{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:22Z","timestamp":1725562402142},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221258"},{"type":"electronic","value":"9783540259527"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25952-7_11","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T00:17:37Z","timestamp":1281313057000},"page":"146-162","source":"Crossref","is-referenced-by-count":3,"title":["The Architecture of the Cornell Knowledge Broker"],"prefix":"10.1007","author":[{"given":"Alan","family":"Demers","sequence":"first","affiliation":[]},{"given":"Johannes","family":"Gehrke","sequence":"additional","affiliation":[]},{"given":"Mirek","family":"Riedewald","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"11_CR1","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N.R. Adam","year":"1989","unstructured":"Adam, N.R., Wortmann, J.C.: Security-control methods for statistical databases: A comparative study. ACM Computing Surveys\u00a021(4), 515\u2013556 (1989)","journal-title":"ACM Computing Surveys"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proc. ACM SIGMOD Int. Conf. on Management of Data, pp. 439\u2013450 (2000)","DOI":"10.1145\/342009.335438"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Aguilera, M.K., Strom, R.E., Sturman, D.C., Astley, M., Chandra, T.D.: Matching events in a content-based subscription system. In: Proc. ACM Symp. on Principles of Distributed Computing (PODC), pp. 53\u201361 (1999)","DOI":"10.1145\/301308.301326"},{"key":"11_CR4","unstructured":"Arasu, A., Babu, S., Widom, J.: The CQL continuous query language: Semantic foundations and query execution. Technical report, Stanford University (2003)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Babcock, B., Babu, S., Datar, M., Motwani, R., Widom, J.: Models and issues in data stream systems. In: Proc. Symp. on Principles of Database Systems (PODS), pp. 1\u201316 (2002)","DOI":"10.1145\/543613.543615"},{"key":"11_CR6","unstructured":"Babcock, B., Datar, M., Motwani, R.: Load shedding techniques for data stream systems (short paper). In: Proc. Workshop on Management and Processing of Data Streams, MPDS (2003)"},{"issue":"3","key":"11_CR7","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/603867.603884","volume":"30","author":"S. Babu","year":"2001","unstructured":"Babu, S., Widom, J.: Continuous queries over data streams. ACM SIGMOD Record\u00a030(3), 109\u2013120 (2001)","journal-title":"ACM SIGMOD Record"},{"issue":"7","key":"11_CR8","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1016\/0306-4379(95)00029-4","volume":"20","author":"E. Bertino","year":"1995","unstructured":"Bertino, E., Jajodia, S., Samarati, P.: Database security: Research and practice. Information Systems\u00a020(7), 537\u2013556 (1995)","journal-title":"Information Systems"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/3-540-44498-X_1","volume-title":"Mobile Data Management","author":"P. Bonnet","year":"2000","unstructured":"Bonnet, P., Gehrke, J., Seshadri, P.: Towards sensor database systems. In: Tan, K.-L., Franklin, M.J., Lui, J.C.-S. (eds.) MDM 2001. LNCS, vol.\u00a01987, pp. 3\u201314. Springer, Heidelberg (2000)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Buneman, P., Khanna, S., Tajima, K., Tan, W.C.: Archiving scientific data. In: Proc. SIGMOD, pp. 1\u201312 (2002)","DOI":"10.1145\/564691.564693"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-44503-X_20","volume-title":"Database Theory - ICDT 2001","author":"P. Buneman","year":"2000","unstructured":"Buneman, P., Khanna, S., Tan, W.C.: Why and where: A characterization of data provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol.\u00a01973, pp. 316\u2013330. Springer, Heidelberg (2000)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Carney, D., \u00c7etintemel, U., Cherniack, M., Convey, C., Lee, S., Seidman, G., Stonebraker, M., Tatbul, N., Zdonik, S.: Monitoring streams \u2013 a new class of data management applications. In: Proc. Int. Conf. on Very Large Databases, VLDB (2002)","DOI":"10.1016\/B978-155860869-6\/50027-5"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Carzaniga, A., Rosenblum, D.S., Wolf, A.L.: Achieving scalability and expressiveness in an internet-scale event notification service. In: Proc. ACM Symp. on Principles of Distributed Computing (PODC), pp. 219\u2013227 (2000)","DOI":"10.1145\/343477.343622"},{"key":"11_CR14","unstructured":"Chakravarthy, S., Krishnaprasad, V., Anwar, E., Kim, S.