{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T09:46:33Z","timestamp":1773308793439,"version":"3.50.1"},"reference-count":285,"publisher":"Emerald","issue":"1-2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10,20]]},"abstract":"<jats:p>Privacy is an important issue when one wants to make use of data that involves individuals\u2019 sensitive information. Research on protecting the privacy of individuals and the confidentiality of data has received contributions from many fields, including computer science, statistics, economics, and social science. In this paper, we survey research work in privacy-preserving data publishing. This is an area that attempts to answer the problem of how an organization, such as a hospital, government agency, or insurance company, can release data to the public without violating the confidentiality of personal information. We focus on privacy criteria that provide formal safety guarantees, present algorithms that sanitize data to make it safe for release while preserving useful information, and discuss ways of analyzing the sanitized data. Many challenges still remain. This survey provides a summary of the current state-of-the-art, based on which we expect to see advances in years to come.<\/jats:p>","DOI":"10.1561\/1900000008","type":"journal-article","created":{"date-parts":[[2009,10,26]],"date-time":"2009-10-26T06:47:50Z","timestamp":1256539670000},"page":"1-167","source":"Crossref","is-referenced-by-count":128,"title":["Privacy-Preserving Data Publishing"],"prefix":"10.1561","volume":"2","author":[{"given":"Bee-Chung","family":"Chen","sequence":"first","affiliation":[{"name":"Yahoo! Research ,","place":["USA"]}]},{"given":"Daniel","family":"Kifer","sequence":"additional","affiliation":[{"name":"Penn State University ,","place":["USA"]}]},{"given":"Kristen","family":"LeFevre","sequence":"additional","affiliation":[{"name":"University of Michigan ,","place":["USA"]}]},{"given":"Ashwin","family":"Machanavajjhala","sequence":"additional","affiliation":[{"name":"Yahoo! Research ,","place":["USA"]}]}],"member":"140","published-online":{"date-parts":[[2009,10,20]]},"reference":[{"key":"2025121518595720900_ref001","first-page":"215","article-title":"Disclosure limitation in longitudinal linked data,","author":"Abowd","year":"2001","journal-title":"Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies"},{"key":"2025121518595720900_ref002","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-25955-8_23","article-title":"Multiply-imputing confidential characteristics and file links in longitudinal linked data,","volume-title":"Privacy in Statistical Databases","author":"Abowd","year":"2004"},{"key":"2025121518595720900_ref003","article-title":"Never walk along: Uncertainty for anonymity in moving objects databases,","volume-title":"in Proceedings of the IEEE International Conference on Data Engineering (ICDE)","author":"Abul","year":"2008"},{"issue":"4","key":"2025121518595720900_ref004","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1145\/76894.76895","article-title":"Security-control methods for statistical databases,","volume":"21","author":"Adam","year":"1989","journal-title":"ACM Computing Surveys"},{"key":"2025121518595720900_ref005","article-title":"User 4xxxxx9: Anonymizing query logs,","volume-title":"Query Log Analysis Workshop at WWW","author":"Adar","year":"2007"},{"key":"2025121518595720900_ref006","article-title":"On k-anonymity and the curse of dimensionality,","volume-title":"in Proceedings of the 31st International Conference on Very Large Databases (VLDB)","author":"Aggarwal","year":"2005"},{"key":"2025121518595720900_ref007","doi-asserted-by":"crossref","DOI":"10.1109\/ICDE.2007.367859","article-title":"On randomization, public information and the curse of dimensionality,","volume-title":"in Proceedings of the IEEE International Conference on Data Engineering (ICDE)","author":"Aggarwal","year":"2007"},{"key":"2025121518595720900_ref008","first-page":"386","article-title":"On unifying privacy and uncertain data models,","volume-title":"in Proceedings of the 24th International Conference on Data Engineering","author":"Aggarwal","year":"2008"},{"key":"2025121518595720900_ref009","doi-asserted-by":"crossref","DOI":"10.1145\/1150402.1150460","article-title":"On privacy preservation against adversarial data mining,","volume-title":"in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)","author":"Aggarwal","year":"2006"},{"key":"2025121518595720900_ref010","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-24741-8_12","article-title":"A condensation approach to privacy-preserving data mining,","volume-title":"in Proceedings of the 9th International Conference on Extending Database Technology (EDBT)","author":"Aggarwal","year":"2004"},{"key":"2025121518595720900_ref011","doi-asserted-by":"crossref","DOI":"10.1137\/1.9781611972771.6","article-title":"On privacy-preservation of text and sparse binary data with sketches,","volume-title":"SDM","author":"Aggarwal","year":"2007"},{"key":"2025121518595720900_ref012","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-70992-5","volume-title":"Privacy-Preserving Data Mining: Models and Algorithms","author":"Aggarwal","year":"2008"},{"key":"2025121518595720900_ref013","article-title":"Approximation algorithms for k-anonymity,","volume-title":"Journal of Privacy Technology (JOPT)","author":"Aggarwal","year":"2005"},{"key":"2025121518595720900_ref014","article-title":"Achieving anonymity via clustering in a metric space,","volume-title":"in Proceedings of the 25th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS)","author":"Aggarwal","year":"2006"},{"key":"2025121518595720900_ref015","doi-asserted-by":"crossref","DOI":"10.1145\/375551.375602","article-title":"On the design and quantification of privacy preserving data mining algorithms,","volume-title":"in Proceedings of the 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS)","author":"Agrawal","year":"2001"},{"key":"2025121518595720900_ref016","doi-asserted-by":"crossref","DOI":"10.1145\/342009.335438","article-title":"Privacy-preserving data mining,","volume-title":"in Proceedings of the ACM SIGMOD International Conference on Management of Data","author":"Agrawal","year":"2000"},{"key":"2025121518595720900_ref017","article-title":"Privacy Preserving OLAP,","volume-title":"in Proceedings of the 23th ACM SIGMOD Conference on Management of Data","author":"Agrawal","year":"2004"},{"key":"2025121518595720900_ref018","article-title":"A framework for high-accuracy privacypreserving mining,","volume-title":"in Proceedings of the IEEE International Conference on Data Engineering (ICDE)","author":"Agrawal","year":"2005"},{"issue":"1","key":"2025121518595720900_ref019","first-page":"97","article-title":"Extracting confidential information from public documents: The 2000 department of justice report on the federal use of the death penalty in the United States,","volume":"20","author":"Algranati","year":"2004","journal-title":"Journal of Official Statistics"},{"issue":"3","key":"2025121518595720900_ref020","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1177\/0049124100028003003","article-title":"Multiple imputation for missing data: A cautionary tale,","volume":"28","author":"Allison","year":"2000","journal-title":"Sociological Methods and Research"},{"key":"2025121518595720900_ref021","doi-asserted-by":"crossref","DOI":"10.1145\/237814.237823","article-title":"The space complexity of approximating the frequency moments,","volume-title":"in Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing (STOC)","author":"Alon","year":"1996"},{"key":"2025121518595720900_ref022","volume-title":"Advances in Neural Information Processing Systems 16 (NIPS)","author":"Andrews","year":"2004"},{"key":"2025121518595720900_ref023","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511804090","volume-title":"Computational Complexity: A Modern Approach","author":"Arora","year":"2009"},{"key":"2025121518595720900_ref024","unstructured":"M.\n              Arrington\n            \n          , \u201cAol proudly releases massive amounts of private data,\u201d TechCrunch: http:\/\/www.techcrunch.com\/2006\/08\/06\/aol-proudly-releases-massive-amounts-of-user-search-data\/, August6, 2006."