{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T00:25:08Z","timestamp":1773447908602,"version":"3.50.1"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030171377","type":"print"},{"value":"9783030171384","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-17138-4_6","type":"book-chapter","created":{"date-parts":[[2019,4,2]],"date-time":"2019-04-02T18:04:43Z","timestamp":1554228283000},"page":"123-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":48,"title":["Generalised Differential Privacy for Text Document Processing"],"prefix":"10.1007","author":[{"given":"Natasha","family":"Fernandes","sequence":"first","affiliation":[]},{"given":"Mark","family":"Dras","sequence":"additional","affiliation":[]},{"given":"Annabelle","family":"McIver","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,3]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 308\u2013318. ACM, New York (2016). https:\/\/doi.org\/10.1145\/2976749.2978318","DOI":"10.1145\/2976749.2978318"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-22589-5_22","volume-title":"Modeling Decision for Artificial Intelligence","author":"D Abril","year":"2011","unstructured":"Abril, D., Navarro-Arribas, G., Torra, V.: On the declassification of confidential documents. In: Torra, V., Narakawa, Y., Yin, J., Long, J. (eds.) MDAI 2011. LNCS (LNAI), vol. 6820, pp. 235\u2013246. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22589-5_22"},{"issue":"3","key":"6_CR3","first-page":"505","volume":"5","author":"B Anandan","year":"2012","unstructured":"Anandan, B., Clifton, C., Jiang, W., Murugesan, M., Pastrana-Camacho, P., Si, L.: t-Plausibility: generalizing words to desensitize text. Trans. Data Priv. 5(3), 505\u2013534 (2012)","journal-title":"Trans. Data Priv."},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Andr\u00e9s, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 901\u2013914. ACM (2013)","DOI":"10.1145\/2508859.2516735"},{"key":"6_CR5","unstructured":"Bakhteev, O., Khazov, A.: Author masking using sequence-to-sequence models\u2014notebook for PAN at CLEF 2017. In: Cappellato, L., Ferro, N., Goeuriot, L., Mandl, T. (eds.) CLEF 2017 Evaluation Labs and Workshop \u2013 Working Notes Papers, Dublin, Ireland, 11\u201314 September. CEUR-WS.org, September 2017. http:\/\/ceur-ws.org\/Vol-1866\/"},{"key":"6_CR6","unstructured":"Boisbunon, A.: The class of multivariate spherically symmetric distributions. Universit\u00e9 de Rouen, Technical report 5, 2012 (2012)"},{"key":"6_CR7","unstructured":"Bojanowski, P., Grave, E., Joulin, A., Mikolov, T.: Enriching word vectors with subword information (2016). arXiv preprint: arXiv:1607.04606"},{"key":"6_CR8","unstructured":"Castro, D., Ortega, R., Mu\u00f1oz, R.: Author masking by sentence transformation\u2014notebook for PAN at CLEF 2017. In: Cappellato, L., Ferro, N., Goeuriot, L., Mandl, T. (eds.) CLEF 2017 Evaluation Labs and Workshop \u2013 Working Notes Papers, Dublin, Ireland, 11\u201314 September. CEUR-WS.org, September 2017. http:\/\/ceur-ws.org\/Vol-1866\/"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-39077-7_5","volume-title":"Privacy Enhancing Technologies","author":"K Chatzikokolakis","year":"2013","unstructured":"Chatzikokolakis, K., Andr\u00e9s, M.E., Bordenabe, N.E., Palamidessi, C.: Broadening the scope of differential privacy using metrics. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 82\u2013102. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39077-7_5"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Coavoux, M., Narayan, S., Cohen, S.B.: Privacy-preserving neural representations of text. In: Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, pp. 1\u201310. Association for Computational Linguistics, October\u2013November 2018. http:\/\/www.aclweb.org\/anthology\/D18-1001","DOI":"10.18653\/v1\/D18-1001"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Cumby, C., Ghani, R.: A machine learning based system for semi-automatically redacting documents. In: Proceedings of the Twenty-Third Conference on Innovative Applications of Artificial Intelligence (IAAI) (2011)","DOI":"10.1609\/aaai.v25i2.18851"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"issue":"3\u20134","key":"6_CR13","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends\u00ae Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends\u00ae Theor. Comput. Sci."