{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:58:29Z","timestamp":1755838709480},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319948089"},{"type":"electronic","value":"9783319948096"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94809-6_13","type":"book-chapter","created":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T09:32:41Z","timestamp":1530264761000},"page":"261-285","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Case for Personalized Anonymization of Database Query Results"],"prefix":"10.1007","author":[{"given":"Axel","family":"Michel","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Pucheral","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,30]]},"reference":[{"key":"13_CR1","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA relevance)"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Michel, A., Nguyen, B., Pucheral, P.: Managing distributed queries under personalized anonymity constraints. In: Sixth International Conference on Data Science, Technology and Applications, DATA 2017 (2017)","DOI":"10.5220\/0006477001070117"},{"key":"13_CR3","unstructured":"Anciaux, N., Bonnet, P., Bouganim, L., Nguyen, B., Popa, I.S., Pucheral, P.: Trusted cells: a sea change for personal data services. In: Online Proceedings of Sixth Biennial Conference on Innovative Data Systems Research, CIDR 2013, Asilomar, CA, USA, 6\u20139 January 2013 (2013)"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10, 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, Atlanta, GA, USA, 3\u20138 April 2006, p. 24 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1109\/TKDE.2009.139","volume":"22","author":"N Li","year":"2010","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: Closeness: a new privacy measure for data publishing. IEEE Trans. Knowl. Data Eng. 22, 943\u2013956 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"13_CR8","unstructured":"Trabelsi, S., Neven, G., Raggett, D., Ardagna, C., et al.: Report on design and implementation. Technical report, PrimeLife Deliverable (2011)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 620\u2013629 (2005)","DOI":"10.1109\/ICDCS.2005.48"},{"key":"13_CR10","unstructured":"Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, VLDB 2006, pp. 763\u2013774. VLDB Endowment (2006)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the 17th International Conference on World Wide Web, WWW 2008, pp. 237\u2013246. ACM, New York (2008)","DOI":"10.1145\/1367497.1367531"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Jorgensen, Z., Yu, T., Cormode, G.: Conservative or liberal? Personalized differential privacy. In: 2015 IEEE 31st International Conference on Data Engineering, pp. 1023\u20131034 (2015)","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/978-3-319-57454-7_48","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"H Li","year":"2017","unstructured":"Li, H., Xiong, L., Ji, Z., Jiang, X.: Partitioning-based mechanisms under personalized differential privacy. In: Kim, J., Shim, K., Cao, L., Lee, J.-G., Lin, X., Moon, Y.-S. (eds.) PAKDD 2017. LNCS (LNAI), vol. 10234, pp. 615\u2013627. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57454-7_48"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Personalized privacy preservation. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, SIGMOD 2006, pp. 229\u2013240. ACM, New York (2006)","DOI":"10.1145\/1142473.1142500"},{"key":"13_CR15","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/2670528","volume":"58","author":"S Abiteboul","year":"2015","unstructured":"Abiteboul, S., Andr\u00e9, B., Kaplan, D.: Managing your digital life. Commun. ACM 58, 32\u201335 (2015)","journal-title":"Commun. ACM"},{"key":"13_CR16","first-page":"1625","volume":"7","author":"Q To","year":"2014","unstructured":"To, Q., Nguyen, B., Pucheral, P.: SQL\/AA: executing SQL on an asymmetric architecture. PVLDB 7, 1625\u20131628 (2014)","journal-title":"PVLDB"},{"key":"13_CR17","doi-asserted-by":"publisher","first-page":"16:1","DOI":"10.1145\/2894750","volume":"41","author":"QC To","year":"2016","unstructured":"To, Q.C., Nguyen, B., Pucheral, P.: Private and scalable execution of SQL aggregates on a secure decentralized architecture. ACM Trans. Database Syst. 41, 16:1\u201316:43 (2016)","journal-title":"ACM Trans. Database Syst."},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Flajolet, P., Fusy, \u00c9., Gandouet, O., Meunier, F.: Hyperloglog: The analysis of a near-optimal cardinality estimation algorithm. In: Proceedings of the 2007 International conference on Analysis of Algorithms (AOFA 2007) (2007)","DOI":"10.46298\/dmtcs.3545"},{"key":"13_CR19","unstructured":"Lichman, M.: UCI machine learning repository (2013)"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Wu, Z., Palmer, M.: Verbs semantics and lexical selection. In: Proceedings of the 32nd Annual Meeting on Association for Computational Linguistics, ACL 1994, pp. 133\u2013138. Association for Computational Linguistics, Stroudsburg (1994)","DOI":"10.3115\/981732.981751"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Lallali, S., Anciaux, N., Sandu Popa, I., Pucheral, P.: A secure search engine for the personal cloud. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, SIGMOD 2015, pp. 1445\u20131450. ACM, New York (2015)","DOI":"10.1145\/2723372.2735376"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2002, pp. 279\u2013288. ACM, New York (2002)","DOI":"10.1145\/775047.775089"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proceedings of the 21st International Conference on Data Engineering, ICDE 2005, pp. 217\u2013228. IEEE Computer Society, Washington, DC (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"13_CR24","unstructured":"Ge, T., Zdonik, S.: Answering aggregation queries in a secure system model. In: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB 2007, pp. 519\u2013530. VLDB Endowment (2007)"}],"container-title":["Communications in Computer and Information Science","Data Management Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94809-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T15:20:03Z","timestamp":1661527203000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-94809-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319948089","9783319948096"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94809-6_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}