{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:10:54Z","timestamp":1725999054059},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319955032"},{"type":"electronic","value":"9783319955049"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95504-9_27","type":"book-chapter","created":{"date-parts":[[2018,11,13]],"date-time":"2018-11-13T03:38:10Z","timestamp":1542080290000},"page":"615-630","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy and Security Issues in DDDAS Systems"],"prefix":"10.1007","author":[{"given":"Li","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Vaidy","family":"Sunderam","sequence":"additional","affiliation":[]},{"given":"Liyue","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Slawomir","family":"Goryczka","sequence":"additional","affiliation":[]},{"given":"Layla","family":"Pournajaf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,14]]},"reference":[{"unstructured":"2009 H1N1 Flu. http:\/\/www.cdc.gov\/h1n1flu\/","key":"27_CR1"},{"unstructured":"Investigation update: Outbreak of shiga toxin-producing E.coli o104 (stec o104:h4) infections associated with travel to germany. http:\/\/www.cdc.gov\/ecoli\/2011\/ecolio104\/index.html","key":"27_CR2"},{"unstructured":"Report of the August 2010 Multi-Agency Workshop on InfoSymbiotics\/DDDAS, The Power of Dynamic Data Driven Applications Systems. Workshop sponsored by: Air Force Office of Scientific Research and National Science Foundation","key":"27_CR3"},{"key":"27_CR4","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/78.978374","volume":"50","author":"MS Arulampalam","year":"2002","unstructured":"M.S. Arulampalam, S. Maskell, N. Gordon, A tutorial on particle filters for online nonlinear\/non-Gaussian bayesian tracking. IEEE Trans. Signal Process. 50, 174\u2013188 (2002)","journal-title":"IEEE Trans. Signal Process."},{"unstructured":"J. Burke, D. Estrin, M. Hansen, A. Parker, N. Ramanathan, S. Reddy, M.B. Srivastava, Participatory sensing, in Workshop on World-Sensor-Web (WSW\u201906): Mobile Device Centric Sensor Networks and Applications, 2006","key":"27_CR5"},{"key":"27_CR6","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1186\/1472-6947-10-14","volume":"10","author":"B Cakici","year":"2010","unstructured":"B. Cakici, K. Hebing, M. Gr\u00fcnewald, P. Saretok, A. Hulth, Case: a framework for computer supported outbreak detection. BMC Med. Inform. Decis. Mak. 10, 14 (2010)","journal-title":"BMC Med. Inform. Decis. Mak."},{"unstructured":"J. Chil\u00e8s, P. Delfiner, Geostatistics: Modeling Spatial Uncertainty. Wiley Series in Probability and Statistics (Wiley, New York, 2009)","key":"27_CR7"},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1007\/978-3-540-24688-6_86","volume-title":"Computational Science - ICCS 2004","author":"Frederica Darema","year":"2004","unstructured":"F. Darema, Dynamic data driven applications systems: a new paradigm for application simulations and measurements, in Computational Science \u2013 ICCS 2004. Lecture Notes in Computer Science, vol. 3038 (Springer, Berlin\/Heidelberg, 2004), pp. 662\u2013669"},{"doi-asserted-by":"crossref","unstructured":"F. Darema, InfoSymbioticSystems\/DDDAS and Large-Scale Dynamic Data and Large-Scale Big Computing for Smart Systems, in Proceedings of the 2016 Annual ACM Conference on Principles of Advanced Discrete Simulation, SIGSIM-PADS, Banff, Canada, 2016","key":"27_CR9","DOI":"10.1145\/2901378.2901405"},{"doi-asserted-by":"crossref","unstructured":"W. Du, M.J. Atallah, Secure multi-party computation problems and their applications: a review and open problems, in NSPW\u201901: Proceedings of the 2001 Workshop on New Security Paradigms, New York (ACM, 2001), pp. 13\u201322","key":"27_CR10","DOI":"10.1145\/508171.508174"},{"key":"27_CR11","first-page":"4052","volume-title":"Differential privacy, in Automata, Languages and Programming, Pt 2","author":"C Dwork","year":"2006","unstructured":"C. Dwork, Differential privacy, in Automata, Languages and Programming, Pt 2 (Springer, Berlin\/Heidelberg, 2006), p. 4052"},{"doi-asserted-by":"crossref","unstructured":"C. Dwork, Differential privacy: a survey of results, in TAMC ed. by M. Agrawal, D.