},{"key":"2025121518595720900_ref025","article-title":"From statistics to beliefs,","volume-title":"National Conference on Artificial Intelligence AAAI","author":"Bacchus","year":"1992"},{"key":"2025121518595720900_ref026","doi-asserted-by":"crossref","DOI":"10.1145\/1242572.1242598","article-title":"Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography,","volume-title":"in Proceedings of the 16th International Conference on World Wide Web (WWW)","author":"Backstrom","year":"2007"},{"key":"2025121518595720900_ref027","doi-asserted-by":"crossref","DOI":"10.1145\/1265530.1265569","article-title":"Privacy, accuracy and consistency too: A holistic solution to contingency table release,","volume-title":"in Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS)","author":"Barak","year":"2007"},{"key":"2025121518595720900_ref028","article-title":"A face is exposed for AOL Searcher no. 4417749,","volume-title":"New York Times","author":"Barbaro","year":"2006"},{"key":"2025121518595720900_ref029","article-title":"Data privacy through optimal k-anonymity,","volume-title":"in Proceedings of the 21st International Conference on Data Engineering (ICDE)","author":"Bayardo","year":"2005"},{"key":"2025121518595720900_ref030","article-title":"Statistical and technological solutions for controlled data dissemination,","volume-title":"New Techniques and Technologies for Statistics","author":"Benedetti","year":"1998"},{"issue":"1","key":"2025121518595720900_ref031","doi-asserted-by":"crossref","DOI":"10.1109\/MPRV.2003.1186725","article-title":"Location privacy in pervasive computing,","volume":"2","author":"Beresford","journal-title":"Pervasive Computing"},{"key":"2025121518595720900_ref032","doi-asserted-by":"crossref","DOI":"10.1007\/11552338_13","article-title":"Protecting privacy against locationbased personal identification,","volume-title":"in Proceedings of the VLDB Workshop on Secure Data Management","author":"Bettini","year":"2005"},{"key":"2025121518595720900_ref033","first-page":"217","article-title":"When is \u201dNearest Neighbor\u201d meaningful?,","volume-title":"in Proceedings of the 10th International Conference on Database Theory (ICDT)","author":"Beyer"},{"key":"2025121518595720900_ref034","article-title":"Support vector classification with input data uncertainty,","volume-title":"Advances in Neural Information Processing Systems (NIPS)","author":"Bi","year":"2004"},{"key":"2025121518595720900_ref035","volume-title":"Discrete Multivariate Analysis: Theory and Practice","author":"Bishop","year":"1977"},{"issue":"1","key":"2025121518595720900_ref036","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1111\/j.1467-9574.1992.tb01327.x","article-title":"Disclosure risk for microdata stemming from official statistics,","volume":"46","author":"Blien","year":"1992","journal-title":"Statistica Neerlandica"},{"key":"2025121518595720900_ref037","doi-asserted-by":"crossref","DOI":"10.1145\/1065167.1065184","article-title":"Practical privacy: The SuLQ framework,","volume-title":"in Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS)","author":"Blum","year":"2005"},{"key":"2025121518595720900_ref038","volume-title":"Empirical Model-Building And Response Surface","author":"Box","year":"1987"},{"key":"2025121518595720900_ref039","doi-asserted-by":"crossref","DOI":"10.1145\/1401890.1401904","article-title":"The cost of privacy: Destruction of data-mining utility in anonymized data publishing,","volume-title":"in Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Brickell","year":"2008"},{"key":"2025121518595720900_ref040","doi-asserted-by":"crossref","DOI":"10.1109\/ICDE.2007.367915","article-title":"Preservation Of patterns and input\u2013output privacy,","volume-title":"in Proceedings of the IEEE International Conference on Data Engineering (ICDE)","author":"Bu","year":"2007"},{"key":"2025121518595720900_ref041","first-page":"391","volume-title":"in Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB)","author":"Burdick","year":"2006"},{"issue":"1","key":"2025121518595720900_ref042","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s00778-006-0033-y","article-title":"OLAP over uncertain and imprecise data,","volume":"16","author":"Burdick","year":"2007","journal-title":"VLDB Journal"},{"key":"2025121518595720900_ref043","first-page":"39","volume-title":"in Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB)","author":"Burdick","year":"2007"},{"key":"2025121518595720900_ref044","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1023\/A:1025658621216","article-title":"Information preserving statistical obfuscation,","volume":"13","author":"Burridge","year":"2003","journal-title":"Statistics and Computing"},{"key":"2025121518595720900_ref045","doi-asserted-by":"crossref","DOI":"10.1007\/11844662_4","article-title":"Secure anonymization for incremental datasets,","volume-title":"SIAM Conference on Data Mining (SDM)","author":"Byun","year":"2006"},{"key":"2025121518595720900_ref046","unstructured":"S.\n              Canada\n            \n          , \u201cThe research data centres (RDC) program,\u201d\nhttp:\/\/www.statcan.gc.ca\/rdc-cdr\/network-reseau-eng.htm, June9, 2009."},{"key":"2025121518595720900_ref047","volume-title":"Statistical Inference","author":"Casella","year":"2002","edition":"2"},{"key":"2025121518595720900_ref048","article-title":"Minimum-distance controlled perturbation methods for large-scale tabular data protection,","volume":"171","author":"Castro","journal-title":"European Journal of Operational Research"},{"key":"2025121518595720900_ref049","doi-asserted-by":"crossref","DOI":"10.1007\/11818175_12","article-title":"When random sampling preserves privacy,","volume-title":"in Proceedings of the International Cryptology Conference","author":"Chaudhuri","year":"2006"},{"key":"2025121518595720900_ref050","article-title":"Learning from agggregate views,","volume-title":"in Proceedings of the 22nd International Conference on Data Engineering (ICDE)","author":"Chen","year":"2006"},{"key":"2025121518595720900_ref051","article-title":"PrivacySkyline: Privacy with multidimensional adversarial knowledge,","volume-title":"in Proceedings of the 33rd International Conference on Very Large Databases (VLDB)","author":"Chen","year":"2007"},{"key":"2025121518595720900_ref052","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-73540-3_15","article-title":"Enabling private continuous queries for revealed user locations,","volume-title":"Advances in Spatial and Temporal Databases","author":"Chow","year":"2007"},{"key":"2025121518595720900_ref053","volume-title":"Log-Linear Models and Logistic Regression","author":"Christensen","year":"1997"},{"issue":"4","key":"2025121518595720900_ref054","first-page":"783","article-title":"Public use microdata files: Current practices at national statistical bureaus,","volume":"9","author":"Citteur","year":"1993","journal-title":"Journal of Official Statistics"},{"key":"2025121518595720900_ref055","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/1409220.1409222","article-title":"A survey of query log privacy-enhancing techniques from a policy perspective,","volume":"2","author":"Cooper","year":"2008","journal-title":"ACM Transactions on the Web"},{"key":"2025121518595720900_ref056","volume-title":"Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra","author":"Cox","year":"2008","edition":"3"},{"key":"2025121518595720900_ref057","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-25955-8_7","article-title":"Balancing quality and confidentiality for multivariate tabular data,","volume-title":"Domingo-Ferrer J, Torra V, editors, Privacy in Statistical Databases","author":"Cox","year":"2004"},{"issue":"2","key":"2025121518595720900_ref058","first-page":"135","article-title":"Confidentiality issues at the United States bureau of the census,","volume":"2","author":"Cox","year":"1986","journal-title":"Journal of Official Statistics"},{"issue":"2","key":"2025121518595720900_ref059","first-page":"205","article-title":"An Agenda for research in statistical disclosure limitation,","volume":"11","author":"Cox","year":"1995","journal-title":"Journal of Official Statistics"},{"key":"2025121518595720900_ref060","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/0378-3758(82)90058-1","article-title":"Data swapping: A technique for disclosure control,","volume":"6","author":"Dalenius","journal-title":"Journal of Statistical Planning and Inference"},{"key":"2025121518595720900_ref061","article-title":"Asymptotic conditional probabilities for conjunctive queries,","volume-title":"in Proceedings of the 10th International Conference on Database Theory (ICDT)","author":"Dalvi","year":"2005"},{"issue":"4","key":"2025121518595720900_ref062","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/s00778-006-0004-3","article-title":"Efficient query evaluation on probabilistic databases,","volume":"16","author":"Dalvi","year":"2007","journal-title":"VLDB Journal"},{"key":"2025121518595720900_ref063","article-title":"Cost effective implementation of synthetic tabulation (a.k.a. controlled tabular adjustments) in legacy and new statistical data publication systems,","volume-title":"Joint ECE\/Eurostat Work Session on Statistical Data Confidentiality, Luxembourg","author":"Dandekar","year":"2003"},{"key":"2025121518595720900_ref064","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-25955-8_10","article-title":"Maximum utility-minimum information loss table server design for statistical disclosure control of tabular data,","volume-title":"Domingo-Ferrer J, Torra V, editors, Privacy in statistical databases","author":"Dandekar","year":"2004"},{"key":"2025121518595720900_ref065","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-47804-3_9","article-title":"Sensitive micro data protection using latin hypercube sampling technique,","volume-title":"Inference Control in Statistical Databases, From Theory to Practice","author":"Dandekar","year":"2002"},{"key":"2025121518595720900_ref066","doi-asserted-by":"crossref","DOI":"10.1145\/775152.775226","article-title":"Mining the peanut gallery: Opinion extraction and semantic classification of product reviews,","volume-title":"in Proceedings of the 12th International Conference on World Wide Web (WWW)","author":"Dave","year":"2003"},{"key":"2025121518595720900_ref067","first-page":"332","article-title":"Learning about individuals from group statistics,","volume-title":"in Proceedings of the 21st Conference in Uncertainty in Artificial Intelligence (UAI)","author":"K\u00fcck","year":"2005"},{"issue":"4","key":"2025121518595720900_ref068","first-page":"417","article-title":"Statistical disclosure control and sampling weights,","volume":"13","author":"de Waal","journal-title":"Journal of Official Statistics"},{"issue":"4","key":"2025121518595720900_ref069","article-title":"Masking microdata using micro-aggregation,","volume":"14","author":"Defays","journal-title":"Journal of Ofcial Statistics"},{"issue":"1","key":"2025121518595720900_ref070","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1145\/320064.320069","article-title":"The tracker: A threat to statistical database security,","volume":"4","author":"Denning","journal-title":"ACM Transactions on Database Systems"},{"issue":"1","key":"2025121518595720900_ref071","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1145\/320128.320138","article-title":"A fast procedure for finding a tracker in a statistical database,","volume":"5","author":"Denning","year":"1980","journal-title":"ACM Transactions on Database Systems"},{"key":"2025121518595720900_ref072","first-page":"363","article-title":"Algebraic algorithms for sampling from conditional distributions,","volume":"1","author":"Diaconis","year":"1998","journal-title":"Annals of Statistics"},{"issue":"1\u20132","key":"2025121518595720900_ref073","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/S0004-3702(96)00034-3","article-title":"Solving the multiple instance problem with axis-parallel rectangles,","volume":"89","author":"Dietterich","year":"1997","journal-title":"Artificial Intelligence"},{"key":"2025121518595720900_ref074","doi-asserted-by":"crossref","DOI":"10.1145\/773153.773173","article-title":"Revealing information while preserving privacy,","volume-title":"in Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS)","author":"Dinur","year":"2003"},{"key":"2025121518595720900_ref075","volume-title":"\u201cstatistical tools for disclosure limitation in multiway contingency tables,\u201d","author":"Dobra","year":"2002"},{"issue":"6","key":"2025121518595720900_ref076","doi-asserted-by":"crossref","first-page":"1093","DOI":"10.3150\/bj\/1072215202","article-title":"Markov bases for decomposable graphical models,","volume":"9","author":"Dobra","year":"2003","journal-title":"Bernoulli"},{"key":"2025121518595720900_ref077","volume-title":"Assessing the Risk of Disclosure of Confidential Categorical Data","author":"Dobra","year":"2000"},{"key":"2025121518595720900_ref078","volume-title":"Foundations of Statistical Inference: Proceedings of the Shoresh Conference 2000","author":"Dobra","year":"2003"},{"issue":"1","key":"2025121518595720900_ref079","doi-asserted-by":"crossref","DOI":"10.1109\/69.979982","article-title":"Practical data-oriented microaggregation for statistical disclosure control,","volume":"4","author":"Domingo-Ferrer","year":"2002","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"2025121518595720900_ref080","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-25955-8_12","article-title":"On the security of noise addition for privacy in statistical databases,","volume-title":"Privacy in Statistical Databases","author":"Domingo-Ferrer","year":"2004"},{"key":"2025121518595720900_ref081","article-title":"A quantitative comparison of disclosure control methods for microdata,","volume-title":"Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies","author":"Domingo-Ferrer","year":"2001"},{"key":"2025121518595720900_ref082","doi-asserted-by":"crossref","DOI":"10.1145\/1376616.1376665","article-title":"Privacy-maxent: Integrating background knowledge in privacy quantification,","volume-title":"in Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data (SIGMOD)","author":"Du","year":"2008"},{"issue":"2","key":"2025121518595720900_ref083","doi-asserted-by":"crossref","DOI":"10.1080\/07350015.1989.10509729","article-title":"The risk of disclosure for microdata,","volume":"7","author":"Duncan","year":"1989","journal-title":"Journal of Business and Economic Statistics"},{"key":"2025121518595720900_ref084","article-title":"Strategic modeling of information sharing among data privacy attackers,","volume-title":"Quantitative Risk Analysis for Security Applications Workshop","author":"Duong","year":"2009"},{"key":"2025121518595720900_ref085","doi-asserted-by":"crossref","DOI":"10.1007\/11787006_1","article-title":"Differential privacy,","volume-title":"ICALP","author":"Dwork","year":"2006"},{"key":"2025121518595720900_ref086","doi-asserted-by":"crossref","DOI":"10.1007\/11761679_29","article-title":"Our data, ourselves: Privacy via distributed noise generation,","volume-title":"EUROCRYPT","author":"Dwork","year":"2006"},{"key":"2025121518595720900_ref087","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/11681878_14","article-title":"Calibrating noise to sensitivity in private data analysis,","volume-title":"Theory of Cryptography Conference","author":"Dwork","year":"2006"},{"key":"2025121518595720900_ref088","doi-asserted-by":"crossref","DOI":"10.1145\/1250790.1250804","article-title":"The price of privacy and the limits of LP decoding,","volume-title":"in Proceedings of the Thirty-ninth Annual ACM Symposium on Theory of Computing (STOC)","author":"Dwork","year":"2007"},{"key":"2025121518595720900_ref089","article-title":"Maximum matching and a polyhedron with 0\u20131 vertices,","volume":"69","author":"Edmonds","year":"1965","journal-title":"Journal of Research of the National Bureau of Standards, Section B, Mathematical Sciences"},{"key":"2025121518595720900_ref090","first-page":"6","article-title":"Scenarios of attack: The data intruder\u2019s perspective on statistical disclosure risk,","volume":"14","author":"Elliot","year":"1999","journal-title":"Netherlands Official Statistics"},{"key":"2025121518595720900_ref091","doi-asserted-by":"crossref","DOI":"10.1145\/1376916.1376941","article-title":"Epistemic privacy,","volume-title":"PODS","author":"Evfimievski","year":"2008"},{"key":"2025121518595720900_ref092","doi-asserted-by":"crossref","DOI":"10.1145\/773153.773174","article-title":"Limiting privacy breaches in privacy-preserving data mining,","volume-title":"in Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS)","author":"Evfimievski","year":"2003"},{"key":"2025121518595720900_ref093","doi-asserted-by":"crossref","DOI":"10.1145\/775047.775080","article-title":"Privacy preserving mining of association rules,","volume-title":"in Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Evfimievski","year":"2002"},{"key":"2025121518595720900_ref094","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-88961-8_3","article-title":"Information leakage in optimal anonymized and diversified data,","volume-title":"Information Hiding","author":"Fang","year":"2008"},{"key":"2025121518595720900_ref095","author":"Federal Committee on Statistical Methodology","year":"2005"},{"issue":"328","key":"2025121518595720900_ref096","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1080\/01621459.1969.10501049","article-title":"A theory for record linkage,","volume":"64","author":"Fellegi","year":"1969","journal-title":"Journal of the American Statistical Association"},{"issue":"337","key":"2025121518595720900_ref097","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/01621459.1972.10481199","article-title":"On the question of statistical confidentiality,","volume":"67","author":"Fellegi","year":"1972","journal-title":"Journal of the American Statistical Association"},{"key":"2025121518595720900_ref098","volume-title":"Technical Report 668","author":"Fienberg","year":"1997"},{"issue":"1","key":"2025121518595720900_ref099","first-page":"75","article-title":"A bayesian approach to data disclosure: Optimal intruder behavior for continuous data,","volume":"13","author":"Fienberg","year":"1997","journal-title":"Journal of Official Statistics"},{"issue":"4","key":"2025121518595720900_ref100","first-page":"485","article-title":"Disclosure limitation using perturbation and related methods for categorical data,","volume":"14","author":"Fienberg","year":"1998","journal-title":"Journal of Official Statistics"},{"key":"2025121518595720900_ref101","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/978-3-540-25955-8_2","article-title":"Data swapping: Variations on a theme by Dalenius and Reiss,","volume-title":"Privacy in Statistical Databases","author":"Fienberg","year":"2004"},{"issue":"2","key":"2025121518595720900_ref102","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/s10618-005-0010-x","article-title":"Preserving the confidentiality of categorical statistical data bases when releasing information for association rules,","volume":"11","author":"Fienberg","year":"2005","journal-title":"Data Mining Knowledge Discovery"},{"key":"2025121518595720900_ref103","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-25955-8_20","article-title":"Individual risk estimation in \u03bc-argus: A review,","volume-title":"Privacy in Statistical