{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:36:54Z","timestamp":1742927814586,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319674216"},{"type":"electronic","value":"9783319674223"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67422-3_1","type":"book-chapter","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T16:50:08Z","timestamp":1505235008000},"page":"3-11","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Provenance and Privacy"],"prefix":"10.1007","author":[{"given":"Vicen\u00e7","family":"Torra","sequence":"first","affiliation":[]},{"given":"Guillermo","family":"Navarro-Arribas","sequence":"additional","affiliation":[]},{"given":"David","family":"Sanchez-Charles","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Munt\u00e9s-Mulero","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"key":"1_CR1","unstructured":"Ahlborg, K.: Vem har skrivit det falska brevet om Sverige? Aftonbadet 12th September 2015. http:\/\/www.aftonbladet.se\/nyheter\/article21407033.ab"},{"key":"1_CR2","unstructured":"Akoush, S., Sohan, R., Hopper, A.: HadoopProv: towards Provenance as a first class citizen in MapReduce. In: Presented as Part of the 5th USENIX Workshop on the Theory and Practice of Provenance (2013)"},{"key":"1_CR3","unstructured":"Arab, B., Gawlick, D., Radhakrishnan, V., Guo, H., Glavic, B.: A generic provenance middleware for queries, updates, and transactions. In: 6th USENIX Workshop on the Theory and Practice of Provenance (2014)"},{"key":"1_CR4","unstructured":"Braun, U., Shinnar, A., Seltzer, M.: Securing provenance. In: Proceedings of the HOTSEC (2008)"},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Ciccarese, P., Wu, E., Wong, G., Ocana, M., Kinoshita, J., Ruttenberg, A., Clark, T.: The SWAN biomedical discourse ontology. J. Biomed. Inform., Semant. Mashup Biomed. Data 41, 739\u2013751 (2008). doi:10.1016\/j.jbi.2008.04.010","DOI":"10.1016\/j.jbi.2008.04.010"},{"key":"1_CR6","unstructured":"Domingo-Ferrer, J., Torra, V.: A quantitative comparison of disclosure control methods for microdata. In: Doyle, P., Lane, J.I., Theeuwes, J.J.M., Zayatz, L. (eds.) Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, North-Holland, pp. 111\u2013134 (2001)"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). doi:10.1007\/11787006_1"},{"key":"1_CR8","unstructured":"Gil, Y., Miles, S. (eds.): PROV Model Primer (2013)"},{"key":"1_CR9","unstructured":"Google.: European privacy requests for search removals (2016). https:\/\/www.google.com\/transparencyreport\/removals\/europeprivacy\/?hl=en"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-642-17819-1_10","volume-title":"Provenance and Annotation of Data and Processes","author":"O Hartig","year":"2010","unstructured":"Hartig, O., Zhao, J.: Publishing and consuming provenance metadata on the web of linked data. In: McGuinness, D.L., Michaelis, J.R., Moreau, L. (eds.) IPAW 2010. LNCS, vol. 6378, pp. 78\u201390. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-17819-1_10"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Hasan, R., Sion, R., Winslett, M.: Introducing secure provenance: problems and challenges. In: Proceedings of the StorageSST. ACM (2007)","DOI":"10.1145\/1314313.1314318"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Hasan, R., Sion, R., Winslett, M.: The case of the fake Picasso: preventing history forgery with secure provenance. In: Proceedings of the FAST (2009)","DOI":"10.1145\/1629080.1629082"},{"key":"1_CR13","unstructured":"HL7 Standards Product Brief - HL7 CDA? R2 Implementation Guide: Data Provenance, Release 1 - US Realm [WWW Document], n.d. http:\/\/www.hl7.org\/implement\/standards\/product_brief.cfm?product_id=420. Accessed 04 Apr 2016"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Interlandi, M., Shah, K., Tetali, S.D., Gulzar, M.A., Yoo, S., Kim, M., Millstein, T., Condie, T.: Titian: data provenance support in Spark. Proc. VLDB Endow 9, 216\u2013227 (2015)","DOI":"10.14778\/2850583.2850595"},{"key":"1_CR15","doi-asserted-by":"publisher","unstructured":"Logothetis, D., De, S., Yocum, K.: Scalable Lineage Capture for Debugging DISC Analytics, pp. 1\u201315. ACM Press, New York (2013). doi:10.1145\/2523616.2523619","DOI":"10.1145\/2523616.2523619"},{"key":"1_CR16","unstructured":"McDaniel, P., Butler, K., Sion, R., Zadok, E., Winslett, M.: Towards a secure and efficient system for end-to-end provenance. In: Proceedings of the TAPP (2010)"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-540-89965-5_31","volume-title":"Provenance and Annotation of Data and Processes","author":"L Moreau","year":"2008","unstructured":"Moreau, L., Freire, J., Futrelle, J., McGrath, R.E., Myers, J., Paulson, P.: The open provenance model: an overview. In: Freire, J., Koop, D., Moreau, L. (eds.) IPAW 2008. LNCS, vol. 5272, pp. 323\u2013326. Springer, Heidelberg (2008). doi:10.1007\/978-3-540-89965-5_31"},{"key":"1_CR18","unstructured":"Niu, X., Glavic, B., Gawlick, D., Liu, Z.H., Krishnaswamy, V., Radhakrishnan, V.: Interoperability for Provenance-aware Databases using PROV and JSON. In: 7th USENIX Workshop on the Theory and Practice of Provenance (2015)"},{"key":"1_CR19","unstructured":"Oracle Enterprise Metadata Management Overview [WWW Document], n.d. http:\/\/www.oracle.com\/technetwork\/middleware\/oemm\/overview\/index.html. Accessed 04 Apr 2016"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Park, H., Ikeda, R., Widom, J.: RAMP: a system for capturing and tracing provenance in MapReduce workflows. In: Presented at the 37th International Conference on Very Large Data Bases, Stanford InfoLab, Seattle, Washington (2011)","DOI":"10.14778\/3402755.3402768"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Pearson, S., Mont, M.C.: Sticky Policies: An approach for managing privacy across multiple parties, Computer, pp. 60\u201368 (2011)","DOI":"10.1109\/MC.2011.225"},{"key":"1_CR22","unstructured":"PCAST.: Big data and privacy: a technological perspective, President\u2019s Council of Advisors on Science and Technology, Executive office of the president of the United States (2014)"},{"key":"1_CR23","unstructured":"Sahoo, S.S., Sheth, A.P.: Provenir ontology: towards a framework for eScience provenance management. Microsoft eScience Workshop (2009)"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Samarati, P.: Protecting Respondents\u2019 Identities in Microdata Release. IEEE Trans. Knowl. Data Eng. 13(6), pp. 1010\u20131027 (2001)","DOI":"10.1109\/69.971193"},{"key":"1_CR25","unstructured":"Thurfjell, K.: Sverige erbjuder sig s\u00e4lja vapen till Ukraina i f\u00f6rfalskat brev, Svenska Dagbladet (2015). http:\/\/www.svd.se\/sverige-erbjuder-sig-salja-vapen-till-ukraina-i-forfalskat-brev"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Torra, V., Navarro-Arribas, G.: Data Privacy. WIREs Data Min. Knowl. Discov. 4(4), pp. 269\u2013280 (2014)","DOI":"10.1002\/widm.1129"},{"key":"1_CR27","unstructured":"http:\/\/wiki.siframework.org\/Data+Provenance+Initiative"},{"key":"1_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-540-25955-8_17","volume-title":"Privacy in Statistical Databases","author":"WE Winkler","year":"2004","unstructured":"Winkler, W.E.: Re-identification methods for masked microdata. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 216\u2013230. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-25955-8_17"},{"key":"1_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-04219-5_2","volume-title":"Secure Data Management","author":"J Zhang","year":"2009","unstructured":"Zhang, J., Chapman, A., LeFevre, K.: Do you know where your data\u2019s been? \u2013 tamper-evident database provenance. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2009. LNCS, vol. 5776, pp. 17\u201332. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-04219-5_2"}],"container-title":["Lecture Notes in Computer Science","Modeling Decisions for Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67422-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T11:33:24Z","timestamp":1709811204000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-67422-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319674216","9783319674223"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67422-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MDAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Modeling Decisions for Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mdai2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/mdai.cat\/mdai2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}