-Z. Du, Z. Duan, A. Li. Lecture Notes in Computer Science, vol. 4978 (Springer, Berlin, Heidelberg, 2008), pp. 1\u201319","key":"27_CR12","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"27_CR13","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"C. Dwork, A firm foundation for private data analysis. Commun. ACM 54, 86\u201395 (2011)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"C. Dwork, F. McSherry, K. Nissim, A. Smith, Calibrating noise to sensitivity in private data analysis, in 3rd Theory of Cryptography Conference, New York, US, 2006","key":"27_CR14","DOI":"10.1007\/11681878_14"},{"issue":"9","key":"27_CR15","doi-asserted-by":"publisher","first-page":"2094","DOI":"10.1109\/TKDE.2013.96","volume":"26","author":"L Fan","year":"2014","unstructured":"L. Fan, L. Xiong, An adaptive approach to real-time aggregate monitoring with differential privacy. IEEE Trans. Knowl. Data Eng. 26(9), 2094\u20132106 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"L. Fan, L. Bonomi,L. Xiong, V. Sunderam, Monitoring web browsing behaviors with differential privacy, in World Wide Web Conference (WWW\u201914), Seoul, Korea, 2014","key":"27_CR16","DOI":"10.1145\/2566486.2568038"},{"key":"27_CR17","first-page":"33","volume-title":"Lecture Notes in Computer Science","author":"Liyue Fan","year":"2013","unstructured":"L. Fan, L. Xiong, V. Sunderam, Differentially private multi-dimensional time-series release for traffic monitoring, in 27th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), Newark, US, 2013"},{"key":"27_CR18","first-page":"2169","volume-title":"Real-time aggregate monitoring with differential privacy, in CIKM,","author":"L Fan","year":"2012","unstructured":"L. Fan, L. Xiong, Real-time aggregate monitoring with differential privacy, in CIKM, Maui, US, 2012, pp. 2169\u20132173"},{"doi-asserted-by":"crossref","unstructured":"L. Fan, L. Xiong, V. Sunderam, Fast: differentially private real-time aggregate monitor with filtering and adaptive sampling (demonstration track), in ACM SIGMOD, New York, US, 2013","key":"27_CR19","DOI":"10.1145\/2463676.2465253"},{"issue":"4","key":"27_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1749603.1749605","volume":"42","author":"BCM Fung","year":"2010","unstructured":"B.C.M. Fung, K. Wang, R. Chen, P.S. Yu, Privacy-preserving data publishing: a survey on recent developments. ACM Comput. Surv. 42(4), 1\u201314 (2010)","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"27_CR21","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/2935694.2935700","volume":"44","author":"L Pournajaf","year":"2015","unstructured":"L. Pournajaf, L. Xiong, D.A. Garcia-Ulloa, V. Sunderam, Participant privacy in mobile crowd sensing task management: a survey of methods and challenges. ACM SIGMOD Rec. 44(4), 23\u201334 (2015)","journal-title":"ACM SIGMOD Rec."},{"doi-asserted-by":"crossref","unstructured":"L. Pournajaf, L. Xiong, V. Sunderam, S. Goryczka, Spatial task assignment for crowd sensing with cloaked locations, in IEEE 15th International Conference on Mobile Data Management (MDM), Melbourne, Australia, 2014","key":"27_CR22","DOI":"10.1109\/MDM.2014.15"},{"issue":"2","key":"27_CR23","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s00530-011-0245-x","volume":"18","author":"A Aved","year":"2012","unstructured":"A. Aved, K. Hua, A general framework for managing and processing live video data with privacy protection. Multimedia Systems 18(2), 123\u2013143 (2012)","journal-title":"Multimedia Systems"},{"doi-asserted-by":"crossref","unstructured":"Y. Badr, S. Hariri, Y. AlNashif, E. Blasch, Resilient and trustworthy dynamic data-driven application systems (DDDAS) services for crisis management environments, in Proceedings of the International Conference on Computational Science (ICCS), Reykjavik, Iceland, 2015","key":"27_CR24","DOI":"10.1016\/j.procs.2015.05.370"},{"key":"27_CR25","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1016\/j.procs.2014.05.117","volume":"29","author":"Erik Blasch","year":"2014","unstructured":"E. Blasch, Y.B. Al-Nashif, S. Hariri, Static versus dynamic data information fusion analysis using DDDAS for cyber security trust, in Proceedings of the International Conference on Computational Science (ICCS), Cairns, Australia, 2014","journal-title":"Procedia Computer Science"},{"issue":"6","key":"27_CR26","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MSP.2006.154","volume":"4","author":"SL Garfinkel","year":"2006","unstructured":"S.L. Garfinkel, M.D. Smith, Guest editors\u2019 introduction: data surveillance. IEEE Secur. Privacy 4(6), 15\u201317 (2006)","journal-title":"IEEE Secur. Privacy"},{"key":"27_CR27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography: Volume 2, Basic Applications","author":"O Goldreich","year":"2004","unstructured":"O. Goldreich, Foundations of Cryptography: Volume 2, Basic Applications (Cambridge University Press, New York, 2004)"},{"doi-asserted-by":"crossref","unstructured":"S. Goryczka, L. Xiong, B. Fung, m-privacy for collaborative data publishing, in IEEE Transactions on Data and Knowledge Engineering (TKDE), 26(10), 2520\u20132533 (2014)","key":"27_CR28","DOI":"10.1109\/TKDE.2013.18"},{"doi-asserted-by":"crossref","unstructured":"S. Goryczka, L. Xiong, V. Sunderam, Secure multiparty aggregation with differential privacy: a comparative study, in 6th International Workshop on Privacy and Anonymity in the Information Society (PAIS), Genoa, Italy, 