{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:19:45Z","timestamp":1772065185826,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540245735","type":"print"},{"value":"9783540305767","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30576-7_20","type":"book-chapter","created":{"date-parts":[[2010,7,4]],"date-time":"2010-07-04T19:03:26Z","timestamp":1278270206000},"page":"363-385","source":"Crossref","is-referenced-by-count":141,"title":["Toward Privacy in Public Databases"],"prefix":"10.1007","author":[{"given":"Shuchi","family":"Chawla","sequence":"first","affiliation":[]},{"given":"Cynthia","family":"Dwork","sequence":"additional","affiliation":[]},{"given":"Frank","family":"McSherry","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Hoeteck","family":"Wee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Aggarwal, C.: On the Design and Quantification of Privacy Preserving Data Mining Algorithms. In: Proceedings of the 20th Symposium on Principles of Database Systems (2001)","DOI":"10.1145\/375551.375602"},{"issue":"4","key":"20_CR2","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N.R. Adam","year":"1989","unstructured":"Adam, N.R., Wortmann, J.C.: Security-Control Methods for Statistical Databases. A Comparative Study, ACM Computing Surveys\u00a021(4), 515\u2013556 (1989)","journal-title":"A Comparative Study, ACM Computing Surveys"},{"key":"20_CR3","unstructured":"Arora, S., Kannan, R.: Learning mixtures of arbitrary Gaussians. In: ACM STOC (2001)"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proc. of the ACM SIGMOD Conference on Management of Data, pp. 439\u2013450 (2000)","DOI":"10.1145\/342009.335438"},{"issue":"3","key":"20_CR5","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1145\/320613.320617","volume":"5","author":"L. Beck","year":"1980","unstructured":"Beck, L.: A security machanism for statistical database. ACM Transactions on Database Systems (TODS)\u00a05(3), 316\u2013338 (1980)","journal-title":"ACM Transactions on Database Systems (TODS)"},{"key":"20_CR6","unstructured":"Chawla, S., Dwork, C., McSherry, F., Talwar, K.: On the Utility of Privacy- Preserving Histograms (November 2004) (in preparation)"},{"key":"20_CR7","unstructured":"Cox, L.H.: New Results in Disclosure Avoidance for Tabulations. In: International Statistical Institute Proceedings of the 46th Session, Tokyo, pp. 83\u201384 (1987)"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Dasgupta, S.: Learning mixtures of Gaussians. In: IEEE FOCS (1999)","DOI":"10.1109\/SFFCS.1999.814639"},{"issue":"3","key":"20_CR9","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1145\/320613.320616","volume":"5","author":"D. Denning","year":"1980","unstructured":"Denning, D.: Secure statistical databases with random sample queries. ACM Transactions on Database Systems (TODS)\u00a05(3), 291\u2013315 (1980)","journal-title":"ACM Transactions on Database Systems (TODS)"},{"issue":"1","key":"20_CR10","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1214\/aos\/1030563990","volume":"26","author":"P. Diaconis","year":"1998","unstructured":"Diaconis, P., Sturmfels, B.: Algebraic Algorithms for Sampling from Conditional Distributions. Annals of Statistics\u00a026(1), 363\u2013397 (1998)","journal-title":"Annals of Statistics"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Proceedings of the Symposium on Principles of Database Systems, pp. 202\u2013210 (2003)","DOI":"10.1145\/773153.773173"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Dobra, A., Fienberg, S.E., Trottini, M.: Assessing the risk of disclosure of confidential categorical data, Bayesian Statistics 7, pp. 125\u2013144. Oxford University Press, Oxford (2000)","DOI":"10.1093\/oso\/9780198526155.003.0007"},{"key":"20_CR13","unstructured":"Dwork, C.: A Cryptography-Flavored Approach to Privacy in Public Databases. In: lecture at Aladdin Workshop on Privacy in DATA (March 2003), http:\/\/www.aladdin.cs.cmu.edu\/workshops\/privacy\/slides\/pdf\/dwork.pdf"},{"key":"20_CR14","unstructured":"Dwork, C., Naor, M., et al.: Impossibility Results for Privacy-Preserving Data Sanitization (2004) (in preparation)"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1007\/978-3-540-28628-8_32","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"C. Dwork","year":"2004","unstructured":"Dwork, C., Nissim, K.: Privacy-preserving datamining on vertically partitioned databases. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 528\u2013544. Springer, Heidelberg (2004)"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Evfimievski, A.V., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proceedings of the Symposium on Principles of Database Systems, pp. 211\u2013222 (2003)","DOI":"10.1145\/773153.773174"},{"issue":"3","key":"20_CR17","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/BF02579329","volume":"1","author":"Z. F\u00fcredi","year":"1981","unstructured":"F\u00fcredi, Z., Koml\u00f3s, J.: The eigenvalues of random symmetric matrices, Combinatorica. Combinatorica\u00a01(3), 233\u2013241 (1981)","journal-title":"Combinatorica"},{"key":"20_CR18","first-page":"72","volume":"82","author":"W. Gasarch","year":"2004","unstructured":"Gasarch, W.: A Survey on Private Information Retrieval. BEATCS Computational Complexity Column\u00a082, 72\u2013107 (2004)","journal-title":"BEATCS Computational Complexity Column"},{"key":"20_CR19","first-page":"332","volume-title":"Computers, Ethics, and Social Values","author":"R. Gavison","year":"1995","unstructured":"Gavison, R.: Privacy and the Limits of the Law. In: Johnson, D.G., Nissenbaum, H. (eds.) Computers, Ethics, and Social Values, pp. 332\u2013351. Prentice Hall, Englewood Cliffs (1995)"},{"key":"20_CR20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656","volume-title":"The Foundations of Cryptography","author":"O. Goldreich","year":"2004","unstructured":"Goldreich, O.: The Foundations of Cryptography, vol.\u00a02. Cambridge University Press, Cambridge (2004)"},{"issue":"2","key":"20_CR21","first-page":"270","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic Encryption. JCSS\u00a028(2), 270\u2013299 (1984)","journal-title":"JCSS"},{"issue":"3","key":"20_CR22","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1137\/0217034","volume":"17","author":"D. Gusfield","year":"1988","unstructured":"Gusfield, D.: A Graph Theoretic Approach to Statistical Data Security. SIAM Journal on Computing\u00a017(3), 552\u2013571 (1988)","journal-title":"SIAM Journal on Computing"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Indyk, P., Motwani, R.: Approximate Nearest Neighbor: Towards Removing the Curse of Dimensionality. In: Proceedings of the 30th Annual ACM Symposium on Theory of Computing (1998)","DOI":"10.1145\/276698.276876"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the Privacy Preserving Properties of Random Data Perturbation Techniques. In: Proceedings of the Third ICDM IEEE International Conference on Data Mining (2003)","DOI":"10.1109\/ICDM.2003.1250908"},{"issue":"1","key":"20_CR25","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/S0022-0000(02)00036-3","volume":"66","author":"J.M. Kleinberg","year":"2003","unstructured":"Kleinberg, J.M., Papadimitriou, C.H., Raghavan, P.: Auditing Boolean Attributes. J. Comput. Syst. Sci.\u00a066(1), 244\u2013253 (2003)","journal-title":"J. Comput. Syst. Sci."},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"McSherry, F.: Spectral Partitioning of Random Graphs. In: Proc. 42nd FOCS, pp. 529\u2013537 (2001)","DOI":"10.1109\/SFCS.2001.959929"},{"issue":"1","key":"20_CR27","first-page":"1","volume":"19","author":"T.E. Raghunathank","year":"2003","unstructured":"Raghunathank, T.E., Reiter, J.P., Rubin, D.B.: Multiple Imputation for Statistical Disclosure Limitation. J. Official Statistics\u00a019(1), 1\u201316 (2003)","journal-title":"J. Official Statistics"},{"key":"20_CR28","unstructured":"Roque, G.: Application and Analysis of the Mixture-of-Normals Approach to Masking Census Public-use Microdata (2003) (Manuscript)"},{"issue":"2","key":"20_CR29","first-page":"461","volume":"9","author":"D.B. Rubin","year":"1993","unstructured":"Rubin, D.B.: Discussion: Statistical Disclosure Limitation. Journal of Official Statistics\u00a09(2), 461\u2013468 (1993)","journal-title":"Journal of Official Statistics"},{"issue":"1","key":"20_CR30","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1093\/comjnl\/16.1.30","volume":"16","author":"R. Sibson","year":"1973","unstructured":"Sibson, R.: SLINK: an optimally efficient algorithm for the single-link cluster method. The Computer Journal\u00a016(1), 30\u201334 (1973)","journal-title":"The Computer Journal"},{"issue":"5","key":"20_CR31","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"issue":"5","key":"20_CR32","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 571\u2013588 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"20_CR33","doi-asserted-by":"crossref","unstructured":"Vempala, S., Wang, G.: A spectral algorithm for learning mixtures of distributions. In: IEEE FOCS (2002)","DOI":"10.1109\/SFCS.2002.1181888"},{"key":"20_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-540-25955-8_18","volume-title":"Privacy in Statistical Databases","author":"W.E. Winkler","year":"2004","unstructured":"Winkler, W.E.: Masking and re-identification methods for public-use microdata: Overview and research problems. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol.\u00a03050, pp. 231\u2013246. Springer, Heidelberg (2004)"},{"key":"20_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-540-25955-8_17","volume-title":"Privacy in Statistical Databases","author":"W.E. Winkler","year":"2004","unstructured":"Winkler, W.E.: Re-identification methods for masked microdata. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol.\u00a03050, pp. 216\u2013230. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Theory of Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30576-7_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T00:44:22Z","timestamp":1711586662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30576-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540245735","9783540305767"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30576-7_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}