003","author":"Oliveira Stanley R. M.","unstructured":"Stanley R. M. Oliveira , Osmar R. Za\u00efane. Protecting Sensitive Knowledge By Data Sanitization. In Proceedings of the Third IEEE International Conference on Data Mining. 2003 Stanley R. M. Oliveira, Osmar R. Za\u00efane. Protecting Sensitive Knowledge By Data Sanitization. In Proceedings of the Third IEEE International Conference on Data Mining. 2003"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_20_1","first-page":"173","volume-title":"The 7th IASTED International Conference on Computers and Advanced Technology in Education (CATE 2004","author":"Enhancing Online Learning Performance W. F.","year":"2004","unstructured":"Minaei-Bigdoli, B., Kortemeyer, G, Punch, W. F. , \" Enhancing Online Learning Performance : An Application of Data Mining Methods \", The 7th IASTED International Conference on Computers and Advanced Technology in Education (CATE 2004 ), pp 173 -- 178 , Kauai, Hawaii, USA , August 2004 Minaei-Bigdoli, B., Kortemeyer, G, Punch, W. F., \"Enhancing Online Learning Performance: An Application of Data Mining Methods\", The 7th IASTED International Conference on Computers and Advanced Technology in Education (CATE 2004), pp 173--178, Kauai, Hawaii, USA, August 2004"},{"key":"e_1_3_2_1_21_1","volume-title":"Clifton and Murat Kantarcioglu and Jaideep Vaidya. Defining Privacy for Data Mining. In Proceedings of The National Science Foundation Workshop on Next Generation Data Mining, November 1--3","author":"Chris","year":"2002","unstructured":"Chris Clifton and Murat Kantarcioglu and Jaideep Vaidya. Defining Privacy for Data Mining. In Proceedings of The National Science Foundation Workshop on Next Generation Data Mining, November 1--3 , 2002 , Baltimore, MD. Invited paper. Chris Clifton and Murat Kantarcioglu and Jaideep Vaidya. Defining Privacy for Data Mining. In Proceedings of The National Science Foundation Workshop on Next Generation Data Mining, November 1--3, 2002, Baltimore, MD. Invited paper."}],"event":{"name":"ICIS '09: The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","location":"Seoul Korea","acronym":"ICIS '09","sponsor":["AICIT","ETRI","KISTI"]},"container-title":["Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656186","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655925.1656186","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:18Z","timestamp":1750250478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656186"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":21,"alternative-id":["10.1145\/1655925.1656186","10.1145\/1655925"],"URL":"https:\/\/doi.org\/10.1145\/1655925.1656186","relation":{},"subject":[],"published":{"date-parts":[[2009,11,24]]},"assertion":[{"value":"2009-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}