},{"key":"6_CR14","unstructured":"Emmery, C., Manjavacas, E., Chrupa\u0142a, G.: Style obfuscation by invariance (2018). arXiv preprint: arXiv:1805.07143"},{"key":"6_CR15","unstructured":"Fernandes, N., Dras, M., McIver, A.: Generalised differential privacy for text document processing. CoRR abs\/1811.10256 (2018). http:\/\/arxiv.org\/abs\/1811.10256"},{"key":"6_CR16","unstructured":"Manuel, F., Pardo, R., Rosso, P., Potthast, M., Stein, B.: Overview of the 5th author profiling task at PAN 2017: gender and language variety identification in Twitter. In: Cappellato, L., Ferro, N., Goeuriot, L., Mandl, T. (eds.) Working Notes Papers of the CLEF 2017 Evaluation Labs. CEUR Workshop Proceedings, vol. 1866. CLEF and CEUR-WS.org, September 2017. http:\/\/ceur-ws.org\/Vol-1866\/"},{"key":"6_CR17","unstructured":"Global, T.: Native Language Identification (NLI) Establishes Nationality of Sony\u2019s Hackers as Russian. Technical report, Taia Global, Inc. (2014)"},{"key":"6_CR18","volume-title":"Probability and Random Processes","author":"G Grimmett","year":"1992","unstructured":"Grimmett, G., Stirzaker, D.: Probability and Random Processes, 2nd edn. Oxford Science Publications, Oxford (1992)","edition":"2"},{"key":"6_CR19","unstructured":"Halvani, O., Winter, C., Graner, L.: Authorship Verification based on Compression-Models. CoRR abs\/1706.00516 (2017). http:\/\/arxiv.org\/abs\/1706.00516"},{"key":"6_CR20","doi-asserted-by":"publisher","unstructured":"Hasler, E., Stahlberg, F., Tomalin, M., de Gispert, A., Byrne, B.: A comparison of neural models for word ordering. In: Proceedings of the 10th International Conference on Natural Language Generation, pp. 208\u2013212. Association for Computational Linguistics (2017). https:\/\/doi.org\/10.18653\/v1\/W17-3531 . http:\/\/aclweb.org\/anthology\/W17-3531","DOI":"10.18653\/v1\/W17-3531"},{"key":"6_CR21","series-title":"Springer Series in Statistics","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The Elements of Statistical Learning: Data Mining, Inference, and Prediction","author":"T Hastie","year":"2009","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning: Data Mining, Inference, and Prediction. SSS, 2nd edn. Springer, New York (2009). https:\/\/doi.org\/10.1007\/978-0-387-84858-7","edition":"2"},{"key":"6_CR22","unstructured":"Joulin, A., Grave, E., Bojanowski, P., Mikolov, T.: Bag of tricks for efficient text classification (2016). arXiv preprint: arXiv:1607.01759"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Kacmarcik, G., Gamon, M.: Obfuscating document stylometry to preserve author anonymity. In: ACL, pp. 444\u2013451 (2006)","DOI":"10.3115\/1273073.1273131"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-319-65813-1_18","volume-title":"Experimental IR Meets Multilinguality, Multimodality, and Interaction","author":"G Karadzhov","year":"2017","unstructured":"Karadzhov, G., Mihaylova, T., Kiprov, Y., Georgiev, G., Koychev, I., Nakov, P.: The case for being average: a mediocrity approach to style masking and author obfuscation. In: Jones, G.J.F., et al. (eds.) CLEF 2017. LNCS, vol. 10456, pp. 173\u2013185. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-65813-1_18"},{"key":"6_CR25","unstructured":"Khonji, M., Iraqi, Y.: A slightly-modified GI-based author-verifier with lots of features (ASGALF). In: Working Notes for CLEF 2014 Conference (2014). http:\/\/ceur-ws.org\/Vol-1180\/CLEF2014wn-Pan-KonijEt2014.pdf"},{"key":"6_CR26","volume-title":"Theorie der endlichen und unendlichen Graphen","author":"D K\u00f6nig","year":"1936","unstructured":"K\u00f6nig, D.: Theorie der endlichen und unendlichen Graphen. Akademische Verlags Gesellschaft, Leipzig (1936)"},{"issue":"4","key":"6_CR27","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1093\/llc\/17.4.401","volume":"17","author":"M Koppel","year":"2002","unstructured":"Koppel, M., Argamon, S., Shimoni, A.R.: Automatically categorizing written texts by author gender. Lit. Linguist. Comput. 17(4), 401\u2013412 (2002). https:\/\/doi.org\/10.1093\/llc\/17.4.401","journal-title":"Lit. Linguist. Comput."},{"issue":"1","key":"6_CR28","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10579-009-9111-2","volume":"45","author":"M Koppel","year":"2011","unstructured":"Koppel, M., Schler, J., Argamon, S.: Authorship attribution in the wild. Lang. Resour. Eval. 45(1), 83\u201394 (2011)","journal-title":"Lang. Resour. Eval."