{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:28:45Z","timestamp":1742912925160,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642175688"},{"type":"electronic","value":"9783642175695"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17569-5_44","type":"book-chapter","created":{"date-parts":[[2010,11,26]],"date-time":"2010-11-26T06:24:09Z","timestamp":1290752649000},"page":"450-458","source":"Crossref","is-referenced-by-count":0,"title":["A Privacy Preserving Service Broker Architecture for Data Sharing"],"prefix":"10.1007","author":[{"given":"Fahed","family":"Al-Neyadi","sequence":"first","affiliation":[]},{"given":"Jemal","family":"Abawajy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"44_CR1","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1197\/jamia.M1345","volume":"10","author":"F.-C. Tsui","year":"2003","unstructured":"Tsui, F.-C., Espino, J.U., Dato, V.M., Gesteland, P.H., Hutman, J., Wagner, M.M.: Technical description of RODS: A real-time public health surveillance system. J. Am. Med. Inform. Assoc.\u00a010(5), 399\u2013408 (2003)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"44_CR2","unstructured":"Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: A distributed architecture for secure database services. In: CIDR, pp. 186\u2013199 (2005)"},{"key":"44_CR3","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1145\/301250.301312","volume-title":"Proc. of the thirty-first annual ACM symposium on Theory of computing","author":"M. Naor","year":"1999","unstructured":"Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: Proc. of the thirty-first annual ACM symposium on Theory of computing, pp. 245\u2013254. ACM Press, New York (1999)"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Siegenthaler, M., Birman, K.: Sharing Private Information Across Distributed Databases. In: Eighth IEEE International Symposium on Network Computing and Applications, pp. 82\u201389 (2009)","DOI":"10.1109\/NCA.2009.33"},{"key":"44_CR5","doi-asserted-by":"crossref","unstructured":"LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D.: Limiting disclosure in hippocratic databases. In: VLDB 2004: Proceedings of the Thirtieth international conference on Very large data bases. VLDB Endowment, pp. 108\u2013119 (2004)","DOI":"10.1016\/B978-012088469-8.50013-9"},{"issue":"5","key":"44_CR6","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Chen, B., Kifer, D., Lefevre, K., Machanavajjhala, A.: Privacy-Preserving Data Publishing (Survey). Foundations and Trends in Databases, vol.\u00a02, pp. 1\u2013167 (2009)","DOI":"10.1561\/1900000008"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: Proceedings of SIGMOD (2000)","DOI":"10.1145\/342009.335438"},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Hu, N.: Privacy-Preserving Query Checking in Query Middleware, fskd In: 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery, vol.\u00a01, pp. 590\u2013594 (2009)","DOI":"10.1109\/FSKD.2009.25"},{"key":"44_CR10","doi-asserted-by":"crossref","unstructured":"Al-Nayadi, F., Abawajy, J.H., Deris, M.M.: A Conceptual Framework for Ubiquitously Sharing Heterogeneous Patient Information among Autonomous Healthcare Providers. In: International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), pp. 299\u2013306 (2007)","DOI":"10.1109\/MUE.2007.7"},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"Rezgui, A., Ouzzani, M., Bouguettaya, A., Medjahed, B.: Preserving Privacy in WebServices. In: Proceedings of the Workshop on Web Information and Data Management (WIDM 2002), pp. 56\u201362 (2002)","DOI":"10.1145\/584931.584944"},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the sulq framework. In: PODS, pp. 128\u2013138 (2005)","DOI":"10.1145\/1065167.1065184"},{"key":"44_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/978-3-540-28628-8_32","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"C. Dwork","year":"2004","unstructured":"Dwork, C., Nissim, K.: Privacy-preserving Data Mining on Vertically Partitioned Databases. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 528\u2013544. Springer, Heidelberg (2004)"},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"Mitra, P., Pan, C.-C., Liu, P., Atluri, V.: Privacy preserving semantic interoperation and access control of heterogeneous databases. In: Proc. ACM Conf. on Computer and Communications Security, pp. 66\u201377 (2006)","DOI":"10.1145\/1128817.1128831"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D.: l-Diversity: Privacy beyond k-anonymity. In: International Conference on Data Engineering (ICDE), pp. 24\u201324 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"44_CR16","doi-asserted-by":"crossref","unstructured":"Emekci, F., Agrawal, D., Abbadi, A.E., G\u00fclbeden, A.: Privacy Preserving Query Processing using Third Parties. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006 (2006)","DOI":"10.1109\/ICDE.2006.116"},{"key":"44_CR17","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database service provider model. In: SIGMOD Conference (2002)","DOI":"10.1145\/564691.564717"},{"key":"44_CR18","doi-asserted-by":"crossref","unstructured":"Hore, B., Mehrotra, S., Tsudik, G.: A privacypreserving index for range queries. In: Proc. of the 30th Int\u2019l Conference on Very Large Databases VLDB, pp. 720\u2013731 (2004)","DOI":"10.1016\/B978-012088469-8.50064-4"}],"container-title":["Lecture Notes in Computer Science","Future Generation Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17569-5_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,14]],"date-time":"2021-11-14T05:19:22Z","timestamp":1636867162000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17569-5_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642175688","9783642175695"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17569-5_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}