Databases","author":"Franconi","year":"2004"},{"issue":"1","key":"2025121518595720900_ref104","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1111\/1467-9884.00298","article-title":"A model-based method for disclosure limitation of business microdata,","volume":"51","author":"Franconi","year":"2002","journal-title":"The Statistician"},{"key":"2025121518595720900_ref105","doi-asserted-by":"crossref","DOI":"10.1145\/1148170.1148267","article-title":"You are what you say: Privacy risks of public mentions,","volume-title":"in In Proceedings of the 29th SIGIR","author":"Frankowski","year":"2006"},{"issue":"2","key":"2025121518595720900_ref106","first-page":"383","article-title":"Masking procedures for microdata disclosure limitation,","volume":"9","author":"Fuller","year":"1993","journal-title":"Journal of Official Statistics"},{"key":"2025121518595720900_ref107","doi-asserted-by":"crossref","DOI":"10.1109\/ICDE.2005.143","article-title":"Top-down specialization for information and privacy preservation,","volume-title":"in Proceedings of the 21st International Conference on Data Engineering (ICDE)","author":"Fung","year":"2005"},{"key":"2025121518595720900_ref108","doi-asserted-by":"crossref","DOI":"10.1145\/1401890.1401926","article-title":"Composition attacks and auxiliary information in data privacy,","volume-title":"in The 14th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"Ganta","year":"2008"},{"key":"2025121518595720900_ref109","article-title":"Location privacy in mobile systems: A personalized approach,","volume-title":"in Proceedings of the 25th IEEE International Conference on Distributed Computing Systems","author":"Gedik","year":"2005"},{"issue":"1","key":"2025121518595720900_ref110","doi-asserted-by":"crossref","DOI":"10.1109\/TMC.2007.1062","article-title":"Protecting location privacy with personalized k-anonymity: Architecture and algorithms,","volume":"7","author":"Gedik","year":"2008","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2025121518595720900_ref111","doi-asserted-by":"crossref","DOI":"10.1145\/1376616.1376631","article-title":"Private queries in location based services: Anonymizers are not necessary,","volume-title":"in Proceedings of the ACM SIGMOD International Conference on Management of Data","author":"Ghinita","year":"2008"},{"key":"2025121518595720900_ref112","doi-asserted-by":"crossref","DOI":"10.1145\/1242572.1242623","article-title":"PRIVE: Anonymous locationbased queries in distributed mobile systems,","volume-title":"in Proceedings of the 16th International World Wide Web Conference","author":"Ghinita","year":"2007"},{"key":"2025121518595720900_ref113","article-title":"Fast data anonymization with low information loss,","volume-title":"in Proceedings of the 34th International Conference on Very Large Databases","author":"Ghinita","year":"2007"},{"key":"2025121518595720900_ref114","article-title":"On the anonymization of sparse highdimensional data,","volume-title":"IEEE 24th International Conference on Data Engineering (ICDE)","author":"Ghinita","year":"2008"},{"key":"2025121518595720900_ref115","article-title":"k-anonymization with minimal loss of information,","volume-title":"TKDE","author":"Gionis","year":"2008"},{"key":"2025121518595720900_ref116","article-title":"Distortion measures for categorical data swapping,","author":"Gomatam","year":"2003"},{"issue":"4","key":"2025121518595720900_ref117","article-title":"Post randomisation for statistical disclosure control: Theory and implementation,","volume":"14","author":"Gouweleeuw","year":"1998","journal-title":"Journal of Official Statistics"},{"key":"2025121518595720900_ref118","first-page":"22","article-title":"Random worlds and maximum entropy,","volume-title":"Logic in Computer Science","author":"Grove","year":"1992"},{"key":"2025121518595720900_ref119","doi-asserted-by":"crossref","DOI":"10.1145\/1066116.1189037","article-title":"Anonymous usage of location-based services through spatial and temporal cloaking,","volume-title":"in Proceedings of the First International Conference on Mobile Systems, Applications and Services","author":"Gruteser","year":"2003"},{"key":"2025121518595720900_ref120","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-32004-3_19","article-title":"On the anonymity of periodic location samples,","volume-title":"in Proceedings of the Second International Conference on Security in Pervasive Computing","author":"Gruteser","year":"2005"},{"key":"2025121518595720900_ref121","volume-title":"Theory of Rank Tests","author":"Hajek","year":"1999","edition":"2"},{"issue":"1","key":"2025121518595720900_ref122","first-page":"115","article-title":"American factfinder: Disclosure limitation for the advanced query system,","volume":"20","author":"Hawla","year":"2004","journal-title":"Journal of Official Statistics"},{"key":"2025121518595720900_ref123","doi-asserted-by":"crossref","DOI":"10.14778\/1453856.1453873","article-title":"Resisting structural re-identification in anonymized social networks,","volume-title":"in Proceedings of the 34th International Conference on Very Large Data Bases (VLDB)","author":"Hay","year":"2008"},{"key":"2025121518595720900_ref124","doi-asserted-by":"crossref","DOI":"10.1145\/1315245.1315266","article-title":"Preserving privacy in GPS traces via uncertainty-aware path cloaking,","volume-title":"in Proceedings of the ACM Conference on Computer and Communications Security (CCS)","author":"Hoh","year":"2007"},{"issue":"8","key":"2025121518595720900_ref125","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pgen.1000167","article-title":"Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays,","volume":"4","author":"Homer","journal-title":"Plos Genetics"},{"key":"2025121518595720900_ref126","article-title":"Deriving private information from randomized data,","volume-title":"in Proceedings of the 23th ACM SIGMOD Conference on Management of Data","author":"Huang","year":"2004"},{"key":"2025121518595720900_ref127","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-25955-8_26","article-title":"The ARGUS software in the CASC-project,","volume-title":"Privacy in Statistical Databases","author":"Hundepool","year":"2004"},{"key":"2025121518595720900_ref128","article-title":"t-ARGUS: Software for statistical disclosure control,\u201d","volume-title":"in Proceedings of the Third International Seminar on Statistical Confidentiality","author":"Hundepool","year":"1996"},{"issue":"395","key":"2025121518595720900_ref129","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1080\/01621459.1986.10478321","article-title":"Multiplicative errors-in-variables models with applications to recent data released by the U.S. department of energy,","volume":"81","author":"Hwang","year":"1986","journal-title":"Journal of the American Statistical Association"},{"key":"2025121518595720900_ref130","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/978-3-540-79721-0_67","article-title":"Multi-granularity classification rule discovery using ERID,","volume-title":"in Proceedings of the 3rd International Conference on Rough Sets and Knowledge Technology (RSKT)","author":"Im","year":"2008"},{"key":"2025121518595720900_ref131","doi-asserted-by":"crossref","DOI":"10.1109\/ICDE.2007.369024","article-title":"K-anonymization as spatial indexing: Toward scalable and incremental anonymization,","volume-title":"in Proceedings of the 33rd International Conference on Very Large Databases (VLDB)","author":"Iwuchukwu","year":"2007"},{"key":"2025121518595720900_ref132","doi-asserted-by":"crossref","DOI":"10.1145\/775047.775089","article-title":"Transforming data to satisfy privacy constraints,","volume-title":"ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Iyengar","year":"2002"},{"issue":"2","key":"2025121518595720900_ref133","first-page":"427","article-title":"Statistical disclosure limitation practices at United States statistical agencies,","volume":"9","author":"Jabine","year":"1993","journal-title":"Journal of Official Statistics"},{"key":"2025121518595720900_ref134","article-title":"An Online Framework for Publishing Dynamic Privacy-Sensitive GPS Traces,","author":"Jin","year":"2009"},{"key":"2025121518595720900_ref135","first-page":"177","article-title":"Impact of decision-region based classification mining algorithms on database security,","volume-title":"in Proceedings of the IFIP WG 11.3 Thirteenth International Conference on Database Security","author":"Johnsten","year":"2000"},{"key":"2025121518595720900_ref136","article-title":"I know what you did last summer \u2014 query logs and user privacy,","volume-title":"in Proceedings of the 16th Conference on Information and Knowledge Management (CIKM)","author":"Jones","year":"2007"},{"issue":"12","key":"2025121518595720900_ref137","doi-asserted-by":"crossref","DOI":"10.1109\/TKDE.2007.190662","article-title":"Preventing Locationbased identity inference on anonymous spatial queries,","volume":"19","author":"Kalnis","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"2025121518595720900_ref138","doi-asserted-by":"crossref","DOI":"10.1109\/ICDM.2003.1250908","article-title":"On the privacy preserving properties of random data perturbation techniques,","volume-title":"in Proceedings of the International Conference on Data Mining","author":"Kargupta","year":"2003"},{"key":"2025121518595720900_ref139","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1198\/000313006X124640","article-title":"A