{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:27:58Z","timestamp":1725474478511},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336263"},{"type":"electronic","value":"9783642336270"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33627-0_23","type":"book-chapter","created":{"date-parts":[[2012,9,12]],"date-time":"2012-09-12T12:41:37Z","timestamp":1347453697000},"page":"295-307","source":"Crossref","is-referenced-by-count":2,"title":["A Bayesian Approach for On-Line Sum\/Count\/Max\/Min Auditing on Boolean Data"],"prefix":"10.1007","author":[{"given":"Bice","family":"Cavallo","sequence":"first","affiliation":[]},{"given":"Gerardo","family":"Canfora","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Computing Surveys (CSUR) 21(4) (1989)","DOI":"10.1145\/76894.76895"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Canfora, G., Cavallo, B.: A bayesian approach for on-line max auditing. In: Proocedings of The Third International Conference on Availability, Reliability and Security (ARES), pp. 1020\u20131027. IEEE Computer Society Press (2008)","DOI":"10.1109\/ARES.2008.94"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Canfora, G., Cavallo, B.: A probabilistic approach for on-line sum-auditing. In: Proocedings of 2010 International Conference on Availability, Reliability and Security, pp. 303\u2013308. IEEE Computer Society Press (2010)","DOI":"10.1109\/ARES.2010.46"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Canfora, G., Cavallo, B.: A bayesian approach for on-line max and min auditing. In: Proocedings of International workshop on Privacy and Anonymity in Information Society (PAIS), pp. 12\u201320. ACM DL (2008)","DOI":"10.1145\/1379287.1379292"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-540-87471-3_22","volume-title":"Privacy in Statistical Databases","author":"G. Canfora","year":"2008","unstructured":"Canfora, G., Cavallo, B.: Reasoning under Uncertainty in On-Line Auditing. In: Domingo-Ferrer, J., Sayg\u0131n, Y. (eds.) PSD 2008. LNCS, vol.\u00a05262, pp. 257\u2013269. Springer, Heidelberg (2008)"},{"issue":"11","key":"23_CR6","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1016\/j.datak.2009.06.006","volume":"68","author":"G. Canfora","year":"2009","unstructured":"Canfora, G., Cavallo, B.: A bayesian model for disclosure control in statistical databases. Data & Knowledge Engineering\u00a068(11), 1187\u20131205 (2009)","journal-title":"Data & Knowledge Engineering"},{"issue":"3","key":"23_CR7","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1145\/5925.5928","volume":"33","author":"F.Y. Chin","year":"1986","unstructured":"Chin, F.Y.: Security problems on inference control for sum, max, and min queries. Journal of the ACM\u00a033(3), 451\u2013464 (1986)","journal-title":"Journal of the ACM"},{"issue":"6","key":"23_CR8","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TSE.1982.236161","volume":"SE-8","author":"F.Y. Chin","year":"1982","unstructured":"Chin, F.Y., Ozsoyoglu, G.: Auditing and inference control in statistical databases. IEEE Transaction on Software Engineering\u00a0SE-8(6), 574\u2013582 (1982)","journal-title":"IEEE Transaction on Software Engineering"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Heckerman, D.: Causal independence for knowledge acquisition and inference. In: Proceedings of Ninth Conference on Uncertainty in Artificial Intelligence, pp. 122\u2013127 (1993)","DOI":"10.1016\/B978-1-4832-1451-1.50019-6"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Kenthapadi, K., Mishra, N., Nissim, K.: Simulatable auditing. In: PODS, pp. 118\u2013127 (2005)","DOI":"10.1145\/1065167.1065183"},{"issue":"1","key":"23_CR11","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/S0022-0000(02)00036-3","volume":"66","author":"J. Kleinberg","year":"2003","unstructured":"Kleinberg, J., Papadimitriou, C., Raghavan, P.: Auditing boolean attributes. Journal of Computer and System Sciences\u00a066(1), 244\u2013253 (2003)","journal-title":"Journal of Computer and System Sciences"},{"issue":"1","key":"23_CR12","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1127345.1127347","volume":"9","author":"F.M. Malvestuto","year":"2006","unstructured":"Malvestuto, F.M., Mezzini, M., Moscarini, M.: Auditing sum-queries to make a statistical database secure. ACM Transactions on Information and System Security (TISSEC)\u00a09(1), 31\u201360 (2006)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"issue":"2-3","key":"23_CR13","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1080\/08839518908949933","volume":"3","author":"K.G. Olesen","year":"1989","unstructured":"Olesen, K.G., Kjaerulff, U., Jensen, F., Jensen, F.V., Falck, B., Andreassen, S., Andersen, S.K.: A munin network for the median nerve - a case study in loops. Applied Artificial Intelligence\u00a03(2-3), 385\u2013403 (1989)","journal-title":"Applied Artificial Intelligence"},{"key":"23_CR14","volume-title":"Probabilistic reasoning in intelligent systems: networks of plausible inference","author":"J. Pearl","year":"1998","unstructured":"Pearl, J.: Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan Kaufmann, San Francisco (1998)"},{"issue":"1","key":"23_CR15","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/322108.322113","volume":"26","author":"S.P. Reiss","year":"1979","unstructured":"Reiss, S.P.: Security in databases: A combinatorial study. Journal of the ACM\u00a026(1), 45\u201357 (1979)","journal-title":"Journal of the ACM"}],"container-title":["Lecture Notes in Computer Science","Privacy in Statistical Databases"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33627-0_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:17:00Z","timestamp":1620130620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33627-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336263","9783642336270"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33627-0_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}