{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:39Z","timestamp":1725889899158},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596075"},{"type":"electronic","value":"9783319596082"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59608-2_26","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T11:29:56Z","timestamp":1497353396000},"page":"454-474","source":"Crossref","is-referenced-by-count":1,"title":["SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy"],"prefix":"10.1007","author":[{"given":"Qian","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhibo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhan","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Acs, G., Castelluccia, C.: A case study: privacy preserving release of spatio-temporal density in Paris. In: Proceedings of ACM SIGKDD, pp. 1679\u20131688 (2014)","DOI":"10.1145\/2623330.2623361"},{"key":"26_CR2","unstructured":"Adar, E.: User 4xxxxx9: Anonymizing query logs. In: Proceedings of Query Log Analysis Workshop, International Conference on World Wide Web (2007)"},{"key":"26_CR3","unstructured":"Arlitt, M., Jin, T.: Workload characterization of the 1998 world cup web site. Technical report, HPL-1999-35R1, HP (1999)"},{"key":"26_CR4","unstructured":"Barbaro, M., Zeller, T.: A face is exposed for AOL searcher no. 4417749. The New York Times (2006)"},{"key":"26_CR5","unstructured":"Canali, D., Balzarotti, D.: Behind the scenes of online attacks: an analysis of exploitation behaviors on the web. In: 20th Annual Network & Distributed System Security Symposium (NDSS 2013) (2013)"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Chan, T.H.H., Li, M., Shi, E., Xu, W.: Differentially private continual monitoring of heavy hitters from distributed streams. In: Proceedings of Privacy Enhancing Technologies, pp. 140\u2013159 (2012)","DOI":"10.1007\/978-3-642-31680-7_8"},{"issue":"3","key":"26_CR7","first-page":"26","volume":"14","author":"THH Chan","year":"2011","unstructured":"Chan, T.H.H., Shi, E., Song, D.: Private and continual release of statistics. ACM Trans. Inf. Syst. Secur. 14(3), 26 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Cormode, G., Procopiuc, M., Srivastava, D., Tran, T.T.: Differentially private publication of sparse data. arXiv preprint arXiv:1103.0825 (2011)","DOI":"10.1145\/2274576.2274608"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). doi: 10.1007\/11787006_1"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Proceedings of Theory of Cryptography, pp. 265\u2013284 (2006)","DOI":"10.1007\/11681878_14"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential privacy under continual observation. In: Proceedings of ACM STOC, pp. 715\u2013724 (2010)","DOI":"10.1145\/1806689.1806787"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Fan, L., Bonomi, L., Xiong, L., Sunderam, V.: Monitoring web browsing behavior with differential privacy. In: Proceedings of ACM WWW, pp. 177\u2013188 (2014)","DOI":"10.1145\/2566486.2568038"},{"issue":"9","key":"26_CR13","doi-asserted-by":"crossref","first-page":"2094","DOI":"10.1109\/TKDE.2013.96","volume":"26","author":"L Fan","year":"2014","unstructured":"Fan, L., Xiong, L.: An adaptive approach to real-time aggregate monitoring with differential privacy. IEEE Trans. Knowl. Data Eng. 26(9), 2094\u20132106 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Fan, L., Xiong, L., Sunderam, V.: Differentially private multi-dimensional time series release for traffic monitoring. In: Proceedings of Data and Applications Security and Privacy, pp. 33\u201348 (2013)","DOI":"10.1007\/978-3-642-39256-6_3"},{"issue":"3","key":"26_CR15","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1109\/TKDE.2011.26","volume":"24","author":"M G\u00f6tz","year":"2012","unstructured":"G\u00f6tz, M., Machanavajjhala, A., Wang, G., Xiao, X., Gehrke, J.: Publishing search logsa comparative study of privacy guarantees. IEEE Trans. Knowl. Data Eng. 24(3), 520\u2013532 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Hong, Y., He, X., Vaidya, J., Adam, N., Atluri, V.: Effective anonymization of query logs. In: Proceedings of the 18th ACM Conference on Information and Knowledge Management, pp. 1465\u20131468 (2009)","DOI":"10.1145\/1645953.1646146"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Kellaris, G., Papadopoulos, S.: Practical differential privacy via grouping and smoothing. In: Proceedings of the VLDB Endowment, vol. 6, pp. 301\u2013312. VLDB Endowment (2013)","DOI":"10.14778\/2535573.2488337"},{"issue":"12","key":"26_CR18","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.14778\/2732977.2732989","volume":"7","author":"G Kellaris","year":"2014","unstructured":"Kellaris, G., Papadopoulos, S., Xiao, X., Papadias, D.: Differentially private event sequences over infinite streams. Proc. VLDB Endowment 7(12), 1155\u20131166 (2014)","journal-title":"Proc. VLDB Endowment"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Kifer, D., Lin, B.R.: Towards an axiomatization of statistical privacy and utility. In: Proceedings of ACM PODS, pp. 147\u2013158 (2010)","DOI":"10.1145\/1807085.1807106"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Korolova, A., Kenthapadi, K., Mishra, N., Ntoulas, A.: Releasing search queries and clicks privately. In: Proceedings of the 18th International Conference on World Wide Web, pp. 171\u2013180 (2009)","DOI":"10.1145\/1526709.1526733"},{"key":"26_CR21","unstructured":"Olejnik, L., Castelluccia, C., Janc, A.: Why Johnny can\u2019t browse in peace: on the uniqueness of web browsing history patterns. In: 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2012) (2012)"},{"key":"26_CR22","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1098\/rspl.1895.0041","volume":"58","author":"K Pearson","year":"1895","unstructured":"Pearson, K.: Note on regression and inheritance in the case of two parents. Proc. R. Soc. Lond. 58, 240\u2013242 (1895)","journal-title":"Proc. R. Soc. Lond."},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Nath, S.: Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, pp. 735\u2013746 (2010)","DOI":"10.1145\/1807167.1807247"},{"issue":"6","key":"26_CR24","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1007\/s00778-013-0309-y","volume":"22","author":"J Xu","year":"2013","unstructured":"Xu, J., Zhang, Z., Xiao, X., Yang, Y., Yu, G., Winslett, M.: Differentially private histogram publication. VLDB J. Int. J. Very Large Databases 22(6), 797\u2013822 (2013)","journal-title":"VLDB J. Int. J. Very Large Databases"},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Zang, H., Bolot, J.: Anonymization of location data does not work: a large-scale measurement study. In: Proceedings of ACM MobiCom, pp. 145\u2013156 (2011)","DOI":"10.1145\/2030613.2030630"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59608-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T21:02:18Z","timestamp":1569445338000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59608-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596075","9783319596082"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59608-2_26","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}