framework for evaluating the utility of data altered to protect confidentiality,","volume":"60","author":"Karr","year":"2006","journal-title":"The American Statistician"},{"key":"2025121518595720900_ref140","first-page":"248","article-title":"Multiple imputation and disclosure protection: The case of the 1995 survey of consumer finances,","volume-title":"Record Linkage Techniques","author":"Kennickell","year":"1997"},{"key":"2025121518595720900_ref141","article-title":"Attacks on privacy and de Finetti\u2019s theorem,","volume-title":"SIGMOD","author":"Kifer","year":"2009"},{"key":"2025121518595720900_ref142","doi-asserted-by":"crossref","DOI":"10.1145\/1142473.1142499","article-title":"Injecting utility into anonymized datasets,","volume-title":"in Proceedings of the ACM SIGMOD International Conference on Management of Data","author":"Kifer","year":"2006"},{"key":"2025121518595720900_ref143","first-page":"303","article-title":"A method for limiting disclosure in microdata based on random noise and transformation,","volume-title":"in Proceedings of the Section on Survey Research Methods","author":"Kim"},{"key":"2025121518595720900_ref144","first-page":"171","article-title":"Releasing search queries and clicks privately,","volume-title":"18th International World Wide Web Conference","author":"Korolova","year":"2009"},{"key":"2025121518595720900_ref145","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-72037-9_8","article-title":"Inference attacks on location tracks,","volume-title":"in Proceedings of the 5th International Conference on Pervasive Computing","author":"Krumm","year":"2007"},{"key":"2025121518595720900_ref146","doi-asserted-by":"crossref","DOI":"10.1145\/1242572.1242657","article-title":"On anonymizing query logs via token-based hashing,","volume-title":"in Proceedings of the 16th International World Wide Web Conference (WWW)","author":"Kumar","year":"2007"},{"key":"2025121518595720900_ref147","doi-asserted-by":"crossref","DOI":"10.1145\/1066157.1066165","article-title":"To do or not to do: The dilemma of disclosing anonymized data,","volume-title":"in Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data (SIGMOD)","author":"Lakshmanan","year":"2005"},{"issue":"2","key":"2025121518595720900_ref148","first-page":"313","article-title":"Measures of disclosure risk and harm,","volume":"9","author":"Lambert","year":"1993","journal-title":"Journal of Official Statistics"},{"key":"2025121518595720900_ref149","article-title":"Incognito: Efficient fulldomain k-anonymity,","volume-title":"in Proceedings of the ACM SIGMOD International Conference on Management of Data","author":"LeFevre","year":"2005"},{"key":"2025121518595720900_ref150","doi-asserted-by":"crossref","DOI":"10.1109\/ICDE.2006.101","article-title":"Mondrian Multidimensional k-Anonymity,","volume-title":"in Proceedings of the 22nd International Conference on Data Engineering (ICDE)","author":"LeFevre","year":"2006"},{"key":"2025121518595720900_ref151","doi-asserted-by":"crossref","DOI":"10.1145\/1150402.1150435","article-title":"Workload-Aware Anonymization,","volume-title":"in Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"LeFevre","year":"2006"},{"issue":"3","key":"2025121518595720900_ref152","doi-asserted-by":"crossref","DOI":"10.1145\/1386118.1386123","article-title":"Workload-aware anonymization techniques for large-scale data sets,","volume":"33","author":"LeFevre","journal-title":"ACM Transactions on Database Systems"},{"issue":"4","key":"2025121518595720900_ref153","first-page":"681","article-title":"Measuring the disclosure protection of micro aggregated business microdata. An analysis taking as an example the german structure of costs survey,","volume":"22","author":"Lenz","year":"2006","journal-title":"Journal of Official Statistics"},{"key":"2025121518595720900_ref154","first-page":"686","article-title":"Hiding in the crowd: Privacy preservation on evolving streams through correlation tracking,","volume-title":"in Proceedings of the IEEE International Conference on Data Engineering (ICDE)","author":"Li","year":"2007"},{"key":"2025121518595720900_ref155","article-title":"Preservation of proximity privacy in publishing numeric sensitive data,","volume-title":"in Proceedings of the ACM SIGMOD International Conference on Management of Data","author":"Li","year":"2008"},{"issue":"416","key":"2025121518595720900_ref156","first-page":"1065","article-title":"Large-sample significance levels from multiply imputed data using moment-based statistics and an f reference distribution,","volume":"86","author":"Li","year":"1991","journal-title":"Journal of the American Statistical Association"},{"key":"2025121518595720900_ref157","doi-asserted-by":"crossref","DOI":"10.1109\/ICDE.2007.367856","article-title":"t-Closeness: Privacy beyond k-anonymity and l-diversity,","volume-title":"in Proceedings of the IEEE International Conference on Data Engineering (ICDE)","author":"Li","year":"2007"},{"key":"2025121518595720900_ref158","doi-asserted-by":"crossref","DOI":"10.1109\/ICDE.2008.4497453","article-title":"Injector: Mining background knowledge for data anonymization,","volume-title":"in Proceedings of the IEEE International Conference on Data Engineering (ICDE)","author":"Li","year":"2008"},{"issue":"3","key":"2025121518595720900_ref159","doi-asserted-by":"crossref","DOI":"10.1145\/3979.4017","article-title":"A data distortion by probability distribution,","volume":"10","author":"Liew","journal-title":"ACM Transactions on Database Systems"},{"issue":"2","key":"2025121518595720900_ref160","first-page":"407","article-title":"Statistical analysis of masked data,","volume":"9","author":"Little","year":"1993","journal-title":"Journal of Official Statistics"},{"key":"2025121518595720900_ref161","article-title":"Selective multiple imputation of keys for statistical disclosure control in microdata,","volume-title":"ASA Proceedings of the Joint Statistical Meetings","author":"Liu","year":"2002"},{"key":"2025121518595720900_ref162","first-page":"357","volume-title":"A Survey of Attack Techniques on Privacy-preserving Data Perturbation Methods","author":"Liu","year":"2008"},{"key":"2025121518595720900_ref163","doi-asserted-by":"crossref","DOI":"10.1145\/1376616.1376629","article-title":"Towards identity anonymization on graphs,","volume-title":"in Proceedings of the ACM SIGMOD International Conference on Management of Data","author":"Liu","year":"2008"},{"key":"2025121518595720900_ref164","volume-title":"\u201cDefining and Enforcing Privacy in Data Sharing,\u201d","author":"Machanavajjhala","year":"2008"},{"key":"2025121518595720900_ref165","doi-asserted-by":"crossref","DOI":"10.1145\/1142351.1142375","article-title":"On the efficiency of checking perfect privacy,","volume-title":"in Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS)","author":"Machanavajjhala","year":"2006"},{"key":"2025121518595720900_ref166","doi-asserted-by":"crossref","DOI":"10.1109\/ICDE.2006.1","article-title":"\u2113-Diversity: Privacy beyond k-anonymity,","volume-title":"in Proceedings of the IEEE International Conference on Data Engineering (ICDE)","author":"Machanavajjhala","year":"2006"},{"key":"2025121518595720900_ref167","article-title":"Privacy: From theory to practice on the map,","volume-title":"in Proceedings of the IEEE International Conference on Data Engineering (ICDE)","author":"Machanavajjhala","year":"2008"},{"issue":"1","key":"2025121518595720900_ref168","doi-asserted-by":"crossref","DOI":"10.1145\/1217299.1217302","article-title":"\u2113-diversity: Privacy beyond k-anonymity,","volume":"1","author":"Machanavajjhala","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"2025121518595720900_ref169","article-title":"Betrayed by my shadow: Learning data identity via trail matching,","volume-title":"Journal of Privacy Technology","author":"Malin"},{"issue":"1","key":"2025121518595720900_ref170","doi-asserted-by":"crossref","DOI":"10.1197\/jamia.M1603","article-title":"An evaluation of the current state of genomic data privacy protection and a roadmap for the future,","volume":"12","author":"Malin","journal-title":"Journal of the American Medical Informatics Association"},{"key":"2025121518595720900_ref171","article-title":"Re-identification of familial database records,","volume-title":"in Proceedings of the American Medical Informatics Association (AMIA) Annual Symposium","author":"Malin","year":"2006"},{"issue":"3","key":"2025121518595720900_ref172","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/j.jbi.2004.04.005","article-title":"How (Not) to protect genomic data privacy in a distributed network: Using train re-identification to evaluate and design anonymity protection systems,","volume":"37","author":"Malin","year":"2004","journal-title":"Journal of Biomedical Informatics"},{"key":"2025121518595720900_ref173","doi-asserted-by":"crossref","DOI":"10.1109\/ICDE.2007.367858","article-title":"Worst case background knowledge for privacy preserving data publishing,","volume-title":"in Proceedings of the IEEE International Conference on Data Engineering (ICDE)","author":"Martin","year":"2007"},{"key":"2025121518595720900_ref174","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-25955-8_24","article-title":"Fast