{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:08Z","timestamp":1772164028294,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,4]],"date-time":"2011-06-04T00:00:00Z","timestamp":1307145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,4]]},"DOI":"10.1145\/1993498.1993551","type":"proceedings-article","created":{"date-parts":[[2011,6,6]],"date-time":"2011-06-06T07:53:52Z","timestamp":1307346832000},"page":"447-457","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["<i>kb<\/i>\n                    -anonymity"],"prefix":"10.1145","author":[{"given":"Aditya","family":"Budi","sequence":"first","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"David","family":"Lo","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Lingxiao","family":"Jiang","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"family":"Lucia","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2011,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Choco solver. http:\/\/www.emn.fr\/z-info\/choco-solver\/.  Choco solver. http:\/\/www.emn.fr\/z-info\/choco-solver\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Fujitsu develops technology to enhance comprehensive testing of java programs. http:\/\/www.fujitsu.com\/global\/news\/pr\/archives\/month\/2010\/20100112-02.html.  Fujitsu develops technology to enhance comprehensive testing of java programs. http:\/\/www.fujitsu.com\/global\/news\/pr\/archives\/month\/2010\/20100112-02.html."},{"key":"e_1_3_2_1_3_1","unstructured":"iTrust. http:\/\/sourceforge.net\/projects\/itrust\/.  iTrust. http:\/\/sourceforge.net\/projects\/itrust\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Open hospital. http:\/\/sourceforge.net\/projects\/angal\/.  Open hospital. http:\/\/sourceforge.net\/projects\/angal\/."},{"key":"e_1_3_2_1_5_1","unstructured":"PDmanager. http:\/\/sourceforge.net\/projects\/pdmanager\/.  PDmanager. http:\/\/sourceforge.net\/projects\/pdmanager\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142351.1142374"},{"key":"e_1_3_2_1_7_1","volume-title":"Int. Conf. on Data Theory","author":"Aggarwal G.","year":"2005","unstructured":"G. Aggarwal , T. Feder , K. Kenthapadi , R. Motwani , R. Panigrahy , D. Thomas , and A. Zhu . Approximation algorithms for k-anonymity . In Int. Conf. on Data Theory , 2005 . G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Approximation algorithms for k-anonymity. In Int. Conf. on Data Theory, 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1763507.1763523"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831715"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242598"},{"key":"e_1_3_2_1_11_1","first-page":"273","volume-title":"12th USENIX Security Symposium","author":"Broadwell P.","year":"2003","unstructured":"P. Broadwell , M. Harren , and N. Sastry . Scrash: A system for generating secure crash information . In 12th USENIX Security Symposium , pages 273 -- 284 , 2003 . P. Broadwell, M. Harren, and N. Sastry. Scrash: A system for generating secure crash information. In 12th USENIX Security Symposium, pages 273--284, 2003."},{"key":"e_1_3_2_1_12_1","first-page":"209","volume-title":"OSDI","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. R. Engler . KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs . In OSDI , pages 209 -- 224 , 2008 . C. Cadar, D. Dunbar, and D. R. Engler. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In OSDI, pages 209--224, 2008."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806825"},{"key":"e_1_3_2_1_14_1","volume-title":"OSDI","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B. gon Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones . In OSDI , 2010 . W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_16_1","volume-title":"NDSS","author":"Godefroid P.","year":"2008","unstructured":"P. Godefroid , M. Y. Levin , and D. A. Molnar . Automated whitebox fuzz testing . In NDSS , 2008 . P. Godefroid, M. Y. Levin, and D. A. Molnar. Automated whitebox fuzz testing. In NDSS, 2008."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179615"},{"key":"e_1_3_2_1_18_1","volume-title":"NASA Formal Methods Workshop","author":"Jayaraman K.","year":"2009","unstructured":"K. Jayaraman , D. Harvison , V. Ganesh , and A. Kiezun . jFuzz: A concolic tester for NASA Java . In NASA Formal Methods Workshop , 2009 . K. Jayaraman, D. Harvison, V. Ganesh, and A. Kiezun. jFuzz: A concolic tester for NASA Java. In NASA Formal Methods Workshop, 2009."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390652"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765871.1765924"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781148"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542485"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375606"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806823"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806824"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453131"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.962562"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.32"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831733"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070508"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/11537328_5"},{"key":"e_1_3_2_1_40_1","first-page":"291","volume-title":"17th USENIX Security Symposium","author":"Wang R.","year":"2008","unstructured":"R. Wang , X. Wang , and Z. Li . Panalyst: Privacy-aware remote error analysis on commodity software . In 17th USENIX Security Symposium , pages 291 -- 306 , 2008 . R. Wang, X. Wang, and Z. Li. Panalyst: Privacy-aware remote error analysis on commodity software. In 17th USENIX Security Symposium, pages 291--306, 2008."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31980-1_24"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587053"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134324"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1945023.1945039"}],"event":{"name":"PLDI '11: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"San Jose California USA","acronym":"PLDI '11","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993498.1993551","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1993498.1993551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:00:04Z","timestamp":1750230004000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993498.1993551"}},"subtitle":["a model for anonymized behaviour-preserving test and debugging data"],"short-title":[],"issued":{"date-parts":[[2011,6,4]]},"references-count":44,"alternative-id":["10.1145\/1993498.1993551","10.1145\/1993498"],"URL":"https:\/\/doi.org\/10.1145\/1993498.1993551","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1993316.1993551","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2011,6,4]]},"assertion":[{"value":"2011-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}