{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T14:50:01Z","timestamp":1767970201017,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,14]],"date-time":"2019-10-14T00:00:00Z","timestamp":1571011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["825225"],"award-info":[{"award-number":["825225"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,14]]},"DOI":"10.1145\/3358695.3360918","type":"proceedings-article","created":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T12:49:48Z","timestamp":1571316588000},"page":"314-317","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["PrioPrivacy: A Local Recoding K-Anonymity Tool for Prioritised Quasi-Identifiers"],"prefix":"10.1145","author":[{"given":"Alexandros","family":"Bampoulidis","sequence":"first","affiliation":[{"name":"RSA FG, Austria"}]},{"given":"Ioannis","family":"Markopoulos","sequence":"additional","affiliation":[{"name":"Forthnet S.A, Greece"}]},{"given":"Mihai","family":"Lupu","sequence":"additional","affiliation":[{"name":"RSA FG, Austria"}]}],"member":"320","published-online":{"date-parts":[[2019,10,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"C. Dai G. Ghinita E. Bertino J.-W. Byun and N. Li. 2009. TIAMAT: a tool for interactive analysis of microdata anonymization techniques. VLDB Endowment (2009).  C. Dai G. Ghinita E. Bertino J.-W. Byun and N. Li. 2009. TIAMAT: a tool for interactive analysis of microdata anonymization techniques. VLDB Endowment (2009).","DOI":"10.14778\/1687553.1687607"},{"key":"e_1_3_2_1_2_1","unstructured":"T. De\u00a0Waal and L. Willenborg. 1999. Information loss through global recoding and local suppression. Netherlands Official Statistics(1999).  T. De\u00a0Waal and L. Willenborg. 1999. Information loss through global recoding and local suppression. Netherlands Official Statistics(1999)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.979982"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"S. Ji P. Mittal and R. Beyah. 2017. Graph data anonymization de-anonymization attacks and de-anonymizability quantification: A survey. IEEE Communications Surveys & Tutorials(2017).  S. Ji P. Mittal and R. Beyah. 2017. Graph data anonymization de-anonymization attacks and de-anonymizability quantification: A survey. IEEE Communications Surveys & Tutorials(2017).","DOI":"10.1109\/COMST.2016.2633620"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.52"},{"key":"e_1_3_2_1_6_1","volume-title":"SECRETA: A system for evaluating and comparing relational and transaction anonymization algorithms.","author":"Poulis G.","year":"2014","unstructured":"G. Poulis , A. Gkoulalas-Divanis , G. Loukides , S. Skiadopoulos , and C. Tryfonopoulos . 2014 . SECRETA: A system for evaluating and comparing relational and transaction anonymization algorithms. (2014). G. Poulis, A. Gkoulalas-Divanis, G. Loukides, S. Skiadopoulos, and C. Tryfonopoulos. 2014. SECRETA: A system for evaluating and comparing relational and transaction anonymization algorithms. (2014)."},{"key":"e_1_3_2_1_7_1","volume-title":"A Generic Method for Assessing the Quality of De-Identified Health Data.Studies in health technology and informatics","author":"Prasser F.","year":"2016","unstructured":"F. Prasser , R. Bild , and K.\u00a0 A. Kuhn . 2016. A Generic Method for Assessing the Quality of De-Identified Health Data.Studies in health technology and informatics ( 2016 ). F. Prasser, R. Bild, and K.\u00a0A. Kuhn. 2016. A Generic Method for Assessing the Quality of De-Identified Health Data.Studies in health technology and informatics (2016)."},{"key":"e_1_3_2_1_8_1","volume-title":"AMIA","author":"Prasser F.","year":"2014","unstructured":"F. Prasser , F. Kohlmayer , R. Lautenschlaeger , and K.\u00a0 A. Kuhn . 2014 . Arx - a comprehensive tool for anonymizing biomedical data . In AMIA 2014. F. Prasser, F. Kohlmayer, R. Lautenschlaeger, and K.\u00a0A. Kuhn. 2014. Arx - a comprehensive tool for anonymizing biomedical data. In AMIA 2014."},{"key":"e_1_3_2_1_9_1","unstructured":"L. Sweeney. 2000. Simple demographics often identify people uniquely. (2000).  L. Sweeney. 2000. Simple demographics often identify people uniquely. (2000)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_11_1","unstructured":"M. Templ. 2008. Statistical disclosure control for microdata using the R-package sdcMicro. Transactions on Data Privacy(2008).  M. Templ. 2008. Statistical disclosure control for microdata using the R-package sdcMicro. Transactions on Data Privacy(2008)."},{"key":"e_1_3_2_1_12_1","volume-title":"SIGMOD","author":"Xiao X.","year":"2006","unstructured":"X. Xiao and Y. Tao . 2006. Personalized privacy preservation . In SIGMOD 2006 . X. Xiao and Y. Tao. 2006. Personalized privacy preservation. In SIGMOD 2006."},{"key":"e_1_3_2_1_13_1","volume-title":"SIGMOD","author":"Xiao X.","year":"2009","unstructured":"X. Xiao , G. Wang , and J. Gehrke . 2009. Interactive anonymization of sensitive data . In SIGMOD 2009 . X. Xiao, G. Wang, and J. Gehrke. 2009. Interactive anonymization of sensitive data. In SIGMOD 2009."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150504"}],"event":{"name":"WI '19: IEEE\/WIC\/ACM International Conference on Web Intelligence","location":"Thessaloniki Greece","acronym":"WI '19"},"container-title":["IEEE\/WIC\/ACM International Conference on Web Intelligence - Companion Volume"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3358695.3360918","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3358695.3360918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:25Z","timestamp":1750202005000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3358695.3360918"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,14]]},"references-count":14,"alternative-id":["10.1145\/3358695.3360918","10.1145\/3358695"],"URL":"https:\/\/doi.org\/10.1145\/3358695.3360918","relation":{},"subject":[],"published":{"date-parts":[[2019,10,14]]},"assertion":[{"value":"2019-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}