{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T06:51:52Z","timestamp":1777013512711,"version":"3.51.4"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030372279","type":"print"},{"value":"9783030372286","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37228-6_28","type":"book-chapter","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T05:00:05Z","timestamp":1576472405000},"page":"569-584","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-Preserving Genomic Data Publishing via Differentially-Private Suffix Tree"],"prefix":"10.1007","author":[{"given":"Tanya","family":"Khatri","sequence":"first","affiliation":[]},{"given":"Gaby G.","family":"Dagher","sequence":"additional","affiliation":[]},{"given":"Yantian","family":"Hou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,13]]},"reference":[{"key":"28_CR1","unstructured":"Human genome privacy protection challenge"},{"key":"28_CR2","unstructured":"Health insurance portability and accountability act (hipaa) (1996)"},{"key":"28_CR3","unstructured":"Genetic information nondiscrimination act (gena) (2008)"},{"key":"28_CR4","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.jbi.2015.05.022","volume":"56","author":"M Akg\u00fcn","year":"2015","unstructured":"Akg\u00fcn, M., Bayrak, A.O., Ozer, B., Sa\u011f\u0131ro\u011flu, M.\u015e.: Privacy preserving processing of genomic data: a survey. J. Biomed. Inform. 56, 103\u2013111 (2015)","journal-title":"J. Biomed. Inform."},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Bhaskar, R., Laxman, S., Smith, A., Thakurta, A.: Discovering frequent patterns in sensitive data. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 503\u2013512. ACM (2010)","DOI":"10.1145\/1835804.1835869"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Bonomi, L., Xiong, L.: A two-phase algorithm for mining sequential patterns with differential privacy. In: Proceedings of the 22Nd ACM CIKM, pp. 269\u2013278 (2013)","DOI":"10.1145\/2505515.2505553"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Chen, R., Fung, B.C.M., Desai, B.C., Sossou, N.M.: Differentially private transit data publication: a case study on the montreal transportation system. In: Proceedings of the 18th ACM SIGKDD on KDD, pp. 213\u2013221 (2012)","DOI":"10.1145\/2339530.2339564"},{"key":"28_CR8","first-page":"1","volume-title":"Automata, Languages and Programming","author":"Cynthia Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In ICALP, pp. 1\u201312 (2006)"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In TCC (2006)","DOI":"10.1007\/11681878_14"},{"issue":"3\u20134","key":"28_CR10","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Fienberg, S.E., Slavkovic, A., Uhler, C.: Privacy preserving GWAS data sharing. In: IEEE International Conference on Data Mining Workshops, pp. 628\u2013635 (2011)","DOI":"10.1109\/ICDMW.2011.140"},{"issue":"6","key":"28_CR12","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1137\/09076828X","volume":"41","author":"A Ghosh","year":"2012","unstructured":"Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. SIAM J. Comput. 41(6), 1673\u20131693 (2012)","journal-title":"SIAM J. Comput."},{"issue":"3","key":"28_CR13","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/PL00009177","volume":"19","author":"R Giegerich","year":"1997","unstructured":"Giegerich, R., Kurtz, S.: From ukkonen to mccreight and weiner: a unifying view of linear-time suffix tree construction. Algorithmica 19(3), 331\u2013353 (1997)","journal-title":"Algorithmica"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Goodrich, M.T.: The mastermind attack on genomic data (2009)","DOI":"10.1109\/SP.2009.4"},{"key":"28_CR15","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1126\/science.1229566","volume":"339","author":"M Gymrek","year":"2013","unstructured":"Gymrek, M., McGuire, A.L., Golan, D., Halperin, E., Erlich, Y.: Identifying personal genomes by surname inference. Science 339, 321\u2013324 (2013)","journal-title":"Science"},{"key":"28_CR16","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.14778\/1920841.1920970","volume":"3","author":"M Hay","year":"2010","unstructured":"Hay, M., Rastogi, V., Miklau, G., Suciu, D.: Boosting the accuracy of differentially private histograms through consistency. Proc. VLDB Endow. 