{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:43:20Z","timestamp":1725518600071},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540874706"},{"type":"electronic","value":"9783540874713"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87471-3_22","type":"book-chapter","created":{"date-parts":[[2008,9,20]],"date-time":"2008-09-20T08:00:36Z","timestamp":1221897636000},"page":"257-269","source":"Crossref","is-referenced-by-count":5,"title":["Reasoning under Uncertainty in On-Line Auditing"],"prefix":"10.1007","author":[{"given":"Gerardo","family":"Canfora","sequence":"first","affiliation":[]},{"given":"Bice","family":"Cavallo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N.R. Adam","year":"1989","unstructured":"Adam, N.R., Wormann, J.C.: Security-control methods for statistical databases: A comparative study. ACM Comput. Surv.\u00a021, 515\u2013556 (1989)","journal-title":"ACM Comput. Surv."},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1109\/ARES.2008.94","volume-title":"Proceedings of the Third International Conference on Availability, Reliability and Security (ARES)","author":"G. Canfora","year":"2008","unstructured":"Canfora, G., Cavallo, B.: A bayesian approach for on-line max auditing. In: Proceedings of the Third International Conference on Availability, Reliability and Security (ARES), pp. 1020\u20131027. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Canfora, G., Cavallo, B.: A bayesian approach for on-line max and min auditing. In: Post-Proceedings of the 2008 International workshop on Privacy and Anonymity in Information Society (PAIS). ACM International Conference Proceeding, vol.\u00a0261, pp. 12\u201320 (2008)","DOI":"10.1145\/1379287.1379292"},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1145\/5925.5928","volume":"33","author":"F.Y. Chin","year":"1986","unstructured":"Chin, F.Y.: Security problems on inference control for sum, max, and min queries. Journal of the ACM\u00a033, 451\u2013464 (1986)","journal-title":"Journal of the ACM"},{"key":"22_CR5","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/320064.320068","volume":"4","author":"D. Dobkin","year":"1979","unstructured":"Dobkin, D., Jones, A., Lipton, R.: Secure Databases: Protection against User Influence. ACM Trans. Database Syst.\u00a04, 97\u2013106 (1979)","journal-title":"ACM Trans. Database Syst."},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Heckerman, D.: Causal independence for knowledge acquisition and inference. In: Proceedings of Ninth Conference on Uncertainty in Artificial Intelligence, pp. 122\u2013127 (1993)","DOI":"10.1016\/B978-1-4832-1451-1.50019-6"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Kenthapadi, K., Mishra, N., Nissim, K.: Simulatable auditing. In: PODS, pp. 118\u2013127 (2005)","DOI":"10.1145\/1065167.1065183"},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/S0022-0000(02)00036-3","volume":"66","author":"J. Kleinberg","year":"2003","unstructured":"Kleinberg, J., Papadimitriou, C., Raghavan, P.: Auditing boolean attributes. Journal of Computer and System Sciences\u00a066, 244\u2013253 (2003)","journal-title":"Journal of Computer and System Sciences"},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1127345.1127347","volume":"9","author":"F.M. Malvestuto","year":"2006","unstructured":"Malvestuto, F.M., Mezzini, M., Moscarini, M.: Auditing sum-queries to make a statistical database secure. ACM Transactions on Information and System Security\u00a09, 31\u201360 (2006)","journal-title":"ACM Transactions on Information and System Security"},{"key":"22_CR10","unstructured":"Nabar, S.U., Marthi, B., Kenthapadi, K., Mishra, N., Motwani, R.: Towards robustness in query auditing. In: 32 nd International Conference on Very Large Data Bases, pp. 151\u2013162 (2006)"},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1080\/08839518908949933","volume":"3","author":"K.G. Olesen","year":"1989","unstructured":"Olesen, K.G., Kjaerulff, U., Jensen, F., Jensen, F.V., Falck, B., Andreassen, S., Andersen, S.K.: A munin network for the median nerve-a case study in loops. Applied Artificial Intelligence\u00a03, 385\u2013403 (1989)","journal-title":"Applied Artificial Intelligence"},{"key":"22_CR12","volume-title":"Probabilistic reasoning in intelligent systems: networks of plausible inference","author":"J. Pearl","year":"1988","unstructured":"Pearl, J.: Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan Kaufmann, San Francisco (1988)"},{"key":"22_CR13","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/322108.322113","volume":"26","author":"S.P. Reiss","year":"1979","unstructured":"Reiss, S.P.: Security in databases: A combinatorial study. Journal of the ACM\u00a026, 45\u201357 (1979)","journal-title":"Journal of the ACM"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Srinivas, S.: A generalization of the noise-or-model. In: Ninth Annual Conference of Uncertainty on AI, pp. 208\u2013218 (1993)","DOI":"10.1016\/B978-1-4832-1451-1.50030-5"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Watnik, M.R.: Pay for play: Are baseball salaries based on performance? Journal of Statistics Education\u00a06 (1998)","DOI":"10.1080\/10691898.1998.11910618"}],"container-title":["Lecture Notes in Computer Science","Privacy in Statistical Databases"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87471-3_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:37:53Z","timestamp":1606185473000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87471-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540874706","9783540874713"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87471-3_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}