{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:40:40Z","timestamp":1654108840084},"reference-count":0,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4,1]]},"abstract":"<p>Beyond l-diversity model, an algorithm (l-BDT) based on state decision tree is proposed in this paper, which aims at protecting multi-sensitive attributes from being attacked. The algorithm considers the whole situations in equivalence partitioning for the first, prunes the decision tree according to some conditions for the second, and screens out the method with the least information loss of equivalence partitioning for the last. The analysis and experiments show that the l-BDT algorithm has the best performance in controlling the information loss. It can be ensured that the published data is the most closed towards the original data, so as to ensure that the published data is as useful as possible.<\/p>","DOI":"10.4018\/ijitn.2016040101","type":"journal-article","created":{"date-parts":[[2016,7,19]],"date-time":"2016-07-19T11:13:28Z","timestamp":1468926808000},"page":"1-11","source":"Crossref","is-referenced-by-count":0,"title":["A State Decision Tree based Backtracking Algorithm for Multi-Sensitive Attribute Privacy Preserving"],"prefix":"10.4018","volume":"8","author":[{"given":"Yanchao","family":"Zhang","sequence":"first","affiliation":[{"name":"Institute of ICT Security Research, China Academy of Information and Communications Technology, Beijing, China"}]},{"given":"Qing","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of ICT Security Research, China Academy of Information and Communications Technology, Beijing, China"}]},{"given":"JunJun","family":"Cheng","sequence":"additional","affiliation":[{"name":"China Information Technology Security Evaluation Center, Beijing, China"}]},{"given":"JiJia","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of ICT Security Research, China Academy of Information and Communications Technology, Beijing, China"}]}],"member":"2432","container-title":["International Journal of Interdisciplinary Telecommunications and Networking"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=160062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:06:53Z","timestamp":1654106813000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJITN.2016040101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2016,4,1]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijitn.2016040101","relation":{},"ISSN":["1941-8663","1941-8671"],"issn-type":[{"value":"1941-8663","type":"print"},{"value":"1941-8671","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,1]]}}}