{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T10:31:33Z","timestamp":1723026693201},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.235","type":"proceedings-article","created":{"date-parts":[[2013,12,18]],"date-time":"2013-12-18T00:46:29Z","timestamp":1387327589000},"source":"Crossref","is-referenced-by-count":22,"title":["Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud"],"prefix":"10.1109","author":[{"given":"Xuyun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Chang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"given":"Chi","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Wanchun","family":"Dou","sequence":"additional","affiliation":[]},{"given":"Jinjun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.236"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1233321.1233324"},{"key":"18","first-page":"139","article-title":"Anatomy: Simple and effective privacy preservation","author":"xiao","year":"2006","journal-title":"Proc 28th International Conference on Very Large Data Bases (VLDB)"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.139"},{"key":"11","year":"2013","journal-title":"Amazon Elastic Mapreduce (Amazon Emr)"},{"key":"12","article-title":"A scalable twophase top-down specialization approach for data anonymization using mapreduce on cloud","author":"zhang","year":"2013","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.14778\/2336664.2336668"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1386118.1386123"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.369024"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020515"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.208"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807222"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142500"},{"key":"28","year":"2013"},{"key":"29","year":"2013"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.144"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629198"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/2213556.2213558"},{"key":"30","year":"2013","journal-title":"Hadoop"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2008.12.001"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1857947.1857950"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1015"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"8","first-page":"249","article-title":"Bottom-up generalization: A data mining solution to privacy protection","author":"ke","year":"2004","journal-title":"Proc 4th IEEE International Conference on Data Mining (ICDM'04)"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","location":"Melbourne, Australia","start":{"date-parts":[[2013,7,16]]},"end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680880.pdf?arnumber=6680880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T04:46:17Z","timestamp":1490244377000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680880\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.235","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}