{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:47:24Z","timestamp":1725511644408},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540788485"},{"type":"electronic","value":"9783540788492"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78849-2_37","type":"book-chapter","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T13:49:01Z","timestamp":1209390541000},"page":"359-370","source":"Crossref","is-referenced-by-count":0,"title":["Verification of the Security Against Inference Attacks on XML Databases"],"prefix":"10.1007","author":[{"given":"Kenji","family":"Hashimoto","sequence":"first","affiliation":[]},{"given":"Fumikazu","family":"Takasuka","sequence":"additional","affiliation":[]},{"given":"Kimihide","family":"Sakano","sequence":"additional","affiliation":[]},{"given":"Yasunori","family":"Ishihara","sequence":"additional","affiliation":[]},{"given":"Toru","family":"Fujiwara","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: \u2113-diversity: Privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, p. 24 (2006)","key":"37_CR1","DOI":"10.1109\/ICDE.2006.1"},{"unstructured":"Clark, J., Murata, M.: RELAX NG (2001), http:\/\/www.oasis-open.org\/committees\/relax-ng\/spec-20011203.html","key":"37_CR2"},{"key":"37_CR3","volume-title":"Cryptography and Data Security","author":"D.E.R. Denning","year":"1982","unstructured":"Denning, D.E.R.: Cryptography and Data Security. Addison-Wesley, Reading (1982)"},{"issue":"6","key":"37_CR4","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/69.895801","volume":"12","author":"A. Brodsky","year":"2000","unstructured":"Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Transactions on Knowledge and Data Engineering\u00a012(6), 900\u2013919 (2000)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"37_CR5","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-0-387-35587-0_13","volume-title":"Databases and Application Security","author":"C. Farkas","year":"2002","unstructured":"Farkas, C., Toland, T., Eastman, C.: The inference problem and updates in relational databases. In: Databases and Application Security, vol.\u00a0XV, pp. 181\u2013194. Kluwer, Dordrecht (2002)"},{"doi-asserted-by":"crossref","unstructured":"Morgenstern, M.: Security and inference in multilevel database and knowledge-base systems. In: Proceedings of the 1987 ACM SIGMOD International Conference on Management of Data, pp. 357\u2013373 (1987)","key":"37_CR6","DOI":"10.1145\/38713.38752"},{"key":"37_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/10719724_28","volume-title":"Information Hiding","author":"I. Moskowitz","year":"2000","unstructured":"Moskowitz, I., Chang, L.: An entropy-based framework for database inference. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 405\u2013418. Springer, Heidelberg (2000)"},{"doi-asserted-by":"crossref","unstructured":"Zhang, K.: IRI: A quantitative approach to inference analysis in relational databases. In: Database Security, vol. XI, pp. 279\u2013290 (1998)","key":"37_CR8","DOI":"10.1007\/978-0-387-35285-5_17"},{"doi-asserted-by":"crossref","unstructured":"Deutsch, A., Papakonstantinou, Y.: Privacy in database publishing. In: Proceedings of the Tenth International Conference on Database Theory, pp. 230\u2013245 (2005)","key":"37_CR9","DOI":"10.1007\/978-3-540-30570-5_16"},{"issue":"3","key":"37_CR10","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.jcss.2006.10.004","volume":"73","author":"G. Miklau","year":"2007","unstructured":"Miklau, G., Suciu, D.: A formal analysis of information disclosure in data exchange. Journal of Computer and System Sciences\u00a073(3), 507\u2013534 (2007)","journal-title":"Journal of Computer and System Sciences"},{"issue":"5","key":"37_CR11","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Personalized privacy preservation. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 229\u2013240 (2006)","key":"37_CR12","DOI":"10.1145\/1142473.1142500"},{"doi-asserted-by":"crossref","unstructured":"Fan, W., Chan, C.Y., Garofalakis, M.N.: Secure XML querying with security views. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, pp. 587\u2013598 (2004)","key":"37_CR13","DOI":"10.1145\/1007568.1007634"},{"doi-asserted-by":"crossref","unstructured":"Yang, X., Li, C.: Secure XML publishing without information leakage in the presence of data inference. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, pp. 96\u2013107 (2004)","key":"37_CR14","DOI":"10.1016\/B978-012088469-8.50012-7"},{"issue":"1","key":"37_CR15","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/507338.507360","volume":"31","author":"D. Suciu","year":"2002","unstructured":"Suciu, D.: The XML typechecking problem. SIGMOD Record\u00a031(1), 89\u201396 (2002)","journal-title":"SIGMOD Record"}],"container-title":["Lecture Notes in Computer Science","Progress in WWW Research and Development"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78849-2_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:02:23Z","timestamp":1619521343000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78849-2_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540788485","9783540788492"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78849-2_37","relation":{},"subject":[]}}