3, 1021\u20131032 (2010)","journal-title":"Proc. VLDB Endow."},{"key":"28_CR17","unstructured":"Homer, N., et al.: Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays (2006)"},{"key":"28_CR18","unstructured":"Huang, Z.: Privacy preserving algorithms for genomic data"},{"issue":"Suppl 1","key":"28_CR19","doi-asserted-by":"publisher","first-page":"S1","DOI":"10.1186\/1472-6947-14-S1-S1","volume":"14","author":"X Jiang","year":"2014","unstructured":"Jiang, X., et al.: A community assessment of privacy preserving techniques for human genomes. BMC Med. Inform. Decis. Making 14(Suppl 1), S1 (2014)","journal-title":"BMC Med. Inform. Decis. Making"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Johnson, A., Shmatikov, V.: Privacy-preserving data exploration in genome-wide association studies. In: Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1079\u20131087 (2013)","DOI":"10.1145\/2487575.2487687"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Li, Y.D., Zhang, Z., Winslett, M., Yang, Y.: Compressive mechanism: utilizing sparse representation in differential privacy. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, pp. 177\u2013182 (2011)","DOI":"10.1145\/2046556.2046581"},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Frank D. McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the SIGMOD 2009, pp. 19\u201330 (2009)","DOI":"10.1145\/1559845.1559850"},{"issue":"1","key":"28_CR23","doi-asserted-by":"publisher","first-page":"6:1","DOI":"10.1145\/2767007","volume":"48","author":"M Naveed","year":"2015","unstructured":"Naveed, M., et al.: Privacy in the genomic era. ACM Comput. Surv. 48(1), 6:1\u20136:44 (2015)","journal-title":"ACM Comput. Surv."},{"key":"28_CR24","unstructured":"Rodriguez, L.L., Brooks, L.D., Greenberg, J.H., Green, E.D.: The complexities of genomic identifiability"},{"key":"28_CR25","unstructured":"Roozgard, A., Barzigar, N., Verma, P.K., Cheng, S.: Genomic data privacy protection using compressed sensing. Trans. Data Privacy 9(1)\u201313 (2016)"},{"issue":"1","key":"28_CR26","first-page":"137","volume":"5","author":"C Uhlerop","year":"2013","unstructured":"Uhlerop, C., Slavkovi\u0107, A., Fienberg, S.E.: Privacy-preserving data sharing for genome-wide association studies. J. Priv. Confidentiality 5(1), 137 (2013)","journal-title":"J. Priv. Confidentiality"},{"issue":"3","key":"28_CR27","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/BF01206331","volume":"14","author":"E Ukkonen","year":"1995","unstructured":"Ukkonen, E.: On-line construction of suffix trees. Algorithmica 14(3), 249\u2013260 (1995)","journal-title":"Algorithmica"},{"key":"28_CR28","doi-asserted-by":"crossref","unstructured":"Wang, R., Li, Y.F., Wang, X.F., Tang, H., Zhou, X.: Learning your identity and disease from research papers: information leaks in genome wide association study (2009)","DOI":"10.1145\/1653662.1653726"},{"issue":"1","key":"28_CR29","doi-asserted-by":"publisher","first-page":"S2","DOI":"10.1186\/1472-6947-14-S1-S2","volume":"14","author":"S Wang","year":"2014","unstructured":"Wang, S., Mohammed, N., Chen, R.: Differentially private genome data dissemination through top-down specialization. BMC Med. Inform. Decis. Making 14(1), S2 (2014)","journal-title":"BMC Med. Inform. Decis. Making"},{"key":"28_CR30","doi-asserted-by":"crossref","unstructured":"Weiner, P.: Linear pattern matching algorithms. In: SWAT 1973, pp. 1\u201311 (1973)","DOI":"10.1109\/SWAT.1973.13"},{"key":"28_CR31","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.jbi.2014.01.008","volume":"50","author":"F Yu","year":"2014","unstructured":"Yu, F., Fienberg, S.E., Slavkovi\u0107, A.B., Uhler, C.: Scalable privacy-preserving data sharing methodology for genome-wide association studies. J. Biomed. Inform. 50, 133\u2013141 (2014)","journal-title":"J. Biomed. Inform."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37228-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T05:04:05Z","timestamp":1576472645000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37228-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030372279","9783030372286"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37228-6_28","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"13 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}