{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T04:58:09Z","timestamp":1744433889664},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319261867"},{"type":"electronic","value":"9783319261874"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26187-4_42","type":"book-chapter","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T13:05:24Z","timestamp":1445864724000},"page":"458-472","source":"Crossref","is-referenced-by-count":6,"title":["Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach"],"prefix":"10.1007","author":[{"given":"Anand","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Jay","family":"Ligatti","sequence":"additional","affiliation":[]},{"given":"Yi-Cheng","family":"Tu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,18]]},"reference":[{"issue":"4","key":"42_CR1","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"NR Adam","year":"1989","unstructured":"Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Comput. Surv. 21(4), 515\u2013556 (1989)","journal-title":"ACM Comput. Surv."},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R., Thomas, D.: Privacy preserving OLAP. In: Proceedings of the International Conference on Management of Data, SIGMOD, pp. 251\u2013262 (2005)","DOI":"10.1145\/1066157.1066187"},{"issue":"1","key":"42_CR3","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/320128.320138","volume":"5","author":"DE Denning","year":"1980","unstructured":"Denning, D.E., Schl\u00f6rer, J.: A fast procedure for finding a tracker in a statistical database. ACM Trans. Database Syst. 5(1), 88\u2013102 (1980)","journal-title":"ACM Trans. Database Syst."},{"issue":"1","key":"42_CR4","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/320064.320068","volume":"4","author":"D Dobkin","year":"1979","unstructured":"Dobkin, D., Jones, A.K., Lipton, R.J.: Secure databases: protection against user influence. ACM Trans. Database Syst. 4(1), 97\u2013106 (1979)","journal-title":"ACM Trans. Database Syst."},{"key":"42_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008)"},{"issue":"1","key":"42_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14778\/2047485.2047486","volume":"5","author":"D Fabbri","year":"2011","unstructured":"Fabbri, D., LeFevre, K.: Explanation-based auditing. Proc. VLDB Endow. 5(1), 1\u201312 (2011)","journal-title":"Proc. VLDB Endow."},{"issue":"2","key":"42_CR7","first-page":"101","volume":"3","author":"IP Fellegi","year":"1974","unstructured":"Fellegi, I.P., Phillips, J.J.: Statistical confidentiality: some theory and application to data dissemination. Am. Econ. Soc. Measures 3(2), 101\u2013112 (1974)","journal-title":"Am. Econ. Soc. Measures"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Hasan, R., Winslett, M.: Efficient audit-based compliance for relational data retention. In: Symposium on Information, Computer and Communications Security, pp. 238\u2013248 (2011)","DOI":"10.1145\/1966913.1966944"},{"key":"42_CR9","doi-asserted-by":"publisher","first-page":"S82","DOI":"10.1097\/MLR.0b013e3182585355","volume":"50","author":"C Kushida","year":"2012","unstructured":"Kushida, C., Nichols, D., Jadrnicek, R., Miller, R., Walsh, J., Griffin, K.: Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies. Med. Care 50, S82\u2013S101 (2012)","journal-title":"Med. Care"},{"issue":"3","key":"42_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1455526.1455532","volume":"12","author":"J Ligatti","year":"2009","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur. 12(3), 1\u201341 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"42_CR11","doi-asserted-by":"crossref","unstructured":"Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. In: Proceedings of the 15th European Conference on Research in Computer Security, pp. 87\u2013100 (2010)","DOI":"10.1007\/978-3-642-15497-3_6"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the International Conference on Management of Data, SIGMOD, pp. 19\u201330 (2009)","DOI":"10.1145\/1559845.1559850"},{"key":"42_CR13","doi-asserted-by":"crossref","unstructured":"Mohan, P., Thakurta, A., Shi, E., Song, D., Culler, D.: Gupt: privacy preserving data analysis made easy. In: Proceedings of the International Conference on Management of Data, SIGMOD, pp. 349\u2013360 (2012)","DOI":"10.1145\/2213836.2213876"},{"issue":"9","key":"42_CR14","doi-asserted-by":"publisher","first-page":"1549","DOI":"10.1287\/mnsc.41.9.1549","volume":"41","author":"K Muralidhar","year":"1995","unstructured":"Muralidhar, K., Batra, D., Kirs, P.J.: Accessibility, security, and accuracy in statistical databases: the case for the multiplicative fixed data perturbation approach. Manage. Sci. 41(9), 1549\u20131564 (1995)","journal-title":"Manage. Sci."},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the Symposium on Security and Privacy, S&P, pp. 111\u2013125 (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"42_CR16","unstructured":"Roy, I., Setty, S.T.V., Kilzer, A., Shmatikov, V., Witchel, E.: Airavat: security and privacy for mapreduce. In: Proceedings of the Conference on Networked Systems Design and Implementation, NSDI, p. 20 (2010)"},{"issue":"1","key":"42_CR17","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"FB Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30\u201350 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"42_CR18","unstructured":"Upadhyaya, P., Anderson, N.R., Balazinska, M., Howe, B., Kaushik, R., Ramamurthy, R., Suciu, D.: Stop that query! the need for managing data use. In: Conference on Innovative Data Systems Research (2013)"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26187-4_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T09:26:56Z","timestamp":1559294816000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26187-4_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319261867","9783319261874"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26187-4_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}