{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T06:45:22Z","timestamp":1744181122371},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319415758"},{"type":"electronic","value":"9783319415765"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41576-5_5","type":"book-chapter","created":{"date-parts":[[2016,6,24]],"date-time":"2016-06-24T13:55:58Z","timestamp":1466776558000},"page":"61-70","source":"Crossref","is-referenced-by-count":1,"title":["Secure Similarity Queries: Enabling Precision Medicine with Privacy"],"prefix":"10.1007","author":[{"given":"Jinfei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Li","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,24]]},"reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1007\/978-3-540-70936-7_29","volume-title":"Theory of Cryptography","author":"D Boneh","year":"2007","unstructured":"Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535\u2013554. Springer, Heidelberg (2007)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"B\u00f6rzs\u00f6nyi, S., Kossmann, D., Stocker, K.: The skyline operator. In: Proceedings of the 17th International Conference on Data Engineering, 2\u20136 April 2001, Heidelberg, pp. 421\u2013430 (2001)","DOI":"10.1109\/ICDE.2001.914855"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/978-3-540-30576-7_20","volume-title":"Theory of Cryptography","author":"S Chawla","year":"2005","unstructured":"Chawla, S., Dwork, C., McSherry, F., Smith, A., Wee, H.M.: Toward privacy in public databases. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 363\u2013385. Springer, Heidelberg (2005)"},{"issue":"11","key":"5_CR4","first-page":"1087","volume":"4","author":"R Chen","year":"2011","unstructured":"Chen, R., Mohammed, N., Fung, B.C.M., Desai, B.C., Xiong, L.: Publishing set-valued data via differential privacy. PVLDB 4(11), 1087\u20131098 (2011)","journal-title":"PVLDB"},{"issue":"1","key":"5_CR5","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1056\/NEJMp1500523","volume":"1","author":"FS Collins","year":"2015","unstructured":"Collins, F.S., Varmus, H.: A new initiative on precision medicine. New Engl. J. Med. 1(1), 793\u2013795 (2015)","journal-title":"New Engl. J. Med."},{"key":"5_CR6","unstructured":"Dellis, E., Seeger, B.: Efficient computation of reverse skyline queries. In: Proceedings of the 33rd International Conference on Very Large Data Bases, University of Vienna, Austria, 23\u201327 September 2007, pp. 291\u2013302 (2007)"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: IEEE 30th International Conference on Data Engineering, ICDE 2014, Chicago, March 31 - April 4 2014, pp. 664\u2013675 (2014)","DOI":"10.1109\/ICDE.2014.6816690"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Fan, L., Bonomi, L., Xiong, L., Sunderam, V.S.: Monitoring web browsing behavior with differential privacy. In: 23rd International World Wide Web Conference, WWW 2014, Seoul, 7\u201311 April 2014, pp. 177\u2013188 (2014)","DOI":"10.1145\/2566486.2568038"},{"issue":"4","key":"5_CR10","first-page":"14","volume":"42","author":"BCM Fung","year":"2010","unstructured":"Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14 (2010)","journal-title":"ACM Comput. Surv."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, May 31 - June 2, 2009, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"issue":"3","key":"5_CR12","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/1666420.1666444","volume":"53","author":"C Gentry","year":"2010","unstructured":"Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97\u2013105 (2010)","journal-title":"Commun. ACM"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Rughinis, R.: An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical. In: Fourth ACM Conference on Data and Application Security and Privacy, CODASPY 2014, San Antonio, 03\u201305 March 2014, pp. 321\u2013332 (2014)","DOI":"10.1145\/2557547.2557559"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Hashem, T., Kulik, L., Zhang, R.: Privacy preserving group nearest neighbor queries. In: Proceedings EDBT 2010, 13th International Conference on Extending Database Technology, Lausanne, 22\u201326 March 2010, pp. 489\u2013500 (2010)","DOI":"10.1145\/1739041.1739100"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Hu, H., Xu, J., Ren, C., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: Proceedings of the 27th International Conference on Data Engineering, ICDE 11\u201316 April 2011, Hannover, pp. 601\u2013612 (2011)","DOI":"10.1109\/ICDE.2011.5767862"},{"key":"5_CR16","unstructured":"Janosi, A., Steinbrunn, W., Pfisterer, M., Detrano, R.: Heart disease datase. In: The UCI Archive (1998). https:\/\/archive.ics.uci.edu\/ml\/datasets\/Heart+Disease"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Kirkpatrick, D.G., Seidel, R.: Output-size sensitive algorithms for finding maximal vectors. In: Proceedings of the First Annual Symposium on Computational Geometry, Baltimore, 5\u20137 June 1985, pp. 89\u201396 (1985)","DOI":"10.1145\/323233.323246"},{"issue":"4","key":"5_CR18","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1145\/321906.321910","volume":"22","author":"HT Kung","year":"1975","unstructured":"Kung, H.T., Luccio, F., Preparata, F.P.: On finding the maxima of a set of vectors. J. ACM 22(4), 469\u2013476 (1975)","journal-title":"J. ACM"},{"key":"5_CR19","unstructured":"Li, H., Xiong, L., Jiang, X.: