{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T04:42:17Z","timestamp":1762144937591,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336140"},{"type":"electronic","value":"9783642336157"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33615-7_6","type":"book-chapter","created":{"date-parts":[[2013,1,15]],"date-time":"2013-01-15T14:30:32Z","timestamp":1358260232000},"page":"527-548","source":"Crossref","is-referenced-by-count":5,"title":["A Theoretically-Sound Accuracy\/Privacy-Constrained Framework for Computing Privacy Preserving Data Cubes in OLAP Environments"],"prefix":"10.1007","author":[{"given":"Alfredo","family":"Cuzzocrea","sequence":"first","affiliation":[]},{"given":"Domenico","family":"Sacc\u00e0","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"6_CR1","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N.R. Adam","year":"1989","unstructured":"Adam, N.R., et al.: Security-Control Methods for Statistical Databases: A Comparative Study. ACM Computing Surveys\u00a021(4), 515\u2013556 (1989)","journal-title":"ACM Computing Surveys"},{"key":"6_CR2","unstructured":"Agarwal, S., et al.: On the Computation of Multidimensional Aggregates. In: VLDB, pp. 506\u2013521 (1996)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., et al.: Privacy-Preserving OLAP. In: ACM SIGMOD, pp. 251\u2013262 (2005)","DOI":"10.1145\/1066157.1066187"},{"issue":"6","key":"6_CR4","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TSE.1982.236161","volume":"8","author":"F.Y. Chin","year":"1982","unstructured":"Chin, F.Y., et al.: Auditing and Inference Control in Statistical Databases. IEEE Trans. on Software Engineering\u00a08(6), 574\u2013582 (1982)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Cuzzocrea, A.: Overcoming Limitations of Approximate Query Answering in OLAP. In: IEEE IDEAS, pp. 200\u2013209 (2005)","DOI":"10.1109\/IDEAS.2005.41"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Cuzzocrea, A.: Accuracy Control in Compressed Multidimensional Data Cubes for Quality of Answer-based OLAP Tools. In: IEEE SSDBM, pp. 301\u2013310 (2006)","DOI":"10.1109\/SSDBM.2006.10"},{"issue":"2","key":"6_CR7","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.datak.2005.03.011","volume":"56","author":"A. Cuzzocrea","year":"2006","unstructured":"Cuzzocrea, A.: Improving Range-Sum Query Evaluation on Data Cubes via Polynomial Approximation. Data & Knowledge Engineering\u00a056(2), 85\u2013121 (2006)","journal-title":"Data & Knowledge Engineering"},{"issue":"7","key":"6_CR8","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MC.1983.1654444","volume":"16","author":"D.E. Denning","year":"1983","unstructured":"Denning, D.E., et al.: Inference Controls for Statistical Databases. IEEE Computer\u00a016(7), 69\u201382 (1983)","journal-title":"IEEE Computer"},{"key":"6_CR9","unstructured":"UCI KDD Archive, The Forest CoverType Data Set, http:\/\/kdd.ics.uci.edu\/databases\/covertype\/covertype.html"},{"issue":"1","key":"6_CR10","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1023\/A:1009726021843","volume":"1","author":"J. Gray","year":"1997","unstructured":"Gray, J., et al.: Data Cube: A Relational Aggregation Operator Generalizing Group-By, Cross-Tab, and Sub-Totals. Data Mining and Knowledge Discovery\u00a01(1), 29\u201354 (1997)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Han, J., et al.: Efficient Computation of Iceberg Cubes with Complex Measures. In: ACM SIGMOD, pp. 1\u201312 (2001)","DOI":"10.1145\/376284.375664"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/11546849_40","volume-title":"Data Warehousing and Knowledge Discovery","author":"M. Hua","year":"2005","unstructured":"Hua, M., Zhang, S., Wang, W., Zhou, H., Shi, B.-L.: FMC: An Approach for Privacy Preserving OLAP. In: Tjoa, A.M., Trujillo, J. (eds.) DaWaK 2005. LNCS, vol.\u00a03589, pp. 408\u2013417. Springer, Heidelberg (2005)"},{"issue":"1","key":"6_CR13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A. Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., et al.: L-diversity: Privacy beyond k-Anonymity. ACM Trans. on Knowledge Discovery from Data\u00a01(1), art. no. 3 (2007)","journal-title":"ACM Trans. on Knowledge Discovery from Data"},{"issue":"1","key":"6_CR14","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1127345.1127347","volume":"9","author":"F.M. Malvestuto","year":"2006","unstructured":"Malvestuto, F.M., et al.: Auditing Sum-Queries to Make a Statistical Database Secure. ACM Trans. on Information and System Security\u00a09(1), 31\u201360 (2006)","journal-title":"ACM Trans. on Information and System Security"},{"issue":"1","key":"6_CR15","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/319540.319555","volume":"6","author":"J. Schlorer","year":"1981","unstructured":"Schlorer, J.: Security of Statistical Databases: Multidimensional Transformation. ACM Trans. on Database Systems\u00a06(1), 95\u2013112 (1981)","journal-title":"ACM Trans. on Database Systems"},{"key":"6_CR16","volume-title":"Kendall\u2019s Advanced Theory of Statistics: Distribution Theory","author":"A. Stuart","year":"1998","unstructured":"Stuart, A., et al.: Kendall\u2019s Advanced Theory of Statistics: Distribution Theory, 6th edn., vol.\u00a01. Oxford University Press, New York City (1998)","edition":"6"},{"issue":"1","key":"6_CR17","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/s10115-004-0193-2","volume":"9","author":"S.Y. Sung","year":"2006","unstructured":"Sung, S.Y., et al.: Privacy Preservation for Data Cubes. Knowledge and Information Systems\u00a09(1), 38\u201361 (2006)","journal-title":"Knowledge and Information Systems"},{"issue":"5","key":"6_CR18","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. International Journal on Uncertainty Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty Fuzziness and Knowledge-based Systems"},{"key":"6_CR19","unstructured":"Transaction Processing Council, TPC Benchmark H, http:\/\/www.tpc.org\/tpch\/"},{"key":"6_CR20","unstructured":"Wang, L., et al.: Securing OLAP Data Cubes against Privacy Breaches. In: IEEE SSP, pp. 161\u2013175 (2004)"},{"issue":"5","key":"6_CR21","doi-asserted-by":"crossref","first-page":"655","DOI":"10.3233\/JCS-2004-12501","volume":"12","author":"L. Wang","year":"2004","unstructured":"Wang, L., et al.: Cardinality-based Inference Control in Data Cubes. Journal of Computer Security\u00a012(5), 655\u2013692 (2004)","journal-title":"Journal of Computer Security"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, N., et al.: Cardinality-based Inference Control in OLAP Systems: An Information Theoretic Approach. In: ACM DOLAP, pp. 59\u201364 (2004)","DOI":"10.1145\/1031763.1031776"},{"key":"6_CR23","unstructured":"Cuzzocrea, A., Sacc\u00e0, D.: A Constraint-Based Framework for Computing Privacy Preserving OLAP Aggregations on Data Cubes. In: ADBIS CEUR Workshop Proceedings, vol.\u00a0789, pp. 95\u2013106 (2011)"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33615-7_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T17:14:16Z","timestamp":1745946856000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33615-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336140","9783642336157"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33615-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}