{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:43:24Z","timestamp":1725795804969},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319078809"},{"type":"electronic","value":"9783319078816"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07881-6_9","type":"book-chapter","created":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T19:14:33Z","timestamp":1401909273000},"page":"120-135","source":"Crossref","is-referenced-by-count":0,"title":["FACTS: A Framework for Anonymity towards Comparability, Transparency, and Sharing"],"prefix":"10.1007","author":[{"given":"Clemens","family":"Heidinger","sequence":"first","affiliation":[]},{"given":"Klemens","family":"B\u00f6hm","sequence":"additional","affiliation":[]},{"given":"Erik","family":"Buchmann","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Richter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"http:\/\/facts.ipd.kit.edu\/"},{"key":"9_CR2","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1007\/978-3-642-22056-2_65","volume-title":"Advanced Information Systems Engineering Workshops","author":"J. Abramov","year":"2011","unstructured":"Abramov, J., Sturm, A., Shoval, P.: A Pattern Based Approach for Secure Database Design. In: Salinesi, C., Pastor, O. (eds.) CAiSE Workshops 2011. LNBIP, vol.\u00a083, pp. 637\u2013651. Springer, Heidelberg (2011)"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-38709-8_3","volume-title":"Advanced Information Systems Engineering","author":"M. Barhamgi","year":"2013","unstructured":"Barhamgi, M., Benslimane, D., Oulmakhzoune, S., Cuppens-Boulahia, N., Cuppens, F., Mrissa, M., Taktak, H.: Secure and Privacy-Preserving Execution Model for Data Services. In: Salinesi, C., Norrie, M.C., Pastor, \u00d3. (eds.) CAiSE 2013. LNCS, vol.\u00a07908, pp. 35\u201350. Springer, Heidelberg (2013)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Bonnet, P., et al.: Repeatability and workability evaluation of SIGMOD 2011. ACM SIGMOD Record 40(2) (2011)","DOI":"10.1145\/2034863.2034873"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-642-05148-7_21","volume-title":"On the Move to Meaningful Internet Systems: OTM 2009","author":"T. Burghardt","year":"2009","unstructured":"Burghardt, T., Buchmann, E., M\u00fcller, J., B\u00f6hm, K.: Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2009, Part I. LNCS, vol.\u00a05870, pp. 304\u2013321. Springer, Heidelberg (2009)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Ceselli, A., et al.: Modeling and Assessing Inference Exposure in Encrypted Databases. TISSEC\u00a08(1) (2005)","DOI":"10.1145\/1053283.1053289"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Heidinger, C., et al.: Efficient and secure exact-match queries in outsourced databases. World Wide Web (2013)","DOI":"10.1007\/s11280-013-0270-0"},{"key":"9_CR9","unstructured":"Heidinger, C., et al.: FACTS: A Framework for Anonymity towards Comparability, Transparency, and Sharing (Extended Version). Technical report, Karlsruhe Institute of Technology, KIT (2013), \n                    \n                      http:\/\/digbib.ubka.uni-karlsruhe.de\/volltexte\/1000037502"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Kifer, D., Machanavajjhala, A.: No Free Lunch in Data Privacy. In: SIGMOD (2011)","DOI":"10.1145\/1989323.1989345"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Kifer, D., Machanavajjhala, A.: A Rigorous and Customizable Framework for Privacy. In: PODS (2012)","DOI":"10.1145\/2213556.2213571"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Li, T., Li, N.: On the Tradeoff Between Privacy and Utility in Data Publishing. In: KDD (2009)","DOI":"10.1145\/1557019.1557079"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., et al.: l-Diversity: Privacy Beyond k-Anonymity. In: ICDE (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Peters, I.: Folksonomies: Indexing and Retrieval in the Web 2.0. Walter de Gruyter (2009)","DOI":"10.1515\/9783598441851"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Samarati, P.: Protecting Respondents\u2019 Identities in Microdata Release. TKDE\u00a013(6) (2001)","DOI":"10.1109\/69.971193"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Vandewalle, P., et al.: Reproducible research in signal processing. SPM\u00a026(3) (2009)","DOI":"10.1109\/MSP.2009.932122"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Wang, H., Liu, R.: Privacy-preserving publishing microdata with full functional dependencies. DKE\u00a070(3) (2011)","DOI":"10.1016\/j.datak.2010.11.002"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07881-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T20:13:29Z","timestamp":1564604009000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07881-6_9"}},"subtitle":["Exploratory Paper"],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319078809","9783319078816"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07881-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}