2013","key":"27_CR29","DOI":"10.1145\/2457317.2457343"},{"key":"27_CR30","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/B978-012722442-8\/50011-2","volume-title":"Proceedings 2003 VLDB Conference","author":"Yannis Ioannidis","year":"2003","unstructured":"Y. Ioannidis, The history of histograms (abridged), in Proceedings of VLDB Conference, Trento, Italy, 2003"},{"issue":"1","key":"27_CR31","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1115\/1.3662552","volume":"82","author":"RE Kalman","year":"1960","unstructured":"R.E. Kalman, A new approach to linear filtering and prediction problems. J. Basic Eng 82(1), 35\u201345, 1960","journal-title":"J. Basic Eng"},{"key":"27_CR32","first-page":"809","volume":"97","author":"J Kang","year":"2012","unstructured":"J. Kang, K. Shilton, D. Estrin, J. Burke, M. Hansen, Self-surveillance privacy. Iowa Law Rev. 97, 809\u2013847 (2012)","journal-title":"Iowa Law Rev."},{"doi-asserted-by":"crossref","unstructured":"D. Kifer, A. Machanavajjhala, No free lunch in data privacy, in Proceedings of the 2011 International Conference on Management of Data, SIGMOD\u201911, Athens Greece, 2011","key":"27_CR33","DOI":"10.1145\/1989323.1989345"},{"doi-asserted-by":"crossref","unstructured":"Y. Lindell, B. Pinkas, Secure multiparty computation for privacy-preserving data mining. Cryptology ePrint Archive, Report 2008\/197, 2008. http:\/\/eprint.iacr.org\/","key":"27_CR34","DOI":"10.29012\/jpc.v1i1.566"},{"key":"27_CR35","first-page":"69","volume":"6","author":"J Liu","year":"2013","unstructured":"J. Liu, L. Xiong, J. Luo, J.Z. Huang, Privacy preserving distributed dbscan clustering. Trans. Data Privacy 6, 69\u201385 (2013)","journal-title":"Trans. Data Privacy"},{"key":"27_CR36","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850","volume-title":"Privacy integrated queries: an extensible platform for privacy-preserving data analysis, in SIGMOD,","author":"F McSherry","year":"2009","unstructured":"F. McSherry, Privacy integrated queries: an extensible platform for privacy-preserving data analysis, in SIGMOD, Providence, US, 2009"},{"doi-asserted-by":"crossref","unstructured":"M. Mun, S. Reddy, K. Shilton, N. Yau, J. Burke, D. Estrin, M. Hansen, E. Howard, R. West, P. Boda, Peir, the personal environmental impact report, as a platform for participatory sensing systems research, in Proceedings of the 7th International Conference on Mobile Systems, Applications, Services, MobiSys, Krakow, Poland, 2009","key":"27_CR37","DOI":"10.1145\/1555816.1555823"},{"key":"27_CR38","volume-title":"Differentially private aggregation of distributed time-series with transformation and encryption, in SIGMOD,","author":"V Rastogi","year":"2010","unstructured":"V. Rastogi, S. Nath, Differentially private aggregation of distributed time-series with transformation and encryption, in SIGMOD, Indianapolis, US, 2010"},{"doi-asserted-by":"crossref","unstructured":"D. Shepard, A two-dimensional interpolation function for irregularly-spaced data, in Proceedings of the 1968 23rd ACM National Conference, ACM\u201968, 1968, pp. 517\u2013524","key":"27_CR39","DOI":"10.1145\/800186.810616"},{"key":"27_CR40","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/1592761.1592778","volume":"52","author":"K Shilton","year":"2009","unstructured":"K. Shilton, Four billion little brothers? Privacy, mobile phones, and ubiquitous data collection. Commun. ACM 52, 48\u201353 (2009)","journal-title":"Commun. ACM"},{"unstructured":"M.M. Wagner, A.W. Moore, R.M. Aryel (eds.), Elsevier Academic Press. 2011","key":"27_CR41"},{"key":"27_CR42","first-page":"150","volume-title":"Lecture Notes in Computer Science","author":"Yonghui Xiao","year":"2010","unstructured":"Y. Xiao, L. Xiong, C. Yuan, Differentially private data release through multidimensional partitioning, in Secure Data Management, at VLDB, Singapore, 2010, pp. 150\u2013168"},{"issue":"1","key":"27_CR43","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1177\/003335491012500115","volume":"125","author":"W Yih","year":"2010","unstructured":"W. Yih, S. Deshpande, C. Fuller, D. Heisey-Grove, J. Hsu, B. Kruskal, M. Kulldorff, M. Leach, J. Nordin, J. Patton-Levine, E. Puga, E. Sherwood, I. Shui, R. Platt, Evaluating real-time syndromic surveillance signals from ambulatory care data in four states. Public Health Rep. 125(1), 111\u2013120 (2010)","journal-title":"Public Health Rep."}],"container-title":["Handbook of Dynamic Data Driven Applications Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95504-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T17:21:18Z","timestamp":1572628878000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-95504-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319955032","9783319955049"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95504-9_27","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}