{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:03:30Z","timestamp":1763017410088,"version":"3.40.4"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319067483"},{"type":"electronic","value":"9783319067490"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06749-0_3","type":"book-chapter","created":{"date-parts":[[2014,5,15]],"date-time":"2014-05-15T00:43:14Z","timestamp":1400114594000},"page":"30-55","source":"Crossref","is-referenced-by-count":19,"title":["Privacy-Preserving Statistical Data Analysis on Federated Databases"],"prefix":"10.1007","author":[{"given":"Dan","family":"Bogdanov","sequence":"first","affiliation":[]},{"given":"Liina","family":"Kamm","sequence":"additional","affiliation":[]},{"given":"Sven","family":"Laur","sequence":"additional","affiliation":[]},{"given":"Pille","family":"Pruulmann-Vengerfeldt","sequence":"additional","affiliation":[]},{"given":"Riivo","family":"Talviste","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Willemson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"3_CR1","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s00145-010-9059-9","volume":"23","author":"G. Aggarwal","year":"2010","unstructured":"Aggarwal, G., Mishra, N., Pinkas, B.: Secure computation of the median (and other elements of specified ranks). Journal of Cryptology\u00a023(3), 373\u2013401 (2010)","journal-title":"Journal of Cryptology"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Ansper, A., Buldas, A., Freudenthal, M., Willemson, J.: Scalable and Efficient PKI for Inter-Organizational Communication. In: Proceedings of ACSAC 2003, pp. 308\u2013318 (2003)","DOI":"10.1109\/CSAC.2003.1254335"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-642-41488-6_9","volume-title":"Secure IT Systems","author":"A. Ansper","year":"2013","unstructured":"Ansper, A., Buldas, A., Freudenthal, M., Willemson, J.: High-Performance Qualified Digital Signatures for X-Road. In: Riis Nielson, H., Gollmann, D. (eds.) NordSec 2013. LNCS, vol.\u00a08208, pp. 123\u2013138. Springer, Heidelberg (2013)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-319-03964-0_3","volume-title":"Critical Information Infrastructures Security","author":"A. Ansper","year":"2013","unstructured":"Ansper, A., Buldas, A., Freudenthal, M., Willemson, J.: Protecting a Federated Database Infrastructure Against Denial-of-Service Attacks. In: Luiijf, E., Hartel, P. (eds.) CRITIS 2013. LNCS, vol.\u00a08328, pp. 26\u201337. Springer, Heidelberg (2013)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-642-42045-0_11","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"G. Asharov","year":"2013","unstructured":"Asharov, G., Lindell, Y., Zarosim, H.: Fair and Efficient Secure Multiparty Computation with Reputation Systems. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol.\u00a08270, pp. 201\u2013220. Springer, Heidelberg (2013)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: A system for secure multi-party computation. In: Proceedings of ACM CCS 2008, pp. 257\u2013266 (2008)","DOI":"10.1145\/1455770.1455804"},{"key":"3_CR7","unstructured":"Bogdanov, D.: Sharemind: programmable secure computations with practical applications. PhD thesis. University of Tartu (2013)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Bogdanov, D., Laud, P., Randmets, J.: Domain-Polymorphic Programming of Privacy-Preserving Applications. Cryptology ePrint Archive, Report 2013\/371 (2013), http:\/\/eprint.iacr.org\/","DOI":"10.1145\/2517872.2517875"},{"issue":"6","key":"3_CR9","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/s10207-012-0177-2","volume":"11","author":"D. Bogdanov","year":"2012","unstructured":"Bogdanov, D., Niitsoo, M., Toft, T., Willemson, J.: High-performance secure multi-party computation for data mining applications. International Journal of Information Security\u00a011(6), 403\u2013418 (2012)","journal-title":"International Journal of Information Security"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-642-32946-3_5","volume-title":"Financial Cryptography and Data Security","author":"D. Bogdanov","year":"2012","unstructured":"Bogdanov, D., Talviste, R., Willemson, J.: Deploying secure multi-party computation for financial data analysis. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol.\u00a07397, pp. 57\u201364. Springer, Heidelberg (2012)"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-03549-4_20","volume-title":"Financial Cryptography and Data Security","author":"P. Bogetoft","year":"2009","unstructured":"Bogetoft, P., et al.: Secure Multiparty Computation Goes Live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol.\u00a05628, pp. 325\u2013343. Springer, Heidelberg (2009)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.