{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:07Z","timestamp":1755882607633,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3669916","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Advanced methods for generalizing time and duration during dataset anonymization"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3448-1554","authenticated-orcid":false,"given":"Jenno","family":"Verdonck","sequence":"first","affiliation":[{"name":"DistriNet, KU Leuven, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7143-8742","authenticated-orcid":false,"given":"Kevin","family":"De Boeck","sequence":"additional","affiliation":[{"name":"DistriNet, KU Leuven, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0225-9705","authenticated-orcid":false,"given":"Michiel","family":"Willocx","sequence":"additional","affiliation":[{"name":"DistriNet, KU Leuven, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9255-4902","authenticated-orcid":false,"given":"Vincent","family":"Naessens","sequence":"additional","affiliation":[{"name":"DistriNet, KU Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"volume-title":"d.]. UTD Anonymization ToolBox","key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. UTD Anonymization ToolBox ; Data Security and Privacy Lab \u2014 labs.utdallas.edu. https:\/\/labs.utdallas.edu\/dspl\/software\/anonymization-toolbox\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36071-8_39"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3121409.3121411"},{"key":"e_1_3_2_1_4_1","volume-title":"Engineering and Management: 9th International Conference, KSEM 2016, Passau, Germany, October 5-7, 2016, Proceedings 9. Springer, 262\u2013274","author":"Ayala-Rivera Vanessa","year":"2016","unstructured":"Vanessa Ayala-Rivera, Liam Murphy, and Christina Thorpe. 2016. Automatic construction of generalization hierarchies for publishing anonymized data. In Knowledge Science, Engineering and Management: 9th International Conference, KSEM 2016, Passau, Germany, October 5-7, 2016, Proceedings 9. Springer, 262\u2013274."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3358695.3360918"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71703-4_18"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15546-8_2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23556-6_2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_1_10_1","first-page":"25","article-title":"k-Anonymity: From Theory to","volume":"16","author":"Capitani di Vimercati Sabrina","year":"2023","unstructured":"Sabrina De\u00a0Capitani di Vimercati, Sara Foresti, Giovanni Livraga, and Pierangela Samarati. 2023. k-Anonymity: From Theory to Applications.Trans. Data Priv. 16, 1 (2023), 25\u201349.","journal-title":"Applications.Trans. Data Priv."},{"key":"e_1_3_2_1_11_1","unstructured":"EUR-Lex. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016. https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.19"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.52"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150435"},{"key":"e_1_3_2_1_17_1","volume-title":"2007 IEEE 23rd international conference on data engineering. IEEE, 106\u2013115","author":"Li Ninghui","year":"2006","unstructured":"Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian. 2006. t-closeness: Privacy beyond k-anonymity and l-diversity. In 2007 IEEE 23rd international conference on data engineering. IEEE, 106\u2013115."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2016.024"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2812"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/582973.832492"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btz792"},{"key":"e_1_3_2_1_25_1","volume-title":"Data Provenance Management and Data Anonymization in Context of the Genome Austria Tissue Bank. Universit\u00e4t Wien","author":"Stark Konrad","year":"2013","unstructured":"Konrad Stark. 2013. Scientific Workflows, Data Provenance Management and Data Anonymization in Context of the Genome Austria Tissue Bank. Universit\u00e4t Wien (2013)."},{"key":"e_1_3_2_1_26_1","unstructured":"Manolis Terrovitis Dimitris Tsitsigkos and Nikolaos Dimakopoulos. [n. d.]. Amnesia Anonymization Tool - Data anonymization made easy \u2014 amnesia.openaire.eu. https:\/\/amnesia.openaire.eu\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470020"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559979"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05054-2_36"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3669916","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3669916","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:51:34Z","timestamp":1755881494000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3669916"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":29,"alternative-id":["10.1145\/3664476.3669916","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3669916","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}