generation of accurate synthetic microdata,","volume-title":"Privacy in Statistical Databases","author":"Mateo-Sanz","year":"2004"},{"key":"2025121518595720900_ref175","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4899-3242-6","volume-title":"Generalized Linear Models","author":"McCullagh","year":"1989","edition":"2"},{"issue":"1","key":"2025121518595720900_ref176","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1093\/biomet\/79.1.103","article-title":"Performing likelihood ratio tests with multiply-imputed data sets,","volume":"79","author":"Meng","year":"1992","journal-title":"Biometrika"},{"issue":"2","key":"2025121518595720900_ref177","first-page":"103","article-title":"Evaluation of a reconstruction of the adjusted 1990 census for Florida,","volume":"13","author":"Meyer","year":"1997","journal-title":"Journal of Official Statistics"},{"key":"2025121518595720900_ref178","doi-asserted-by":"crossref","DOI":"10.1145\/1055558.1055591","article-title":"On the complexity of optimal k-anonymity,","volume-title":"in Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS)","author":"Meyerson","year":"2004"},{"key":"2025121518595720900_ref179","doi-asserted-by":"crossref","DOI":"10.1145\/1007568.1007633","article-title":"A formal analysis of information disclosure in data exchange,","volume-title":"in Proceedings of the ACM SIGMOD International Conference on Management of Data","author":"Miklau","year":"2004"},{"key":"2025121518595720900_ref180","article-title":"The new casper: Query processing for location services without compromising privacy,","volume-title":"in Proceedings of the 32nd International Conference on Very Large Databases (VLDB)","author":"Mokbel","year":"2006"},{"key":"2025121518595720900_ref181","article-title":"Controlled data-swapping techniques for masking public use microdata sets,","author":"Moore","year":"1996"},{"issue":"4","key":"2025121518595720900_ref182","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1023\/A:1025610705286","article-title":"A theoretical basis for perturbation methods,","volume":"13","author":"Muralidhar","journal-title":"Statistics and Computing"},{"issue":"3","key":"2025121518595720900_ref183","first-page":"507","article-title":"A comparison of multiple imputation and data perturbation for masking numerical variables,","volume":"22","author":"Muralidhar","year":"2006","journal-title":"Journal of Official Statistics"},{"key":"2025121518595720900_ref184","first-page":"768","article-title":"Providing privacy through plausibly deniable search,","volume-title":"in Proceedings of the 9th SIAM International Conference on Data Mining (SDM)","author":"Murugesan","year":"2009"},{"key":"2025121518595720900_ref185","first-page":"252","article-title":"Supervised learning by training on aggregate outputs,","volume-title":"in Proceedings of the 7th IEEE International Conference on Data Mining (ICDM)","author":"Musicant"},{"key":"2025121518595720900_ref186","doi-asserted-by":"crossref","DOI":"10.1109\/SP.2008.33","article-title":"Robust de-anonymization of large sparse datasets,","volume-title":"IEEE Symposium on Security and Privacy","author":"Narayanan","year":"2008"},{"key":"2025121518595720900_ref187","doi-asserted-by":"crossref","DOI":"10.1109\/SP.2009.22","article-title":"De-anonymizing social networks,","volume-title":"IEEE Symposium on Security and Privacy","author":"Narayanan","year":"2009"},{"key":"2025121518595720900_ref188","doi-asserted-by":"crossref","DOI":"10.1145\/1247480.1247554","article-title":"Hiding the presence of individuals from shared databases,","volume-title":"in Proceedings of the ACM SIGMOD International Conference on Management of Data","author":"Nergiz","year":"2007"},{"key":"2025121518595720900_ref189","doi-asserted-by":"crossref","DOI":"10.1145\/1503402.1503413","article-title":"Toward trajectory anonymization: A generalization-based approach,","volume-title":"in Proceedings of the 2nd SIGSPATIAL ACM GIS International Workshop on Security and Privacy in GIS and LBS","author":"Nergiz","year":"2008"},{"issue":"3","key":"2025121518595720900_ref190","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1016\/j.datak.2007.03.009","article-title":"Thoughts on k-anonymization,","volume":"63","author":"Nergiz","year":"2007","journal-title":"Data & Knowledge Engineering"},{"key":"2025121518595720900_ref191","unstructured":"Netflix\n          . The Netflix Prize Rules:http:\/\/www.netflixprize.com\/\/rules."},{"key":"2025121518595720900_ref192","doi-asserted-by":"crossref","DOI":"10.1145\/1250790.1250803","article-title":"Smooth sensitivity and sampling in private data analysis,","volume-title":"39th ACM Symposium on Theory of Computing (STOC)","author":"Nissim","year":"2007"},{"key":"2025121518595720900_ref193","doi-asserted-by":"crossref","DOI":"10.1145\/988672.988678","article-title":"Anti-aliasing on the web,","volume-title":"in Proceedings of the 13th International Conference on World Wide Web (WWW)","author":"Novak","year":"2004"},{"issue":"3","key":"2025121518595720900_ref194","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/S0933-3657(98)00056-6","article-title":"Using Boolean reasoning to anonymize databases,","volume":"15","author":"Ohrn","year":"1999","journal-title":"Artificial Intelligence in Medicine"},{"issue":"4","key":"2025121518595720900_ref195","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1080\/07350015.1988.10509697","article-title":"Disclosure risk and disclosure avoidance for microdata,","volume":"6","author":"Paass","journal-title":"Journal of Business & Economic Statistics"},{"issue":"4","key":"2025121518595720900_ref196","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1145\/32204.42174","article-title":"The use of regression methodology for the compromise of confidential information in statistical databases,","volume":"12","author":"Palley","year":"1987","journal-title":"ACM Transactions on Database Systems"},{"key":"2025121518595720900_ref197","doi-asserted-by":"crossref","DOI":"10.3115\/1118693.1118704","article-title":"Thumbs up?: Sentiment classification using machine learning techniques,","volume-title":"in Proceedings of the ACL-02 conference on Empirical methods in natural language processing (EMNLP)","author":"Pang","year":"2002"},{"key":"2025121518595720900_ref198","article-title":"Time series compressibility and privacy,","volume-title":"VLDB","author":"Papadimitriou","year":"2007"},{"key":"2025121518595720900_ref199","volume-title":"The Uncertain Reasoner\u2019s Companion","author":"Paris","year":"1994"},{"key":"2025121518595720900_ref200","article-title":"Approximation algorithms for k-anonymity,","volume-title":"in Proceedings of the ACM SIGMOD International Conference on Management of Data","author":"Park","year":"2007"},{"key":"2025121518595720900_ref201","article-title":"Maintaining k-anonymity against incremental updates,","volume-title":"SSDBM","author":"Pei","year":"2007"},{"key":"2025121518595720900_ref202","article-title":"Website privacy preservation for query log publishing,","volume-title":"in Proceedings of the 1st ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD (PinKDD)","author":"Poblete","year":"2007"},{"key":"2025121518595720900_ref203","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1023\/A:1025606604377","article-title":"Maximum entropy simulation for microdata protection,","volume":"13","author":"Polettini","year":"2003","journal-title":"Statistics and Computing"},{"issue":"4","key":"2025121518595720900_ref204","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1023\/A:1025662722124","article-title":"A comment on \u201cA theoretical basis for perturbation methods\u201d by Krishnamurty Muralidhar and Rathindra Sarathy,","volume":"13","author":"Polettini","year":"2003","journal-title":"Statistics and Computing"},{"key":"2025121518595720900_ref205","first-page":"776","article-title":"Estimating labels from label proportions,","volume-title":"in Proceedings of the 25th International Conference Machine Learning (ICML)","author":"Quadrianto","year":"2008"},{"issue":"1","key":"2025121518595720900_ref206","first-page":"85","article-title":"A multivariate technique for multiply imputing missing values using a sequence of regression models,","volume":"27","author":"Raghunathan","year":"2001","journal-title":"Survey Methodology"},{"key":"2025121518595720900_ref207","first-page":"1","article-title":"Multiple imputation for statistical disclosure limitation,","volume":"19","author":"Raghunathan","year":"2003","journal-title":"Journal of Official Statistics"},{"key":"2025121518595720900_ref208","doi-asserted-by":"crossref","DOI":"10.1007\/11552338_8","article-title":"Can attackers learn from samples?,","volume-title":"2nd VLDB Workshop on Secure Data Management (SDM)","author":"Ramesh","year":"2005"},{"issue":"434","key":"2025121518595720900_ref209","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1080\/01621459.1996.10476910","article-title":"On variance estimation with imputed survey data,","volume":"91","author":"Rao","year":"1996","journal-title":"Journal of the American Statistical Association"},{"key":"2025121518595720900_ref210","doi-asserted-by":"crossref","DOI":"10.1145\/1559795.1559812","article-title":"Relationship