{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:50:41Z","timestamp":1767340241058,"version":"3.44.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031823619"},{"type":"electronic","value":"9783031823626"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82362-6_28","type":"book-chapter","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T10:00:40Z","timestamp":1743501640000},"page":"477-487","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Formalizing Federated Learning and\u00a0Differential Privacy for\u00a0GIS Systems in\u00a0IIIf"],"prefix":"10.1007","author":[{"given":"Florian","family":"Kamm\u00fcller","sequence":"first","affiliation":[]},{"given":"Luca","family":"Piras","sequence":"additional","affiliation":[]},{"given":"Bob","family":"Fields","sequence":"additional","affiliation":[]},{"given":"Raja","family":"Nagarajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,1]]},"reference":[{"key":"28_CR1","unstructured":"United States\u00a0Census Bureau: Disclosure Avoidance for the 2020 Census: An introduction (2021). Accessed 2 Dec 2023"},{"key":"28_CR2","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1038\/ncomms1840","volume":"3","author":"J Claridge","year":"2012","unstructured":"Claridge, J., Diggle, P., McCann, C.: Fasciola hepatica is associated with the failure to detect bovine tuberculosis in dairy cattle. Nat. Commun. 3, 853 (2012)","journal-title":"Nat. Commun."},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Fraser, S., Storie, J.L.: Using geoindicators to prioritize regional wetland locations for flood attenuation in Manitoba\u2019s red river basin. IEEE J. Sel. Top. Appl. Earth Observ. Remote Sens. 9, 1\u201310 (2016)","DOI":"10.1109\/JSTARS.2016.2576398"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Goguen, J.,\u00a0Meseguer, J.: Security policies and security models. In: Symposium on Security and Privacy, SOSP 1982, pp. 11\u201322. IEEE Computer Society Press (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Unwinding and inference control. In: Symposium on Security and Privacy, SOSP 1984, pp. 75\u201387. IEEE Computer Society (1984)","DOI":"10.1109\/SP.1984.10019"},{"key":"28_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101572","volume":"87","author":"F Kamm\u00fcller","year":"2019","unstructured":"Kamm\u00fcller, F.: Attack trees in Isabelle extended with probabilities for quantum cryptography. Comput. Secur. 87, 101572 (2019)","journal-title":"Comput. Secur."},{"key":"28_CR7","unstructured":"Lavery, D.: The perfect layer effect for differentially-private data: blur (2022). Accessed 2 Dec 2023"},{"key":"28_CR8","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.tcs.2022.10.002","volume":"943","author":"D Liu","year":"2023","unstructured":"Liu, D., Wang, B., Fu, C., Zhang, L.: Model checking differentially private properties. Theor. Comput. Sci. 943, 153\u2013170 (2023)","journal-title":"Theor. Comput. Sci."},{"key":"28_CR9","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: International Conference on Artificial Intelligence and Statistics, AISTATS PMLR, vol. 54, pp. 1273\u20131282 (2017)"},{"issue":"1","key":"28_CR10","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1111\/tgis.13009","volume":"27","author":"P Nowbakht","year":"2023","unstructured":"Nowbakht, P., O\u2019Sullivan, L., Wall, D.P., Holloway, P.: Implementation of novel polygon-based obfuscation methods to improve privacy of agricultural data. Trans. GIS 27(1), 84\u2013104 (2023)","journal-title":"Trans. GIS"},{"key":"28_CR11","first-page":"61","volume":"276","author":"MC Tschantz","year":"2011","unstructured":"Tschantz, M.C., Kaynar, D., Datta, A.: Formal verification of differential privacy for interactive systems MFPS. ENTCS 276, 61\u201379 (2011)","journal-title":"ENTCS"},{"issue":"3","key":"28_CR12","first-page":"76","volume":"56","author":"A \u00dcnsal","year":"2023","unstructured":"\u00dcnsal, A., \u00d6nen, M.: Information-theoretic approaches to differential privacy. ACM Comput. Surv. 56(3), 76 (2023)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"28_CR13","doi-asserted-by":"publisher","first-page":"231","DOI":"10.3233\/JCS-1999-72-305","volume":"7","author":"DM Volpano","year":"1999","unstructured":"Volpano, D.M., Smith, G.: Probabilistic noninterference in a concurrent language. J. Comput. Secur. 7(1), 231\u2013253 (1999)","journal-title":"J. Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2024 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82362-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T08:31:30Z","timestamp":1757147490000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82362-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031823619","9783031823626"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82362-6_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}