Differentially private synthesization of multi-dimensional data using copula functions. In: Proceedings of the 17th International Conference on Extending Database Technology, EDBT 2014, Athens, 24\u201328 March 2014, pp. 475\u2013486 (2014)"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, 15\u201320 April 2007, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Liu, J., Luo, J., Huang, J.Z.: Rating: Privacy preservation for multiple attributes with different sensitivity requirements. In: IEEE 11th International Conference on Data Mining Workshops (ICDMW), Vancouver, 11 December 2011, pp. 666\u2013673 (2011)","DOI":"10.1109\/ICDMW.2011.144"},{"issue":"13","key":"5_CR22","first-page":"2086","volume":"8","author":"J Liu","year":"2015","unstructured":"Liu, J., Xiong, L., Pei, J., Luo, J., Zhang, H.: Finding pareto optimal groups: group-based skyline. PVLDB 8(13), 2086\u20132097 (2015)","journal-title":"PVLDB"},{"issue":"12","key":"5_CR23","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1016\/j.ipl.2014.06.014","volume":"114","author":"J Liu","year":"2014","unstructured":"Liu, J., Xiong, L., Xu, X.: Faster output-sensitive skyline computation algorithm. Inf. Process. Lett. 114(12), 710\u2013713 (2014)","journal-title":"Inf. Process. Lett."},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Liu, J., Zhang, H., Xiong, L., Li, H., Luo, J.: Finding probabilistic k-skyline sets on uncertain data. In: Proceedings of the 24rd ACM International Conference on Conference on Information and Knowledge Management, CIKM 2015, Melbourne, 19\u201323 October 2015","DOI":"10.1145\/2806416.2806452"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, 3\u20138 April 2006, Atlanta, p. 24 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"5_CR26","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"Advances in Cryptology - EUROCRYPT 1999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)"},{"issue":"1","key":"5_CR27","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/1061318.1061320","volume":"30","author":"D Papadias","year":"2005","unstructured":"Papadias, D., Tao, Y., Fu, G., Seeger, B.: Progressive skyline computation in database systems. ACM Trans. Database Syst. 30(1), 41\u201382 (2005)","journal-title":"ACM Trans. Database Syst."},{"issue":"1","key":"5_CR28","first-page":"619","volume":"3","author":"S Papadopoulos","year":"2010","unstructured":"Papadopoulos, S., Bakiras, S., Papadias, D.: Nearest neighbor search with strong location privacy. PVLDB 3(1), 619\u2013629 (2010)","journal-title":"PVLDB"},{"key":"5_CR29","unstructured":"Pei, J., Jiang, B., Lin, X., Yuan, Y.: Probabilistic skylines on uncertain data. In: Proceedings of the 33rd International Conference on Very Large Data Bases, University of Vienna, Austria, 23\u201327 September 2007, pp. 15\u201326 (2007)"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Pramanik, S., Li, J.: Fast approximate search algorithm for nearest neighbor queries in high dimensions. In: Proceedings of the 15th International Conference on Data Engineering, Sydney, 23\u201326 March 1999, p. 251 (1999)","DOI":"10.1109\/ICDE.1999.754931"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Qi, Y., Atallah, M.J.: Efficient privacy-preserving k-nearest neighbor search. In: 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17\u201320 June 2008, Beijing, pp. 311\u2013319 (2008)","DOI":"10.1109\/ICDCS.2008.79"},{"issue":"1","key":"5_CR32","first-page":"1020","volume":"1","author":"C Shahabi","year":"2008","unstructured":"Shahabi, C., Tang, L.A., Xing, S.: Indexing land surface for efficient kNN query. PVLDB 1(1), 1020\u20131031 (2008)","journal-title":"PVLDB"},{"issue":"5","key":"5_CR33","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure knn computation on encrypted databases. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, June 29 - July 2 2009, pp. 139\u2013152 (2009)","DOI":"10.1145\/1559845.1559862"},{"key":"5_CR35","series-title":"Lecture Notes in Computer Science","first-page":"150","volume-title":"Secure Data Management","author":"Y Xiao","year":"2010","unstructured":"Xiao, Y., Xiong, L., Yuan, C.: Differentially private data release through multidimensional partitioning. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2010. LNCS, vol. 6358, pp. 150\u2013168. Springer, Heidelberg (2010)"},{"key":"5_CR36","unstructured":"Yao, B., Li, F., Xiao, X.: Secure nearest neighbor revisited. In: 29th IEEE International Conference on Data Engineering, ICDE 2013, Brisbane, 8\u201312 April 2013, pp. 733\u2013744 (2013)"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical k nearest neighbor queries with location privacy. In: IEEE 30th International Conference on Data Engineering, ICDE 2014, Chicago, March 31 - April 4 2014, pp. 640\u2013651 (2014)","DOI":"10.1109\/ICDE.2014.6816688"}],"container-title":["Lecture Notes in Computer Science","Biomedical Data Management and Graph Online Querying"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41576-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T04:52:14Z","timestamp":1568091134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41576-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319415758","9783319415765"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41576-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}