privacy: Output perturbation for queries with joins,","volume-title":"PODS","author":"Rastogi","year":"2009"},{"key":"2025121518595720900_ref211","article-title":"The boundary between privacy and utility in data publishing,","author":"Rastogi"},{"key":"2025121518595720900_ref212","article-title":"The boundary between privacy and utility in data publishing,","volume-title":"in Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB)","author":"Rastogi","year":"2007"},{"issue":"2","key":"2025121518595720900_ref213","first-page":"181","article-title":"Inference for partially synthetic, public use microdata sets,","volume":"29","author":"Reiter","year":"2003","journal-title":"Survey Methodology"},{"issue":"3","key":"2025121518595720900_ref214","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1080\/09332480.2004.10554907","article-title":"New approaches to data dissemination: A glimpse into the future (?),","volume":"17","author":"Reiter","year":"2004","journal-title":"Chance"},{"key":"2025121518595720900_ref215","first-page":"235","article-title":"Simultaneous use of multiple imputation for missing data and disclosure limitation,","volume":"30","author":"Reiter","year":"2004","journal-title":"Survey Methodology"},{"key":"2025121518595720900_ref216","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1198\/016214505000000619","article-title":"Estimating risks of identification disclosure in microdata,","volume":"100","author":"Reiter","year":"2005","journal-title":"Journal of the American Statistical Association"},{"key":"2025121518595720900_ref217","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1016\/j.jspi.2004.02.003","article-title":"Significance tests for multi-component estimands from multiply-imputed, synthetic microdata,","volume":"131","author":"Reiter","year":"2005","journal-title":"Journal of Statistical Planning and Inference"},{"issue":"3","key":"2025121518595720900_ref218","first-page":"441","article-title":"Using cart to generate partially synthetic public use microdata,","volume":"21","author":"Reiter","year":"2005","journal-title":"Journal of Official Statistics"},{"key":"2025121518595720900_ref219","unstructured":"Research Data Centres of the Federal Statistical Office and the Statistical Offices of the Lander\n          \n          http:\/\/www.forschungsdatenzentrum.de\/en\/index.asp, June9, 2009."},{"key":"2025121518595720900_ref220","volume-title":"Monte Carlo Statistical Methods","author":"Robert","year":"2005"},{"issue":"2","key":"2025121518595720900_ref221","article-title":"Discussion statistical disclosure limitation,","volume":"9","author":"Rubin","journal-title":"Journal of Official Statistics"},{"key":"2025121518595720900_ref222","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1080\/01621459.1996.10476908","article-title":"Multiple imputation after 18+ years,","volume":"91","author":"Rubin","year":"1996","journal-title":"Journal of the American Statistical Association"},{"key":"2025121518595720900_ref223","volume-title":"Multiple Imputation for Nonresponse in Surveys","author":"Rubin","year":"2004"},{"key":"2025121518595720900_ref224","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1080\/01621459.1986.10478280","article-title":"Multiple imputation for interval estimation from simple random samples with ignorable nonresponse,","volume":"81","author":"Rubin","year":"1986","journal-title":"Journal of the American Statistical Association"},{"key":"2025121518595720900_ref225","article-title":"The U.S. Census Bureau Model","author":"S. Ruggles Secure Data Laboratories:"},{"key":"2025121518595720900_ref226","first-page":"1010","article-title":"Protecting respondents\u2019 identities in microdata release,","volume-title":"Transactions on Knowledge and Data Engineering","author":"Samarati","year":"2001"},{"key":"2025121518595720900_ref227","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/978-3-540-25955-8_25","article-title":"Trade-off between disclosure risk and information loss using multivariate microaggregation: A case study on business data,","volume-title":"Privacy in Statistical Databases","author":"Sanchez","year":"2004"},{"issue":"1","key":"2025121518595720900_ref228","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/096228029900800102","article-title":"Multiple imputation: A primer,","volume":"8","author":"Schafer","year":"1999","journal-title":"Statistical Methods in Medical Research"},{"key":"2025121518595720900_ref229","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-4250-5","volume-title":"Theory of Statistics","author":"Schervish","year":"1995"},{"key":"2025121518595720900_ref230","doi-asserted-by":"crossref","DOI":"10.1055\/s-0038-1635690","article-title":"Identification and retrieval of personal records from a statistical bank,","volume-title":"Methods of Information in Medicine","author":"Schlorer","year":"1975"},{"key":"2025121518595720900_ref231","doi-asserted-by":"crossref","DOI":"10.1002\/9780471722199","volume-title":"Linear Regression Analysis.","author":"Seber","year":"2003"},{"key":"2025121518595720900_ref232","doi-asserted-by":"crossref","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication theory of secrecy systems,","volume-title":"The Bell System Technical Journal","author":"Shannon","year":"1949"},{"key":"2025121518595720900_ref233","first-page":"1283","article-title":"Second order cone programming approaches for handling missing and uncertain data,","volume":"7","author":"Shivaswamy","year":"2006","journal-title":"Journal of Machine Learning Research"},{"issue":"1","key":"2025121518595720900_ref234","first-page":"31","article-title":"Disclosure control for census microdata,","volume":"10","author":"Skinner","year":"1994","journal-title":"Journal of Official Statistics"},{"key":"2025121518595720900_ref235","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-25955-8_3","article-title":"Bounds for cell entries in two-way tables given conditional relative frequencies,","volume-title":"Privacy in Statistical Databases","author":"Slavkovic","year":"2004"},{"key":"2025121518595720900_ref236","first-page":"131","article-title":"Measures of confidentiality,","volume-title":"Statistics of Income and Related Administrative Record Research","author":"Spruill","year":"1982"},{"key":"2025121518595720900_ref237","first-page":"324","article-title":"Provable data privacy,","volume-title":"in Proceedings of the International Conference on Database and Expert Systems Applications (DEXA)","author":"Stoffel","year":"2005"},{"key":"2025121518595720900_ref238","first-page":"356","article-title":"Datafly: A system for providing anonymity in medical data,","volume-title":"DBSec","author":"Sweeney","year":"1997"},{"key":"2025121518595720900_ref239","article-title":"Guaranteeing anonymity when sharing medical data, the datafly system,","volume-title":"Journal of the American Medical Informatics Association","author":"Sweeney","year":"1997"},{"key":"2025121518595720900_ref240","volume-title":"\u201cUniqueness of simple demographics in the U.S. population,\u201d","author":"Sweeney","year":"2000"},{"issue":"5","key":"2025121518595720900_ref241","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"k-anonymity: A model for protecting privacy,","volume":"10","author":"Sweeney","year":"2002","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"2025121518595720900_ref242","article-title":"Local recoding and record swapping by maximum weight matching for disclosure control of microdata sets,","volume":"18","author":"Takemura","journal-title":"Journal of Official Statistics"},{"issue":"3","key":"2025121518595720900_ref243","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1016\/0378-3758(91)90047-I","article-title":"Optimal noise addition for preserving confidentiality in multivariate data,","volume":"27","author":"Tendick","journal-title":"Journal of Statistical Planning and Inference"},{"issue":"324","key":"2025121518595720900_ref244","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1080\/01621459.1968.10480930","article-title":"A model for optimum linkage of records,","volume":"63","author":"Tepping","year":"1968","journal-title":"Journal of the American Statistical Association"},{"key":"2025121518595720900_ref245","doi-asserted-by":"crossref","DOI":"10.1109\/MDM.2008.29","article-title":"Privacy preservation in the publication of trajectories,","volume-title":"in Proceedings of the 9th International Conference on Mobile Data Management (MDM)","author":"Terrovitis","year":"2008"},{"key":"2025121518595720900_ref246","doi-asserted-by":"crossref","DOI":"10.14778\/1453856.1453874","article-title":"Privacy-preserving anonymization of set-valued data,","volume-title":"in Proceedings of the 34th International Conference on Very Large Databases (VLDB)","author":"Terrovitis","year":"2008"},{"key":"2025121518595720900_ref247","unstructured":"The Avatar Project at IBM:\n          \n          http:\/\/www.almaden.ibm.com\/cs\/projects\/avatar\/."},{"key":"2025121518595720900_ref248","author":"The Federal Death Penalty System A Statistical Survey (1988\u20132000)","year":"2000"},{"key":"2025121518595720900_ref249","unstructured":"The MystiQ Project at University of Washington:\n          \n          http:\/\/www.cs.washington.edu\/homes\/suciu\/project-mystiq.html."