{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:20:21Z","timestamp":1725560421754},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540279679"},{"type":"electronic","value":"9783540318798"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11530084_19","type":"book-chapter","created":{"date-parts":[[2010,7,21]],"date-time":"2010-07-21T20:31:24Z","timestamp":1279744284000},"page":"240-256","source":"Crossref","is-referenced-by-count":2,"title":["Performance-Oriented Privacy-Preserving Data Integration"],"prefix":"10.1007","author":[{"given":"Raymond K.","family":"Pon","sequence":"first","affiliation":[]},{"given":"Terence","family":"Critchlow","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"19_CR1","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TITB.2004.826724","volume":"8","author":"S. Phillippi","year":"2004","unstructured":"Phillippi, S., Kohler, J.: Using XML Technology for the Ontology-Based Semantic Integration of Life Science Databases. IEEE Transactions on Information Technology in Biomedicine\u00a08(2), 154\u2013160 (2004)","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"issue":"5","key":"19_CR2","doi-asserted-by":"publisher","first-page":"808","DOI":"10.1109\/69.729736","volume":"16","author":"Tomasic","year":"1998","unstructured":"Tomasic, Raschid, L., Valduriez, P.: Scaling Access to Heterogeneous Data Sources with DISCO. IEEE Transactions on Knowledge and Data Engineering\u00a016(5), 808\u2013823 (1998)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"2","key":"19_CR3","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/954507.954510","volume":"19","author":"S.B. Davidson","year":"1999","unstructured":"Davidson, S.B., et al.: Transforming and Integrating Biomedical Data using Kleisli: A Perspective. ACM SIGBIO Newsletter\u00a019(2), 8\u201313 (1999)","journal-title":"ACM SIGBIO Newsletter"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Lacroix, Z., Boucelma, O., Essid, M.: The Biological Integration System. In: Proceedings of WIDM 2003, New Orleans, LA, November 7-8, pp. 45\u201349 (2003)","DOI":"10.1145\/956699.956709"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Alvarez, M., et al.: FINDER: A Mediator System for Structured and Semi-Structured Data Integration. In: Hameurlain, A., Cicchetti, R., Traunm\u00fcller, R. (eds.) DEXA 2002. LNCS, vol.\u00a02453, p. 847. Springer, Heidelberg (2002)","DOI":"10.1109\/DEXA.2002.1046002"},{"issue":"2","key":"19_CR6","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1147\/sj.402.0489","volume":"40","author":"L.M. Haas","year":"2001","unstructured":"Haas, L.M., et al.: DiscoveryLink: A System for Integrated Access to Life Sciences Data Sources. IBM Systems Journal\u00a040(2), 489\u2013511 (2001)","journal-title":"IBM Systems Journal"},{"issue":"2","key":"19_CR7","first-page":"1","volume":"4","author":"B. Thuraisingham","year":"2002","unstructured":"Thuraisingham, B.: Data Mining, National Security, Privacy and Civil Liberties. ACM Special Interest Group on Knowledge Discovery in Data and Data Mining (SIGKDD) Explorations Newsletter\u00a04(2), 1\u20135 (2002)","journal-title":"ACM Special Interest Group on Knowledge Discovery in Data and Data Mining (SIGKDD) Explorations Newsletter"},{"issue":"2","key":"19_CR8","first-page":"20","volume":"4","author":"M.S. Olivier","year":"2002","unstructured":"Olivier, M.S.: Database Privacy: Balancing Confidentiality, Integrity and Availability. ACM Special Interest Group on Knowledge Discovery in Data and Data Mining (SIGKDD) Explorations Newsletter\u00a04(2), 20\u201327 (2002)","journal-title":"ACM Special Interest Group on Knowledge Discovery in Data and Data Mining (SIGKDD) Explorations Newsletter"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Agrawal, R., et al.: Hippocratic Databases. In: Proceedings of the 28th Very Large Databases (VLDB) Conference, Hong Kong, China (2002)","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"issue":"8","key":"19_CR10","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1145\/79173.79182","volume":"33","author":"T.D. Sterling","year":"1990","unstructured":"Sterling, T.D., Weinkam, J.J.: Sharing Scientific Data. Communications of the ACM\u00a033(8), 113\u2013119 (1990)","journal-title":"Communications of the ACM"},{"issue":"6934","key":"19_CR11","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1038\/nature01626","volume":"422","author":"F.S. Collins","year":"2003","unstructured":"Collins, F.S., Green, E.D., Guttmacher, A.E., Guyer, M.S.: A vision for the future of genomics research. Nature\u00a0422(6934), 835\u2013847 (2003)","journal-title":"Nature"},{"key":"19_CR12","unstructured":"NCBI, \u201dGenBank,\u201d [Online] Available (2004), http:\/\/www.ncbi.nlm.nih.gov\/Genbank\/index.html"},{"issue":"1","key":"19_CR13","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/322234.322238","volume":"28","author":"P.A. Bernstein","year":"1981","unstructured":"Bernstein, P.A., Chiu, D.W.: Using Semi-Joins to Solve Relational Queries. Journal of the ACM\u00a028(1), 25\u201340 (1981)","journal-title":"Journal of the ACM"},{"key":"19_CR14","unstructured":"Vora, P.L.: Towards a Theory of Variable Privacy, in review, (May 7, 2003)"},{"key":"19_CR15","unstructured":"Schadow, G., Grannis, S.J., McDonald, C.J.: Privacy-Preserving Distributed Queries for a Clinical Case Research Network. In: Proceedings of IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, Maebashi City, Japan (2002)"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Aggarwal, C.C.: On the Design and Quantification of Privacy Preserving Data Mining Algorithms. In: Proceedings of Principles of Database Systems (PODS) 2001, Santa Barbara, CA, pp. 247\u2013255 (2001)","DOI":"10.1145\/375551.375602"},{"key":"19_CR17","unstructured":"Clifton, C., Kantarcioglu, M., Vaidya, J.: Defining Privacy for Data Mining. In: Proceedings of the National Science Foundation Workshop on Next Generation Data Mining, Baltimore, MD (November 1-3, 2002)"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Clifton, C., et al.: Privacy-Preserving Data Integration and Sharing. In: Proceedings of Data Mining and Knowledge Discovery (DMKD) 2004, Paris, France (June 13 2004)","DOI":"10.1145\/1008694.1008698"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy Preserving Association Rule Mining in Vertically Partitioned Data. In: Proceedings of ACM Special Interest Group on Knowledge Discovery in Data and Data Mining (SIGKDD) International Conference on Knowledge Discovery and Data Mining (KDD 2002), Edmonton, Alberta, Canada (2002)","DOI":"10.1145\/775047.775142"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Krishnan, V., Haritsa, J.: On Addressing Efficiency Concerns in Privacy-Preserving Data Mining. In: Proceedings of the International Conference on Database Systems for Advanced Applications (DAFSAA) 2004, Jeju Island, Korea, March 17-19, pp. 113\u2013114 (2004)","DOI":"10.1007\/978-3-540-24571-1_9"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Du, W., Zhan, Z.: Using Randomized Response Techniques for Privacy-Preserving Data Mining. In: Proceedings of ACM Special Interest Group on Knowledge Discovery in Data and Data Mining (SIGKDD) International Conference on Knowledge Discovery and Data Mining (KDD 2003), August 24-27 (2003)","DOI":"10.1145\/956750.956810"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: Proceedings of the 2000 ACM International Conference on Management of Data, Dallas, TX, pp. 439\u2013450 (2000)","DOI":"10.1145\/342009.335438"},{"issue":"6","key":"19_CR23","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B. Chor","year":"1998","unstructured":"Chor, B., et al.: Private Information Retrieval. Journal of the ACM\u00a045(6), 965\u2013982 (1998)","journal-title":"Journal of the