{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:54:10Z","timestamp":1725562450432},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642360701"},{"type":"electronic","value":"9783642360718"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36071-8_39","type":"book-chapter","created":{"date-parts":[[2013,1,10]],"date-time":"2013-01-10T01:12:34Z","timestamp":1357780354000},"page":"488-499","source":"Crossref","is-referenced-by-count":5,"title":["An Efficient and Dynamic Concept Hierarchy Generation for Data Anonymization"],"prefix":"10.1007","author":[{"given":"Sri Krishna","family":"Adusumalli","sequence":"first","affiliation":[]},{"given":"V.","family":"Valli Kumari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","unstructured":"HIPAA: Health Insurance Portability and Accountability Act (2002), http:\/\/www.hhs.gov\/ocr\/hipaa"},{"issue":"5","key":"39_CR2","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A Model for Protecting Privacy. International Journal on Uncertainty. Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"Fuzziness and Knowledge-based Systems"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D.: l-Diversity: Privacy beyond k-Anonymity. In: Proceedings of the IEEE ICDE, p. 24 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Wong, R.C., Li, J., Fu, A.W., Wang, K.: (\u03b1, k)-Anonymity: An Enhanced k-Anonymity Model for Privacy-Preserving Data Publishing. In: Proceedings of the SIGKDD (2006)","DOI":"10.1145\/1150402.1150499"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In: Proceedings of the IEEE ICDE, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"5","key":"39_CR6","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-Anonymity Privacy Protection Using Generalization and Suppression. International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems\u00a010(5), 571\u2013588 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Iyengar, V.: Transforming Data to Satisfy Privacy Constraints. In: Proceedings of the ACM SIGKDD, pp. 279\u2013288 (2002)","DOI":"10.1145\/775047.775089"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian Multidimensional k-Anonymity. In: Proceedings of the IEEE ICDE, Atlanta, Georgia (2006)","DOI":"10.1109\/ICDE.2006.101"},{"issue":"6","key":"39_CR9","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting Respondents Identities in Microdata Release. IEEE Transactions on Knowledge and Data Engineering\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Personalized Privacy Preservation. In: SIGMOD (2006)","DOI":"10.1145\/1142473.1142500"},{"key":"39_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-15546-8_2","volume-title":"Secure Data Management","author":"A. Campan","year":"2010","unstructured":"Campan, A., Cooper, N.: On-the-Fly Hierarchies for Numerical Attributes in Data Anonymization. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2010. LNCS, vol.\u00a06358, pp. 13\u201325. Springer, Heidelberg (2010)"},{"key":"39_CR12","volume-title":"Introduction to Data Mining","author":"P.-N. Tan","year":"2005","unstructured":"Tan, P.-N., Steinbach, M., Kumar, V.: Introduction to Data Mining. Addison Wesley, Reading (2005)"},{"key":"39_CR13","unstructured":"Byun, J.W., Kamra, A., Bertino, E., Li, N.: Efficient k-Anonymity using Clustering Techniques. CERIAS Technical Report 2006-10 (2006)"},{"key":"39_CR14","unstructured":"UCI Repository of Machine Learning databases, http:\/\/archive.ics.uci.edu\/ml\/"},{"key":"39_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-23556-6_2","volume-title":"Secure Data Management","author":"A. Campan","year":"2011","unstructured":"Campan, A., Cooper, N., Truta, T.M.: On-the-Fly Generalization Hierarchies for Numerical Attributes Revisited. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2011. LNCS, vol.\u00a06933, pp. 18\u201332. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36071-8_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T15:18:53Z","timestamp":1687965533000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36071-8_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642360701","9783642360718"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36071-8_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}