{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:32:52Z","timestamp":1725593572556},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223471"},{"type":"electronic","value":"9783642223488"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22348-8_12","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T17:59:57Z","timestamp":1309283997000},"page":"138-153","source":"Crossref","is-referenced-by-count":8,"title":["Query Processing in Private Data Outsourcing Using Anonymization"],"prefix":"10.1007","author":[{"given":"Ahmet Erhan","family":"Nergiz","sequence":"first","affiliation":[]},{"given":"Chris","family":"Clifton","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Aggarwal, G., Bawa, M., Ganesan, P., Garcia-molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: A distributed architecture for secure database services. In: Proc. CIDR (2005)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 1\u201315. Springer, Heidelberg (1996)"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/978-3-642-04444-1_27","volume-title":"Computer Security \u2013 ESORICS 2009","author":"V. Ciriani","year":"2009","unstructured":"Ciriani, V., De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Keep a few: outsourcing data while maintaining confidentiality. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 440\u2013455. Springer, Heidelberg (2009)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Damiani, E., Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational dbmss. In: ACM CCS 2003, Washington D.C., USA, pp. 93\u2013102 (2003)","DOI":"10.1145\/948109.948124"},{"key":"12_CR5","series-title":"Springer Texts in Statistics","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-1-4419-5780-1_2","volume-title":"Fundamentals of Probability: A First Course","author":"A. DasGupta","year":"2010","unstructured":"DasGupta, A.: The birthday and matching problems. In: Fundamentals of Probability: A First Course. Springer Texts in Statistics, pp. 23\u201328. Springer, NY (2010)"},{"key":"12_CR6","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities\u00a0I(281), 31\u201350 (1995)"},{"key":"12_CR7","unstructured":"Family educational rights and privacy act of 1974. Congressional Record\u00a0120, 39862\u201339866 (1974), http:\/\/www2.ed.gov\/policy\/gen\/guid\/fpco\/ferpa\/"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1145\/800070.802212","volume-title":"Procs. of the 14th ACM Symposium on Theory of Computing, STOC 1982","author":"S. Goldwasser","year":"1982","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption & how to play mental poker keeping secret all partial information. In: Procs. of the 14th ACM Symposium on Theory of Computing, STOC 1982, pp. 365\u2013377. ACM, New York (1982)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Hac\u0131g\u00fcm\u00fc\u015f, H., Iyer, B.R., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. of ACM SIGMOD Int. Conf. on Management of Data, Madison, Wisconsin, pp. 216\u2013227 (2002)","DOI":"10.1145\/564716.564717"},{"key":"12_CR10","unstructured":"Standard for privacy of individually identifiable health information. Federal Register\u00a067(157), 53181\u201353273 (2002), http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/privacyrule\/index.html"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":": A privacy-preserving index for range queries. In: Proc. of the 30th Int. Conf. on Very Large Data Bases, VLDB 2004. VLDB Endowment, vol.\u00a030, pp. 720\u2013731 (2004)","DOI":"10.1016\/B978-012088469-8.50064-4"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-642-12098-5_10","volume-title":"Database Systems for Advanced Applications","author":"X. Jiang","year":"2010","unstructured":"Jiang, X., Gao, J., Wang, T., Yang, D.: Multiple sensitive association protection in the outsourced database. In: Kitagawa, H., Ishikawa, Y., Li, Q., Watanabe, C. (eds.) DASFAA 2010. LNCS, vol.\u00a05982, pp. 123\u2013137. Springer, Heidelberg (2010)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: Proc. of the 23rd Int. Conf. on Data Engineering (ICDE 2007), Istanbul, Turkey (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Trans. on Know. Discovery from Data (TKDD) (1) (2007)","DOI":"10.1145\/1217299.1217302"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Nergiz, A.E., Clifton, C.: Query processing in private data outsourcing using anonymization. Tech. Rep. 11-004, CS, Purdue University, http:\/\/www.cs.purdue.edu\/research\/technical_reports\/2011\/TRf","DOI":"10.1007\/978-3-642-22348-8_12"},{"issue":"8","key":"12_CR16","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1109\/TKDE.2008.210","volume":"21","author":"M.E. Nergiz","year":"2009","unstructured":"Nergiz, M.E., Clifton, C., Nergiz, A.E.: Multirelational k-anonymity. IEEE Transactions on Knowledge and Data Engineering\u00a021(8), 1104\u20131117 (2009)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"12_CR17","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/S0933-3657(98)00056-6","volume":"15","author":"A. \u00d8hrn","year":"1999","unstructured":"\u00d8hrn, A., Ohno-Machado, L.: Using boolean reasoning to anonymize databases. Artificial Intelligence in Medicine\u00a015(3), 235\u2013254 (1999)","journal-title":"Artificial Intelligence in Medicine"},{"issue":"6","key":"12_CR18","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondent\u2019s privacy in microdata release. IEEE Transactions on Knowledge and Data Engineering\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a0(5), 557\u2013570 (2002)","DOI":"10.1142\/S0218488502001648"},{"key":"12_CR20","unstructured":"Xiao, X., Tao, Y.: Anatomy: Simple and effective privacy preservation. In: Proc. of 32nd Int. Conf. on Very Large Data Bases (VLDB), Seoul, Korea (2006)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22348-8_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:07:27Z","timestamp":1606187247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22348-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223471","9783642223488"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22348-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}