{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:36:08Z","timestamp":1725863768910},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319455068"},{"type":"electronic","value":"9783319455075"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45507-5_13","type":"book-chapter","created":{"date-parts":[[2016,8,22]],"date-time":"2016-08-22T11:11:04Z","timestamp":1471864264000},"page":"193-203","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Data Anonymization as a Vector Quantization Problem: Control Over Privacy for Health Data"],"prefix":"10.1007","author":[{"given":"Yoan","family":"Miche","sequence":"first","affiliation":[]},{"given":"Ian","family":"Oliver","sequence":"additional","affiliation":[]},{"given":"Silke","family":"Holtmanns","sequence":"additional","affiliation":[]},{"given":"Aapo","family":"Kalliola","sequence":"additional","affiliation":[]},{"given":"Anton","family":"Akusok","sequence":"additional","affiliation":[]},{"given":"Amaury","family":"Lendasse","sequence":"additional","affiliation":[]},{"given":"Kaj-Mikael","family":"Bj\u00f6rk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,23]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1070\/RM2012v067n05ABEH004808","volume":"67","author":"VI Bogachev","year":"2012","unstructured":"Bogachev, V.I., Kolesnikov, A.V.: The Monge-Kantorovich problem: achievements, connections, and perspectives. Russian Math. Surveys 67, 785\u2013890 (2012)","journal-title":"Russian Math. Surveys"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Ciriani, V., di Vimercati, S.C., Foresti, S., Samarati, P.: $$\\kappa $$-anonymity. In: Secure Data Management in Decentralized Systems, vol. 33, Advances in Information Security, pp. 323\u2013353. Springer US (2007)","DOI":"10.1007\/978-0-387-27696-0_10"},{"issue":"4","key":"13_CR3","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/BF02551274","volume":"2","author":"G Cybenko","year":"1989","unstructured":"Cybenko, G.: Approximations by superpositions of sigmoidal functions. Math. Control Sig. Syst. 2(4), 303\u2013314 (1989)","journal-title":"Math. Control Sig. Syst."},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008)"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/978-3-662-43968-5_17","volume-title":"Interactive Knowledge Discovery and Data Mining in Biomedical Informatics","author":"P Kieseberg","year":"2014","unstructured":"Kieseberg, P., Hobel, H., Schrittwieser, S., Weippl, E., Holzinger, A.: Protecting anonymity in data-driven biomedical science. In: Holzinger, A., Jurisica, I. (eds.) Interactive Knowledge Discovery and Data Mining in Biomedical Informatics. LNCS, vol. 8401, pp. 301\u2013316. Springer, Heidelberg (2014)"},{"issue":"4","key":"13_CR6","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s40708-016-0046-2","volume":"3","author":"Peter Kieseberg","year":"2016","unstructured":"Kieseberg, P., Malle, B., Fr\u00fchwirt, P., Weippl, E., Holzinger, A.: A tamper-proof audit and control system for the doctor in the loop. In: Brain Informatics, pp. 1\u201311 (2016)","journal-title":"Brain Informatics"},{"issue":"1","key":"13_CR7","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1214\/aoms\/1177729694","volume":"22","author":"S Kullback","year":"1951","unstructured":"Kullback, S., Leibler, R.A.: On information and sufficiency. Ann. Math. Stat. 22(1), 79\u201386 (1951)","journal-title":"Ann. Math. Stat."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: $$\\ell $$-diversity: privacy beyond $$\\kappa $$-anonymity. In: International Conference on Data Engineering (ICDE), pp. 24 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"issue":"2","key":"13_CR9","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1214\/aoms\/1177692631","volume":"43","author":"CL Mallows","year":"1972","unstructured":"Mallows, C.L.: A note on asymptotic joint normality. Ann. Math. Stat. 43(2), 508\u2013515 (1972)","journal-title":"Ann. Math. Stat."}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability, and Security in Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45507-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,22]],"date-time":"2020-08-22T00:19:18Z","timestamp":1598055558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45507-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319455068","9783319455075"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45507-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"23 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CD-ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salzburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ieeeares2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}