ACM"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Evfimievski, A., Srikant, R.: Information Sharing Across Private Databases. In: Proceedings of the Special Interest Group on Management of Data (SIGMOD) 2003, San Diego, CA, June 9-12, pp. 86\u201397 (2003)","DOI":"10.1145\/872757.872771"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Kantarcioglu, M., Clifton, C.: Assuring Privacy when Big Brother is Watching. In: Proceedings of Data Mining and Knowledge Discovery (DMKD) 2003, San Diego, CA, June 13 (2004)","DOI":"10.1145\/882101.882102"},{"issue":"2","key":"19_CR26","first-page":"28","volume":"4","author":"C. Clifton","year":"2002","unstructured":"Clifton, C., et al.: Tools for Privacy Preserving Distributed Data Mining. ACM Special Interest Group on Knowledge Discovery in Data and Data Mining (SIGKDD) Explorations Newsletter\u00a04(2), 28\u201334 (2002)","journal-title":"ACM Special Interest Group on Knowledge Discovery in Data and Data Mining (SIGKDD) Explorations Newsletter"},{"key":"19_CR27","unstructured":"Naor, M., Pinkas, B.: Efficient Oblivious Transfer Protocols. In: Proceedings of Society of Industrial and Applied Mathematics (SIAM) Symposium on Discrete Algorithms, Washington, DC, January 7-9 (2001)"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Bellare, M., Micali, S.: Non-Interactive Oblivious Transfer and Applications. In: Proceedings on Advances in Cryptology, Santa Barbara, CA, pp. 547\u2013557 (1989)","DOI":"10.1007\/0-387-34805-0_48"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Freedman, M.J., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Proceedings of Eurocrpyt 2004, Interlaken, Switzerland (May 2-6, 2004)","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Gertner, Y., et al.: Protecting Data Privacy in Private Information Retrieval Schemes. In: Proceedings of the 13th Annual ACM Symposium on Theory of Computing, Dallas, TX, pp. 151\u2013160 (1998)","DOI":"10.1145\/276698.276723"},{"issue":"5","key":"19_CR31","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1109\/32.52778","volume":"16","author":"J.K. Mullin","year":"1990","unstructured":"Mullin, J.K.: Optimal Semijoins for Distributed Database Systems. IEEE Transactions on Software Engineering\u00a016(5), 558\u2013560 (1990)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Morrissey, J.M., Osborn, W.K.: Distributed Query Optimization Using Reduction Filters. In: Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering, May 24-28, vol.\u00a02, pp. 707\u2013710 (1998)","DOI":"10.1109\/CCECE.1998.685595"},{"key":"19_CR33","unstructured":"Bellovin, S., Cheswick, W.R.: Privacy-Enhanced Searches Using Encrypted Bloom Filters. In: Proceedings of DIMACS\/Portia Workshop on Privacy-Preserving Data Mining, Piscataway, NJ (March 15-16, 2004)"},{"key":"19_CR34","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"Shannon, C.E.: A Mathematical Theory of Communication. Bell System Technical Journal\u00a027, 379\u2013423, 623-656 (1948)","journal-title":"Bell System Technical Journal"},{"key":"19_CR35","unstructured":"MySQL AB, MySQL: The World\u2019s Most Popular Open Source Database (August 2004), http:\/\/dev.mysql.com\/"},{"key":"19_CR36","first-page":"347","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography, p. 347. CRC Press, Boca Raton (1997)"},{"key":"19_CR37","unstructured":"UCSC Genome Bioinformatics, UCSC Genome Browser Home (August 2004), http:\/\/genome.ucsc.edu\/"}],"container-title":["Lecture Notes in Computer Science","Data Integration in the Life Sciences"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11530084_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:08:39Z","timestamp":1605643719000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11530084_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540279679","9783540318798"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/11530084_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}