{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:22Z","timestamp":1750307602033,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,13]],"date-time":"2010-04-13T00:00:00Z","timestamp":1271116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["4.30E+12"],"award-info":[{"award-number":["4.30E+12"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,13]]},"DOI":"10.1145\/1755688.1755726","type":"proceedings-article","created":{"date-parts":[[2010,4,16]],"date-time":"2010-04-16T14:28:35Z","timestamp":1271428115000},"page":"305-309","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["K-anonymous association rule hiding"],"prefix":"10.1145","author":[{"given":"Zutao","family":"Zhu","sequence":"first","affiliation":[{"name":"Syracuse University, Syracuse, NY"}]},{"given":"Wenliang","family":"Du","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY"}]}],"member":"320","published-online":{"date-parts":[[2010,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"URL\n\n  \n  : http:\/\/fimi.cs.helsinki.fi\/.  URL: http:\/\/fimi.cs.helsinki.fi\/."},{"key":"e_1_3_2_1_2_1","unstructured":"URL\n\n  \n  : http:\/\/www.mosek.com\/.  URL: http:\/\/www.mosek.com\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"e_1_3_2_1_4_1","unstructured":"R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In VLDB'94.   R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In VLDB'94."},{"key":"e_1_3_2_1_5_1","unstructured":"M. Atallah A. Elmagarmid M. Ibrahim E. Bertino and V. Verykios. Disclosure limitation of sensitive rules. KDEX'99.   M. Atallah A. Elmagarmid M. Ibrahim E. Bertino and V. Verykios. Disclosure limitation of sensitive rules. KDEX'99."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-005-0006-6"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647597.731877"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183614.1183721"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335372"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009796218281"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0056"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.06.012"},{"volume-title":"PSDM'02","author":"Oliveira S. R. M.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIDM.2006.009135"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_3_2_1_16_1","unstructured":"P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report 1998.  P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report 1998."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604271"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.2"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1269668"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5_11"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1191547.1191741"}],"event":{"name":"ASIA CCS '10: 5th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Beijing China","acronym":"ASIA CCS '10"},"container-title":["Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1755688.1755726","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1755688.1755726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:30Z","timestamp":1750250730000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1755688.1755726"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,13]]},"references-count":21,"alternative-id":["10.1145\/1755688.1755726","10.1145\/1755688"],"URL":"https:\/\/doi.org\/10.1145\/1755688.1755726","relation":{},"subject":[],"published":{"date-parts":[[2010,4,13]]},"assertion":[{"value":"2010-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}