},{"key":"2025121518595720900_ref250","unstructured":"The ORION database system at Purdue University:\n          \n          http:\/\/orion.cs.purdue.edu\/."},{"key":"2025121518595720900_ref251","unstructured":"The Trio at Stanford University:\n          \n          http:\/\/infolab.stanford.edu\/trio\/."},{"key":"2025121518595720900_ref252","first-page":"937","article-title":"Bayesian regression with input noise for high dimensional data,","volume-title":"in Proceedings of the 23rd International Conference on Machine Learning (ICML)","author":"Ting","year":"2006"},{"key":"2025121518595720900_ref253","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-25955-8_13","article-title":"Microaggregation for categorical variables: A median based approach,","volume-title":"Privacy in Statistical Databases","author":"Torra","year":"2004"},{"key":"2025121518595720900_ref254","article-title":"Contribucions a la Microagregacio per a la Proteccio de Dades Estadistiques (Contributions to the Microaggregation for the Statistical Data Protection,","author":"Torres","year":"2003"},{"issue":"5","key":"2025121518595720900_ref255","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1142\/S0218488502001612","article-title":"Modelling user uncertainty for disclosure risk and data utility,","volume":"10","author":"Trottini","year":"2002","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"2025121518595720900_ref256","unstructured":"U.S. Census Bureau Center for Economic Studies\n          \n          http:\/\/www.ces.census.gov, June9, 2009."},{"key":"2025121518595720900_ref257","unstructured":"U.S. Census Bureau Statement of Confidentiality\n          \n          http:\/\/factfinder.census.gov\/jsp\/saff\/SAFFInfo.jsp?_pageId=su5_confidentiality, Retrieved June9, 2009."},{"key":"2025121518595720900_ref258","article-title":"Flexible multivariate imputation by mice,","author":"Oudshoom","year":"1999"},{"key":"2025121518595720900_ref259","doi-asserted-by":"crossref","DOI":"10.1109\/ICDM.2005.142","article-title":"Template-based privacy preservation in classification problems,","volume-title":"in Proceedings of the IEEE International Conference on Data Mining (ICDM)","author":"Wang"},{"key":"2025121518595720900_ref260","doi-asserted-by":"crossref","DOI":"10.1145\/1150402.1150449","article-title":"Anonymizing sequential releases,","volume-title":"in Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Wang","year":"2006"},{"key":"2025121518595720900_ref261","doi-asserted-by":"crossref","DOI":"10.1109\/ICDM.2004.10110","article-title":"Bottom-up generalization: A data mining solution to privacy protection,","volume-title":"in Proceedings of the 4th IEEE International Conference on Data Mining (ICDM)","author":"Wang","year":"2004"},{"key":"2025121518595720900_ref262","doi-asserted-by":"crossref","DOI":"10.1080\/01621459.1965.10480775","article-title":"Randomized Response: A survey technique for eliminating evasive answer bias,","volume-title":"Journal of the American Statistical Association","author":"Warner","year":"1965"},{"key":"2025121518595720900_ref263","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-4028-0","volume-title":"Statistical Disclosure Control in Practice","author":"Willenborg","year":"1996"},{"key":"2025121518595720900_ref264","volume-title":"Elements of Statistical Disclosure Control","author":"Willenborg","year":"2000"},{"key":"2025121518595720900_ref265","volume-title":"\u201cThe state of record linkage and current research problems,\u201d","author":"Winkler","year":"1999"},{"key":"2025121518595720900_ref266","volume-title":"\u201cSingle-ranking micro-aggregation and re-identification,\u201d","author":"Winkler","year":"2002"},{"key":"2025121518595720900_ref267","article-title":"Using simulated annealing for k-anonymity,","volume-title":"Research Report Series (Statistics #2002-7), U. S. Census Bureau","author":"Winkler","year":"2002"},{"key":"2025121518595720900_ref268","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-25955-8_18","article-title":"Masking and re-identification methods for public-use microdata: Overview and research problems,","author":"Winkler","year":"2004"},{"key":"2025121518595720900_ref269","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-25955-8_17","article-title":"Re-identification methods for masked microdata,","volume-title":"Privacy in Statistical Databases","author":"Winkler","year":"2004"},{"key":"2025121518595720900_ref270","volume-title":"\u201cOverview of record linkage and current research directions,\u201d","author":"Winkler","year":"2005"},{"key":"2025121518595720900_ref271","article-title":"Minimality attack in privacy preserving data publishing,","volume-title":"in Proceedings of the 33rd International Conference on Very Large Databases (VLDB)","author":"Wong","year":"2007"},{"key":"2025121518595720900_ref272","author":"Workshop on Data Confidentiality","year":"2007"},{"key":"2025121518595720900_ref273","article-title":"Anatomy: Simple and effective privacy preservation,","volume-title":"in Proceedings of the 32nd International Conference on Very Large Databases (VLDB)","author":"Xiao","year":"2006"},{"key":"2025121518595720900_ref274","doi-asserted-by":"crossref","DOI":"10.1145\/1142473.1142500","article-title":"Personalized Privacy Preservation,","volume-title":"in Proceedings of the ACM SIGMOD International Conference on Management of Data","author":"Xiao","year":"2006"},{"key":"2025121518595720900_ref275","doi-asserted-by":"crossref","DOI":"10.1145\/1247480.1247556","article-title":"m-invariance: Towards privacy preserving re-publication of dynamic datasets,","volume-title":"in Proceedings of theACM SIGMOD International Conference on Management of Data","author":"Xiao","year":"2007"},{"issue":"4","key":"2025121518595720900_ref276","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/s00778-006-0011-4","article-title":"Privacy leakage in multi-relational databases: A semi-supervised learning perspective,","volume":"15","author":"Xiong","journal-title":"VLDB Journal"},{"key":"2025121518595720900_ref277","article-title":"Risk & distortion based k-anonymity,","volume-title":"Information Security Applications","author":"Xu","year":"2008"},{"key":"2025121518595720900_ref278","first-page":"910","article-title":"Checking for k-anonymity violation by views,","volume-title":"in Proceedings of the 31st International Conference on Very Large Databases (VLDB)","author":"Yao","year":"2005"},{"key":"2025121518595720900_ref279","article-title":"Learning decision tree classifiers from attribute value taxonomies and partially specified data,","volume-title":"Proceedings of International Conference Machine Learning (ICML)","author":"Zhang","year":"2003"},{"issue":"2","key":"2025121518595720900_ref280","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s10115-005-0211-z","article-title":"Learning accurate and concise na\u00efve Bayes classifiers from attribute value taxonomies and data,","volume":"9","author":"Zhang","journal-title":"Knowledge Information Systems"},{"key":"2025121518595720900_ref281","doi-asserted-by":"crossref","DOI":"10.1145\/1315245.1315316","article-title":"Information disclosure under realistic assumptions: Privacy versus optimality,","volume-title":"in Proceedings of the 14th ACM Conference on Computer and Communications Security","author":"Zhang","year":"2007"},{"key":"2025121518595720900_ref282","doi-asserted-by":"crossref","DOI":"10.1109\/ICDE.2007.367857","article-title":"Aggregate query answering on anonymized tables,","volume-title":"in Proceedings of the IEEE International Conference on Data Engineering (ICDE)","author":"Zhang","year":"2007"},{"key":"2025121518595720900_ref283","article-title":"Preserving the privacy of sensitive relationships in graph data,","volume-title":"Proceedings of Privacy, Security and Trust in KDD Workshop","author":"Zheleva","year":"2007"},{"key":"2025121518595720900_ref284","doi-asserted-by":"crossref","DOI":"10.1145\/1526709.1526781","article-title":"To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles,","volume-title":"in Proceedings of the World Wide Web Conference","author":"Zheleva","year":"2009"},{"key":"2025121518595720900_ref285","article-title":"Preserving privacy in social networks against neighborhoos attacks,","volume-title":"in Proceedings of the IEEE International Conference on Data Engineering (ICDE)","author":"Zhou","year":"2008"}],"container-title":["Foundations and Trends in Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/ftdbs\/article-pdf\/2\/1-2\/1\/11047252\/1900000008en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ftdbs\/article-pdf\/2\/1-2\/1\/11047252\/1900000008en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T00:00:52Z","timestamp":1765843252000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ftdbs\/article\/2\/1-2\/1\/1328608\/Privacy-Preserving-Data-Publishing"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,20]]},"references-count":285,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2009,10,20]]}},"URL":"https:\/\/doi.org\/10.1561\/1900000008","relation":{},"ISSN":["1931-7883","1931-7891"],"issn-type":[{"value":"1931-7883","type":"print"},{"value":"1931-7891","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,10,20]]}}}