{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:55:41Z","timestamp":1725890141768},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642358890"},{"type":"electronic","value":"9783642358906"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35890-6_6","type":"book-chapter","created":{"date-parts":[[2013,1,10]],"date-time":"2013-01-10T22:45:00Z","timestamp":1357857900000},"page":"75-88","source":"Crossref","is-referenced-by-count":0,"title":["Differential Privacy in Tripartite Interaction: A Case Study with Linguistic Minorities in Canada"],"prefix":"10.1007","author":[{"given":"Arnaud","family":"Casteigts","sequence":"first","affiliation":[]},{"given":"Marie-H\u00e9l\u00e8ne","family":"Chomienne","sequence":"additional","affiliation":[]},{"given":"Louise","family":"Bouchard","sequence":"additional","affiliation":[]},{"given":"Guy-Vincent","family":"Jourdan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Houle, C., Berthelot, J.M., David, P., Wolfson, M.C., Mustard, C., Roos, L.: Matching census database and Manitoba health care files. In: Proc. of International Workshop on Record Linkage Techniques, p. 305. National Academies (1997)"},{"key":"6_CR2","unstructured":"Statistics\u00a0Canada Website. Policy on record linkage (fetched September 2010), \n                    \n                      http:\/\/www.statcan.gc.ca\/record-enregistrement\/policy4-1-politique4-1-eng.html"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Casteigts, A., Chomienne, M.-H., Bouchard, L., Jourdan, G.-V.: Enabling Dynamic Linkage of Linguistic Census Data at Statistics Canada. Institut de Recherche de l\u2019H\u00f4pital Montfort, Technical report (March 2011)","DOI":"10.1109\/ISI.2011.5984777"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.\u00a03876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Nissim, K., Raskhodnikova, S., Smith, A.: Smooth sensitivity and sampling in private data analysis. In: Proc. of 39th ACM Symposium on Theory of Computing (STOC), pp. 75\u201384 (2007)","DOI":"10.1145\/1250790.1250803"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/11965893_2","volume-title":"Database Theory \u2013 ICDT 2007","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Ask a Better Question, Get a Better Answer \u2013 A New Approach to Private Data Analysis. In: Schwentick, T., Suciu, D. (eds.) ICDT 2007. LNCS, vol.\u00a04353, pp. 18\u201327. Springer, Heidelberg (2006)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1007\/978-3-540-28628-8_32","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"C. Dwork","year":"2004","unstructured":"Dwork, C., Nissim, K.: Privacy-Preserving Datamining on Vertically Partitioned Databases. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 528\u2013544. Springer, Heidelberg (2004)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the SuLQ framework. In: Proc. of ACM Symposium on Principles of Database Systems (PODS), pp. 128\u2013138 (2005)","DOI":"10.1145\/1065167.1065184"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Hardt, M., Talwar, K.: On the geometry of differential privacy. In: Proc. of the 42nd ACM Symposium on Theory of Computing (STOC), pp. 705\u2013714 (2010)","DOI":"10.1145\/1806689.1806786"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Smith, A.: Privacy-preserving statistical estimation with optimal convergence rates. In: Proc. of the 43rd ACM Symposium on Theory of Computing (STOC), pp. 813\u2013822 (2011)","DOI":"10.1145\/1993636.1993743"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Kifer, D., Machanavajjhala, A.: No free lunch in data privacy. In: Proc. of the 2011 Intl. Conf. on Management of Data, pp. 193\u2013204 (2011)","DOI":"10.1145\/1989323.1989345"},{"key":"6_CR12","unstructured":"Privacy at\u00a0ICES (fetched March 2011), \n                    \n                      http:\/\/ices.queensu.ca\/privacy.html"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Stolfo, S.J., Tsudik, G. (eds.): IEEE Security & Privacy Magazine, SI on Privacy-Preserving Sharing of Sensitive Information. IEEE Computer Society (July-August 2010)","DOI":"10.1109\/MSP.2010.135"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35890-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T07:58:44Z","timestamp":1557475124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35890-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642358890","9783642358906"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35890-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}