-K.: Composite events for active databases: Semantics, contexts and detection. In: Proc. Int. Conf. on Very Large Databases (VLDB), pp. 606\u2013617 (1994)"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Chandrasekaran, S., Cooper, O., Deshpande, A., Franklin, M.J., Hellerstein, J.M., Hong, W., Krishnamurthy, S., Madden, S.R., Raman, V., Reiss, F., Shah, M.A.: TelegraphCQ: Continuous dataflow processing for an uncertain world. In: Proc. Conf. on Innovative Data Systems Research, CIDR (2003)","DOI":"10.1145\/872757.872857"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Chen, J., DeWitt, D.J., Tian, F., Wang, Y.: NiagaraCQ: A scalable continuous query system for internet databases. In: Proc. ACM SIGMOD Int. Conf. on Management of Data, pp. 379\u2013390 (2000)","DOI":"10.1145\/342009.335432"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Das, A., Gehrke, J., Riedewald, M.: Approximate join processing over data streams. In: Proc. ACM SIGMOD Int. Conf. on Management of Data, pp. 40\u201351 (2003)","DOI":"10.1145\/872757.872765"},{"key":"11_CR18","unstructured":"Demers, A., Gehrke, J., Riedewald, M.: Research issues in mining and monitoring of intelligence data. In: Kargupta, H., Joshi, A., Sivakumar, K., Yesha, Y. (eds.) Data Mining: Next Generation Challenges and Future Directions, MIT\/AAAI Press (2004) (to be released)"},{"key":"11_CR19","volume-title":"Proceedings of the 30th Hawaii International Conference on System Sciences","author":"G.T. Duncan","year":"1997","unstructured":"Duncan, G.T., Krishnan, R., Padman, R., Reuther, P., Roehrig, S.: Cell suppression to limit content-based disclosure. In: Proceedings of the 30th Hawaii International Conference on System Sciences, vol.\u00a03, IEEE Computer Society Press, Los Alamitos (1997)"},{"issue":"451","key":"11_CR20","doi-asserted-by":"publisher","first-page":"720","DOI":"10.2307\/2669452","volume":"95","author":"G.T. Duncan","year":"2000","unstructured":"Duncan, G.T., Mukherjee, S.: Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise. Journal of the American Statistical Association\u00a095(451), 720\u2013729 (2000)","journal-title":"Journal of the American Statistical Association"},{"issue":"4","key":"11_CR21","first-page":"537","volume":"14","author":"T. Evans","year":"1998","unstructured":"Evans, T., Zayatz, L., Slanta, J.: Using noise for disclosure limitation of establishment tabular data. Journal of Official Statistics\u00a014(4), 537\u2013551 (1998)","journal-title":"Journal of Official Statistics"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: Proc. ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining (2002)","DOI":"10.1145\/775047.775080"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proceedings of the 22nd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, PODS 2003 (2003)","DOI":"10.1145\/773153.773174"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery in Databases and Data Mining, Edmonton, Alberta, Canada, July 23-26, pp. 217\u2013228 (2002)","DOI":"10.1145\/775047.775080"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Fabret, F., Jacobsen, H.-A., Llirbat, F., Pereira, J., Ross, K.A., Shasha, D.: Filtering algorithms and implementation for very fast publish\/subscribe. In: Proc. ACM SIGMOD Int. Conf. on Management of Data, pp. 115\u2013126 (2001)","DOI":"10.1145\/375663.375677"},{"issue":"4","key":"11_CR26","first-page":"485","volume":"14","author":"S.E. Fienberg","year":"1998","unstructured":"Fienberg, S.E., Makov, U.E., Steele, R.J.: Disclosure limitation using perturbation and related methods for categorical data. Journal of Official Statistics\u00a014(4), 485\u2013502 (1998)","journal-title":"Journal of Official Statistics"},{"key":"11_CR27","unstructured":"Gehrke, J. (ed.): Special Issue on Privacy and Security. SIGKDD Explorations, vol.\u00a04 (2002)"},{"issue":"4","key":"11_CR28","first-page":"463","volume":"14","author":"J.M\u0303. Gouweleeuw","year":"1998","unstructured":"Gouweleeuw, J.M\u0303., Kooiman, P., Willenborg, L.C.R.J\u0303., de Wolf, P.-P.: Post randomisation for statistical disclosure control: Theory and implementation. Journal of Official Statistics\u00a014(4), 463\u2013478 (1998)","journal-title":"Journal of Official Statistics"},{"volume-title":"Materialized Views: Techniques, Implementations, and Applications","year":"1998","key":"11_CR29","unstructured":"Gupta, A., Mumick, I.S. (eds.): Materialized Views: Techniques, Implementations, and Applications. MIT Press, Cambridge (1998)"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Hopcroft, J.E., Khan, O., Kulis, B., Selman, B.: Natural communities in large linked networks. In: Proc. ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 541\u2013546 (2003)","DOI":"10.1145\/956750.956816"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery in Databases and Data Mining, Edmonton, Alberta, Canada, July 23-26, pp. 279\u2013288 (2002)","DOI":"10.1145\/775047.775089"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Joachims, T.: Optimizing search engines using clickthrough data. In: Proc. ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 133\u2013142 (2002)","DOI":"10.1145\/775047.775067"},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Kang, J., Naughton, J.F., Viglas, S.D.: Evaluating window joins over unbounded streams. In: Proc. Int. Conf. on Data Engineering, ICDE (2003)","DOI":"10.1109\/ICDE.2003.1260804"},{"key":"11_CR34","volume-title":"The Data Warehouse Toolkit","author":"R. Kimball","year":"1996","unstructured":"Kimball, R.: The Data Warehouse Toolkit. John Wiley and Sons, Chichester (1996)"},{"issue":"4","key":"11_CR35","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1023\/A:1024940629314","volume":"7","author":"J.M. Kleinberg","year":"2003","unstructured":"Kleinberg, J.M.: Bursty and hierarchical structure in streams. Data Mining and Knowledge Discovery\u00a07(4), 373\u2013397 (2003)","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"3","key":"11_CR36","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s00145-001-0019-2","volume":"15","author":"Y. Lindell","year":"2002","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. Journal of Cryptology\u00a015(3), 177\u2013206 (2002)","journal-title":"Journal of Cryptology"},{"key":"11_CR37","doi-asserted-by":"crossref","unstructured":"Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: The design of an acquisitional query processor for sensor networks. In: Proc. ACM SIGMOD Int. Conf. on Management of Data, pp. 491\u2013502 (2003)","DOI":"10.1145\/872757.872817"},{"issue":"3-4","key":"11_CR38","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1023\/A:1008231404725","volume":"7","author":"I. Motakis","year":"1997","unstructured":"Motakis, I., Zaniolo, C.: Formal semantics for composite temporal events in active database rules. Journal of Systems Integration\u00a07(3-4), 291\u2013325 (1997)","journal-title":"Journal of Systems Integration"},{"key":"11_CR39","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1109\/HICSS.1997.661702","volume-title":"Proceedings of the 30th Hawaii International Conference on System Sciences","author":"S. Mukherjee","year":"1997","unstructured":"Mukherjee, S., Duncan, G.T.: Disclosure limitation through additive noise data masking: Analysis of skewed sensitive data. In: Proceedings of the 30th Hawaii International Conference on System Sciences, vol.\u00a03, pp. 581\u2013586. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"11_CR40","doi-asserted-by":"crossref","unstructured":"Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information. In: Proceedings of the 17th ACM Symposium on Principles of Database Systems, Seattle, Washington, USA, June 1-3 (1998)","DOI":"10.1145\/275487.275508"},{"key":"11_CR41","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, USA (May 1998)"},{"key":"11_CR42","doi-asserted-by":"crossref","unstructured":"Tatbul, N., \u00c7etintemel, U., Zdonik, S., Cherniack, M., Stonebraker, M.: In: Proc. Int. Conf. on Very Large Databases (VLDB), pp. 309\u2013320 (2003)","DOI":"10.1016\/B978-012722442-8\/50035-5"},{"key":"11_CR43","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: Proc. ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 23\u201326 (2002)","DOI":"10.1145\/775047.775142"},{"key":"11_CR44","unstructured":"Yalamanchi, A., Srinivasan, J., Gawlick, D.: Managing expressions as data in relational database systems. In: Proc. Conf. on Innovative Data Systems Research, CIDR (2003)"},{"key":"11_CR45","doi-asserted-by":"crossref","unstructured":"Yu, T., Srivastava, D., Lakshmanan, L.V.S., Jagadish, H.V.: Compressed accessibility map: Efficient access control for xml. In: Proc. VLDB, pp. 478\u2013489 (2002)","DOI":"10.1016\/B978-155860869-6\/50049-4"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25952-7_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:59:42Z","timestamp":1605761982000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25952-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221258","9783540259527"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}