-P., Ng, R.T., Lof, J.S.: Identifying density-based local outliers. In: Proceedings of CM SIGMOD 2000, pp. 93\u2013104 (2000)","DOI":"10.1145\/335191.335388"},{"key":"3_CR13","unstructured":"Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.A.: SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics. In: Proceedings of USENIX 2010, pp. 223\u2013240 (2010)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Canetti, R., Ishai, Y., Kumar, R., Reiter, M.K., Rubinfeld, R., Wright, R.N.: Selective private function evaluation with applications to private statistics. In: Proceedings of PODC 2001, pp. 293\u2013304. ACM (2001)","DOI":"10.1145\/383962.384047"},{"key":"3_CR15","unstructured":"Cybernetica. Income analysis of the Estonian Public Sector. Online service, https:\/\/sharemind.cyber.ee\/clouddemo\/ (last accessed December 13, 2013)"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-642-00468-1_10","volume-title":"Public Key Cryptography \u2013 PKC 2009","author":"I. Damg\u00e5rd","year":"2009","unstructured":"Damg\u00e5rd, I., Geisler, M., Kr\u00f8igaard, M., Nielsen, J.B.: Asynchronous multiparty computation: Theory and implementation. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol.\u00a05443, pp. 160\u2013179. Springer, Heidelberg (2009)"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-642-32009-5_38","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"I. Damg\u00e5rd","year":"2012","unstructured":"Damg\u00e5rd, I., Pastro, V., Smart, N., Zakarias, S.: Multiparty computation from somewhat homomorphic encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol.\u00a07417, pp. 643\u2013662. Springer, Heidelberg (2012)"},{"key":"3_CR18","unstructured":"Du, W., Atallah, M.J.: Privacy-preserving cooperative statistical analysis. In: Proceedings of ACSAC 2001, pp. 102\u2013110 (2001)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Du, W., Chen, S., Han, Y.S.: Privacy-preserving multivariate statistical analysis: Linear regression and classification. In: SDM 2004, pp. 222\u2013233 (2004)","DOI":"10.1137\/1.9781611972740.21"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. Part II. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"3_CR21","unstructured":"Feigenbaum, J., Pinkas, B., Ryger, R., Saint-Jean, F.: Secure computation of surveys. In: EU Workshop on Secure Multiparty Protocols (2004)"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of STOC 2009, pp. 169\u2013178. ACM (2009)","DOI":"10.1145\/1536414.1536440"},{"issue":"3","key":"3_CR23","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O. Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software Protection and Simulation on Oblivious RAMs. Journal of the ACM\u00a043(3), 431\u2013473 (1996)","journal-title":"Journal of the ACM"},{"key":"3_CR24","volume-title":"Nonparametric statistical methods","author":"M. Hollander","year":"1999","unstructured":"Hollander, M., Wolfe, D.A.: Nonparametric statistical methods, 2nd edn. John Wiley, New York (1999)","edition":"2"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Hoonhout, H.C.M.: Setting the stage for developing innovative product concepts: people and climate. CoDesign, 3(S1),19\u201334 (2007)","DOI":"10.1080\/15710880701376752"},{"issue":"4","key":"3_CR26","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1080\/00031305.1996.10473566","volume":"50","author":"R.J. Hyndman","year":"1996","unstructured":"Hyndman, R.J., Fan, Y.: Sample quantiles in statistical packages. The American Statistician\u00a050(4), 361\u2013365 (1996)","journal-title":"The American Statistician"},{"key":"3_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-642-31680-7_12","volume-title":"Privacy Enhancing Technologies","author":"M. Jawurek","year":"2012","unstructured":"Jawurek, M., Kerschbaum, F.: Fault-tolerant privacy-preserving statistics. In: Fischer-H\u00fcbner, S., Wright, M. (eds.) PETS 2012. LNCS, vol.\u00a07384, pp. 221\u2013238. Springer, Heidelberg (2012)"},{"key":"3_CR28","first-page":"47","volume":"24","author":"A. Kalja","year":"2002","unstructured":"Kalja, A.: The X-Road Project. A Project to Modernize Estonia\u2019s National Databases. Baltic IT&T review\u00a024, 47\u201348 (2002)","journal-title":"Baltic IT&T review"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Kalja, A.: The first ten years of X-road. In: Estonian Information Society Yearbook 2011\/2012, pp. 78\u201380. Department of State Information System, Estonia (2012)","DOI":"10.1016\/j.yort.2011.05.017"},{"key":"3_CR30","unstructured":"Kalja, A., Vallner, U.: Public e-Service Projects in Estonia. In: Proceedings of Baltic DB&IS 2002, vol.\u00a02, pp. 143\u2013153 (June 2002)"},{"issue":"7","key":"3_CR31","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1093\/bioinformatics\/btt066","volume":"29","author":"L. Kamm","year":"2013","unstructured":"Kamm, L., Bogdanov, D., Laur, S., Vilo, J.: A new way to protect privacy in large-scale genome-wide association studies. Bioinformatics\u00a029(7), 886\u2013893 (2013)","journal-title":"Bioinformatics"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Kanji, G.K.: 100 statistical tests. Sage (2006)","DOI":"10.4135\/9781849208499"},{"key":"3_CR33","first-page":"17","volume-title":"Proceedings of IFIP TC-11 SEC 2008","author":"F. Kerschbaum","year":"2008","unstructured":"Kerschbaum, F.: Practical privacy-preserving benchmarking. In: Jajodia, S., Samarati, P., Cimato, S. (eds.) Proceedings of IFIP TC-11 SEC 2008, vol.\u00a0278, pp. 17\u201331. Springer, Boston (2008)"},{"key":"3_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-540-30576-7_16","volume-title":"Theory of Cryptography","author":"E. Kiltz","year":"2005","unstructured":"Kiltz, E., Leander, G., Malone-Lee, J.: Secure computation of the mean and related statistics. