{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:28:26Z","timestamp":1729646906842,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/aina.2016.151","type":"proceedings-article","created":{"date-parts":[[2016,5,24]],"date-time":"2016-05-24T10:40:12Z","timestamp":1464086412000},"page":"1035-1042","source":"Crossref","is-referenced-by-count":9,"title":["Ice and Fire: Quantifying the Risk of Re-identification and Utility in Data Anonymization"],"prefix":"10.1109","author":[{"given":"Hiroaki","family":"Kikuchi","sequence":"first","affiliation":[]},{"given":"Takayasu","family":"Yamaguchi","sequence":"additional","affiliation":[]},{"given":"Koki","family":"Hamada","sequence":"additional","affiliation":[]},{"given":"Yuji","family":"Yamaoka","sequence":"additional","affiliation":[]},{"given":"Hidenobu","family":"Oguri","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Sakuma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"FTC Report","article-title":"Protecting consumer privacy in an era of rapid change","year":"2012","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9868.00365"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1136\/jamia.2009.000026","article-title":"Evaluating re-identification risks with respect to the HIPAA privacy rule","volume":"17","author":"kathleen","year":"2010","journal-title":"Journal of the American Medical Informatics Association"},{"journal-title":"UCI Machine Learning Repository","year":"0","key":"ref13"},{"key":"ref14","first-page":"337","article-title":"A Systematic Comparison and Evaluation of k-Anonymization Algorithms for Practitioners","volume":"7","author":"ayala-rivera","year":"2014","journal-title":"Transactions on Data Privacy"},{"key":"ref15","article-title":"Statistical Disclosure Control Methods for Anonymization of Microdata and Risk Estimation","author":"templ","year":"2015","journal-title":"sdcMicro package in R"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"ref17","first-page":"571","article-title":"k-anonymity","volume":"10","author":"sweeny","year":"2002","journal-title":"International Journal of Uncertainty Fuzziness and Knowledge-Based Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"journal-title":"PWS CUP 2015","year":"0","key":"ref4"},{"key":"ref3","article-title":"Anonymizing Health Data Case Studies and Methods to Get You Started","author":"emam","year":"2013","journal-title":"O'Reilly"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2015.7232951"},{"key":"ref5","first-page":"111","article-title":"A quantitative comparison of disclosure control methods for micro data","author":"domingo-ferrer","year":"2001","journal-title":"Confidentiality Disclosure and Data Access Theory and Practical Applications for Statistical Agencies"},{"key":"ref8","first-page":"1","article-title":"Usage and Development of Educational Pseudo Micro-data-Sampled from national survey of family income and expenditure","volume":"16","author":"akiyama","year":"2012","journal-title":"2004 - Technical Report of the National Statistics Center (NSTAC)"},{"key":"ref7","article-title":"Privacy and Data Protection by Design - from policy to engineering","author":"danezis","year":"2014","journal-title":"ENISA"},{"journal-title":"ISO Technical Specification ISO\/TS 25237","article-title":"Health informatics - Pseudonymization","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5_2"},{"journal-title":"Information Commissioner's Office (ICO) Anonymisation managing data protection risk code of practice","year":"2012","key":"ref1"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11787006_1","article-title":"Differential privacy","volume":"4052","author":"dwork","year":"2006","journal-title":"Automata Languages and Programming Lecture Notes in Computer Science"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1097\/SLA.0b013e31826fd541"},{"journal-title":"East Japan Railway Company","article-title":"The numbers of passengers in 2012 (in Japanese)","year":"2013","key":"ref21"},{"key":"ref24","first-page":"139","article-title":"Anatomy: simple and effective privacy preservation","author":"xiao","year":"0"},{"key":"ref23","first-page":"910","article-title":"Checking for k-anonymity violation by views","author":"chao","year":"0","journal-title":"Proceedings of the 31 st international conference on Very large data bases (VLDB ‘05) WLDB Endowment"},{"key":"ref25","first-page":"165","article-title":"Apriori-based algorithms for km-anonymizing trajectory data","volume":"7","author":"poulis","year":"2014","journal-title":"Transactions on Data Privacy"}],"event":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","start":{"date-parts":[[2016,3,23]]},"location":"Crans-Montana, Switzerland","end":{"date-parts":[[2016,3,25]]}},"container-title":["2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7473198\/7474047\/07474203.pdf?arnumber=7474203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T15:14:34Z","timestamp":1567955674000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7474203\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/aina.2016.151","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}