{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T23:25:09Z","timestamp":1768433109061,"version":"3.49.0"},"reference-count":20,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2008,8]]},"abstract":"<jats:p>Previous works about privacy preserving serial data publishing on dynamic databases have relied on unrealistic assumptions of the nature of dynamic databases. In many applications, some sensitive values changes freely while others never change. For example, in medical applications, the disease attribute changes with time when patients recover from one disease and develop another disease. However, patients do not recover from some diseases such as HIV. We call such diseases permanent sensitive values. To the best of our knowledge, none of the existing solutions handle these realistic issues. We propose a novel anonymization approach called HD-composition to solve the above problems. Extensive experiments with real data confirm our theoretical results.<\/jats:p>","DOI":"10.14778\/1453856.1453948","type":"journal-article","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T12:17:57Z","timestamp":1403612277000},"page":"845-856","source":"Crossref","is-referenced-by-count":57,"title":["Privacy preserving serial data publishing by role composition"],"prefix":"10.14778","volume":"1","author":[{"given":"Yingyi","family":"Bu","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Ada Wai Chee","family":"Fu","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Raymond Chi Wing","family":"Wong","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology"}]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology"}]},{"given":"Jiuyong","family":"Li","sequence":"additional","affiliation":[{"name":"University of South Australia"}]}],"member":"320","published-online":{"date-parts":[[2008,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11844662_4"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353343.1353378"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.143"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11823728_39"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367858"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247554"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSDBM.2007.16"},{"key":"e_1_2_1_12_1","unstructured":"P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression unpublished manuscript. In unpublished 1998.  P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression unpublished manuscript. In unpublished 1998."},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","unstructured":"L. Sweeney. Weaving technology and policy together to maintain confidentiality. Journal of Law Medicine and Ethics 25(2--3): 98--110 1997.  L. Sweeney. Weaving technology and policy together to maintain confidentiality. Journal of Law Medicine and Ethics 25(2--3): 98--110 1997.","DOI":"10.1111\/j.1748-720X.1997.tb01885.x"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150449"},{"key":"e_1_2_1_17_1","volume-title":"VLDB","author":"Wong R.","year":"2007"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150499"},{"key":"e_1_2_1_19_1","volume-title":"VLDB","author":"Xiao X.","year":"2006"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142500"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/1453856.1453948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T11:14:31Z","timestamp":1672226071000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/1453856.1453948"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,8]]}},"alternative-id":["10.14778\/1453856.1453948"],"URL":"https:\/\/doi.org\/10.14778\/1453856.1453948","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2008,8]]}}}