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 283\u2013302. Springer, Heidelberg (2005)"},{"issue":"1","key":"3_CR35","first-page":"2","volume":"1","author":"J. Lane","year":"2008","unstructured":"Lane, J., Heus, P., Mulcahy, T.: Data Access in a Cyber World: Making Use of Cyberinfrastructure. Transactions on Data Privacy\u00a01(1), 2\u201316 (2008)","journal-title":"Transactions on Data Privacy"},{"key":"3_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-642-38980-1_6","volume-title":"Applied Cryptography and Network Security","author":"S. Laur","year":"2013","unstructured":"Laur, S., Talviste, R., Willemson, J.: From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol.\u00a07954, pp. 84\u2013101. Springer, Heidelberg (2013)"},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"S. Laur, R. Talviste, J. Willemson.: From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting (extended version). Cryptology ePrint Archive, Report 2013\/203 (2013), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-38980-1_6"},{"key":"3_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-642-24861-0_18","volume-title":"Information Security","author":"S. Laur","year":"2011","unstructured":"Laur, S., Willemson, J., Zhang, B.: Round-Efficient Oblivious Database Manipulation. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol.\u00a07001, pp. 262\u2013277. Springer, Heidelberg (2011)"},{"issue":"1","key":"3_CR39","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.jengtecman.2007.01.004","volume":"24","author":"C. Lettl","year":"2007","unstructured":"Lettl, C.: User involvement competence for radical innovation. Journal of engineering and technology management\u00a024(1), 53\u201375 (2007)","journal-title":"Journal of engineering and technology management"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and \u2113-diversity. In: Proceedings of ICDE 2007 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"3_CR41","doi-asserted-by":"crossref","unstructured":"Y. Lindell, K. Nissim, C. Orlandi.: Hiding the input-size in secure two-party computation. Cryptology ePrint Archive, Report 2012\/679 (2012), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-42045-0_22"},{"key":"3_CR42","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD)\u00a01(1) ( March 2007)","DOI":"10.1145\/1217299.1217302"},{"key":"3_CR43","unstructured":"P. Pruulmann-Vengerfeldt, L. Kamm, R. Talviste, P. Laud, D. Bogdanov.: Deliverable D1.1\u2014Capability model (2012), http:\/\/usable-security.eu\/files\/D1.1.pdf.pdf"},{"key":"3_CR44","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering\u00a013, 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"3_CR45","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM\u00a022, 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"3_CR46","doi-asserted-by":"crossref","unstructured":"Suber, P.: Open Access. MIT Press (2012)","DOI":"10.7551\/mitpress\/9286.001.0001"},{"key":"3_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-540-30073-1_5","volume-title":"Secure Data Management","author":"H. Subramaniam","year":"2004","unstructured":"Subramaniam, H., Wright, R.N., Yang, Z.: Experimental analysis of privacy-preserving statistics computation. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2004. LNCS, vol.\u00a03178, pp. 55\u201366. Springer, Heidelberg (2004)"},{"issue":"5","key":"3_CR48","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst.\u00a010(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"issue":"6","key":"3_CR49","doi-asserted-by":"publisher","first-page":"80","DOI":"10.2307\/3001968","volume":"1","author":"F. Wilcoxon","year":"1945","unstructured":"Wilcoxon, F.: Individual Comparisons by Ranking Methods. Biometrics Bulletin\u00a01(6), 80\u201383 (1945)","journal-title":"Biometrics Bulletin"},{"key":"3_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-642-22961-9_11","volume-title":"Electronic Government and the Information Systems Perspective","author":"J. Willemson","year":"2011","unstructured":"Willemson, J.: Pseudonymization Service for X-Road eGovernment Data Exchange Layer. In: Andersen, K.N., Francesconi, E., Gr\u00f6nlund, \u00c5., van Engers, T.M. (eds.) EGOVIS 2011. LNCS, vol.\u00a06866, pp. 135\u2013145. Springer, Heidelberg (2011)"},{"key":"3_CR51","doi-asserted-by":"crossref","unstructured":"Willemson, J., Ansper, A.: A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications. In: Proceedings of ARES 2008, pp. 572\u2013577. IEEE Computer Society (2008)","DOI":"10.1109\/ARES.2008.90"},{"key":"3_CR52","unstructured":"Yang, Z., Wright, R.N., Subramaniam, H.: Experimental analysis of a privacy-preserving scalar product protocol. Computer Systems Science & Engineering\u00a021(1) (2006)"},{"key":"3_CR53","doi-asserted-by":"crossref","unstructured":"Yao, A.C.-C.: Protocols for Secure Computations (Extended Abstract). In: Proceedings of FOCS 1982, pp. 160\u2013164. IEEE (1982)","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06749-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T22:43:38Z","timestamp":1746225818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06749-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319067483","9783319067490"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06749-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}