},{"issue":"1","key":"6_CR29","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1002\/asi.22954","volume":"65","author":"M Koppel","year":"2014","unstructured":"Koppel, M., Winter, Y.: Determining if two documents are written by the same author. JASIST 65(1), 178\u2013187 (2014). https:\/\/doi.org\/10.1002\/asi.22954","journal-title":"JASIST"},{"key":"6_CR30","volume-title":"Handbook of Monte Carlo Methods","author":"DP Kroese","year":"2013","unstructured":"Kroese, D.P., Taimre, T., Botev, Z.I.: Handbook of Monte Carlo Methods, vol. 706. Wiley, New York (2013)"},{"key":"6_CR31","unstructured":"Kusner, M.J., Sun, Y., Kolkin, N.I., Weinberger, K.Q.: From word embeddings to document distances. In: Proceedings of the 32nd International Conference on Machine Learning, pp. 957\u2013966 (2015)"},{"key":"6_CR32","unstructured":"Li, Y., Baldwin, T., Cohn, T.: Towards robust and privacy-preserving text representations. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics. Short Papers, vol. 2, pp. 25\u201330. Association for Computational Linguistics (2018). http:\/\/aclweb.org\/anthology\/P18-2005"},{"issue":"3","key":"6_CR33","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1162\/coli_a_00323","volume":"44","author":"S Malmasi","year":"2018","unstructured":"Malmasi, S., Dras, M.: Native language identification with classifier stacking and ensembles. Comput. Linguist. 44(3), 403\u2013446 (2018). https:\/\/doi.org\/10.1162\/coli_a_00323","journal-title":"Comput. Linguist."},{"key":"6_CR34","unstructured":"Mansoorizadeh, M., Rahgooy, T., Aminiyan, M., Eskandari, M.: Author Obfuscation using WordNet and language models\u2014notebook for PAN at CLEF 2016. In: Balog, K., Cappellato, L., Ferro, N., Macdonald, C. (eds.) CLEF 2016 Evaluation Labs and Workshop \u2013 Working Notes Papers, \u00c9vora, Portugal, 5\u20138 September. CEUR-WS.org, September 2016. http:\/\/ceur-ws.org\/Vol-1609\/"},{"issue":"2","key":"6_CR35","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1214\/aoms\/1177692644","volume":"43","author":"G Marsaglia","year":"1972","unstructured":"Marsaglia, G., et al.: Choosing a point from the surface of a sphere. Ann. Math. Stat. 43(2), 645\u2013646 (1972)","journal-title":"Ann. Math. Stat."},{"key":"6_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-642-31680-7_16","volume-title":"Privacy Enhancing Technologies","author":"AWE McDonald","year":"2012","unstructured":"McDonald, A.W.E., Afroz, S., Caliskan, A., Stolerman, A., Greenstadt, R.: Use fewer instances of the letter \u201ci\u201d: toward writing style anonymization. In: Fischer-H\u00fcbner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 299\u2013318. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31680-7_16"},{"key":"6_CR37","unstructured":"McMahan, H.B., Ramage, D., Talwar, K., Zhang, L.: Learning differentially private recurrent language models. In: International Conference on Learning Representations (2018). https:\/\/openreview.net\/forum?id=BJ0hF1Z0b"},{"key":"6_CR38","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. CoRR abs\/1301.3781 (2013). http:\/\/arxiv.org\/abs\/1301.3781"},{"key":"6_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-319-65813-1_14","volume-title":"Experimental IR Meets Multilinguality, Multimodality, and Interaction","author":"N Potha","year":"2017","unstructured":"Potha, N., Stamatatos, E.: An improved Impostors method for authorship verification. In: Jones, G.J.F., Lawless, S., Gonzalo, J., Kelly, L., Goeuriot, L., Mandl, T., Cappellato, L., Ferro, N. (eds.) CLEF 2017. LNCS, vol. 10456, pp. 138\u2013144. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-65813-1_14"},{"key":"6_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-319-30671-1_29","volume-title":"Advances in Information Retrieval","author":"M Potthast","year":"2016","unstructured":"Potthast, M., et al.: Who wrote the web? Revisiting influential author identification research applicable to information retrieval. In: Ferro, N., et al. (eds.) ECIR 2016. LNCS, vol. 9626, pp. 393\u2013407. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30671-1_29"},{"key":"6_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-319-65813-1_25","volume-title":"Experimental IR Meets Multilinguality, Multimodality, and Interaction","author":"M Potthast","year":"2017","unstructured":"Potthast, M., Rangel, F., Tschuggnall, M., Stamatatos, E., Rosso, P., Stein, B.: Overview of PAN\u201917: author identification, author profiling, and author obfuscation. In: Jones, G.J.F., et al. (eds.) CLEF 2017. LNCS, vol. 10456, pp. 275\u2013290. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-65813-1_25"},{"key":"6_CR42","doi-asserted-by":"crossref","unstructured":"Rodriguez-Garcia, M., Batet, M., S\u00e1nchez, D.: Semantic noise: privacy-protection of nominal microdata through uncorrelated noise addition. In: 2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI), pp. 1106\u20131113. IEEE (2015)","DOI":"10.1109\/ICTAI.2015.157"},{"issue":"2","key":"6_CR43","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1023\/A:1026543900054","volume":"40","author":"Y Rubner","year":"2000","unstructured":"Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover\u2019s distance as a metric for image retrieval. Int. J. Comput. Vis. 40(2), 99\u2013121 (2000)","journal-title":"Int. J. Comput. Vis."},{"key":"6_CR44","unstructured":"Ruder, S., Ghaffari, P., Breslin, J.G.: Character-level and Multi-channel Convolutional Neural Networks for Large-scale Authorship Attribution. CoRR abs\/1609.06686 (2016). http:\/\/arxiv.org\/abs\/1609.06686"},{"issue":"1","key":"6_CR45","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1002\/asi.23363","volume":"67","author":"D S\u00e1nchez","year":"2016","unstructured":"S\u00e1nchez, D., Batet, M.: C-sanitized: a privacy model for document redaction and sanitization. J. Assoc. Inf. Sci. Technol. 67(1), 148\u2013163 (2016)","journal-title":"J. Assoc. Inf. Sci. Technol."},{"key":"6_CR46","doi-asserted-by":"crossref","unstructured":"Sapkota, U., Bethard, S., Montes, M., Solorio, T.: Not all character N-grams are created equal: a study in authorship attribution. In: Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Denver, Colorado, pp. 93\u2013102. Association for Computational Linguistics, May\u2013June 2015. http:\/\/www.aclweb.org\/anthology\/N15-1010","DOI":"10.3115\/v1\/N15-1010"},{"key":"6_CR47","unstructured":"Seidman, S.: Authorship verification using the imposters method. In: Working Notes for CLEF 2013 Conference (2013). http:\/\/ceur-ws.org\/Vol-1179\/CLEF2013wn-PAN-Seidman2013.pdf"},{"key":"6_CR48","unstructured":"Shetty, R., Schiele, B., Fritz, M.: A4NT: author attribute anonymity by adversarial training of neural machine translation. In: 27th USENIX Security Symposium, pp. 1633\u20131650. USENIX Association (2018)"},{"key":"6_CR49","doi-asserted-by":"publisher","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 1310\u20131321. ACM, New York (2015). https:\/\/doi.org\/10.1145\/2810103.2813687","DOI":"10.1145\/2810103.2813687"},{"issue":"5","key":"6_CR50","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"6_CR51","unstructured":"Tetreault, J., Blanchard, D., Cahill, A.: A report on the first native language identification shared task. In: Proceedings of the Eighth Workshop on Innovative Use of NLP for Building Educational Applications, Atlanta, Georgia, pp. 48\u201357. Association for Computational Linguistics, June 2013. http:\/\/www.aclweb.org\/anthology\/W13-1706"},{"key":"6_CR52","unstructured":"Wan, S., Dras, M., Dale, R., Paris, C.: Improving grammaticality in statistical sentence generation: introducing a dependency spanning tree algorithm with an argument satisfaction model. In: Proceedings of the 12th Conference of the European Chapter of the ACL (EACL 2009), pp. 852\u2013860. Association for Computational Linguistics (2009). http:\/\/aclweb.org\/anthology\/E09-1097"},{"key":"6_CR53","unstructured":"Weggenmann, B., Kerschbaum, F.: SynTF: synthetic and differentially private term frequency vectors for privacy-preserving text mining (2018). arXiv preprint: arXiv:1805.00904"},{"issue":"3","key":"6_CR54","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1162\/COLI_a_00229","volume":"41","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., Clark, S.: Discriminative syntax-based word ordering for text generation. Comput. Linguist. 41(3), 503\u2013538 (2015). https:\/\/doi.org\/10.1162\/COLI_a_00229","journal-title":"Comput. Linguist."}],"container-title":["Lecture Notes in Computer Science","Principles of Security and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-17138-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T03:13:06Z","timestamp":1663211586000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-17138-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030171377","9783030171384"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-17138-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"3 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"POST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Principles of Security and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Prague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"post2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.etaps.org\/2019\/post","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}