{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:02:38Z","timestamp":1725901358554},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642374869"},{"type":"electronic","value":"9783642374876"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37487-6_28","type":"book-chapter","created":{"date-parts":[[2013,4,17]],"date-time":"2013-04-17T03:55:02Z","timestamp":1366170902000},"page":"361-376","source":"Crossref","is-referenced-by-count":3,"title":["Subscription Privacy Protection in Topic-Based Pub\/Sub"],"prefix":"10.1007","author":[{"given":"Weixiong","family":"Rao","sequence":"first","affiliation":[]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Mingxuan","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Sasu","family":"Tarkoma","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Mei","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"http:\/\/sourceforge.net\/projects\/lpsolve"},{"key":"28_CR2","unstructured":"https:\/\/sites.google.com\/site\/rweixiong\/topic.pdf"},{"key":"28_CR3","unstructured":"http:\/\/tracehotnews.com\/sony-admitted-psns-70-million-users-information-leakage"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacygrid. In: WWW (2008)","DOI":"10.21236\/ADA470490"},{"issue":"3","key":"28_CR5","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1145\/380749.380767","volume":"19","author":"A. Carzaniga","year":"2001","unstructured":"Carzaniga, A., Rosenblum, D.S., Wolf, A.L.: Design and evaluation of a wide-area event notification service. ACM Trans. Comput. Syst.\u00a019(3), 332\u2013383 (2001)","journal-title":"ACM Trans. Comput. Syst."},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Chockler, G., Melamed, R., Tock, Y., Vitenberg, R.: Constructing scalable overlays for pub-sub with many topics. In: PODC (2007)","DOI":"10.1145\/1281100.1281118"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Chockler, G., Melamed, R., Tock, Y., Vitenberg, R.: Spidercast: a scalable interest-aware overlay for topic-based pub\/sub communication. In: DEBS (2007)","DOI":"10.1145\/1266894.1266899"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Curtmola, E., Deutsch, A., Ramakrishnan, K.K., Srivastava, D.: Load-balanced query dissemination in privacy-aware online communities. In: SIGMOD (2010)","DOI":"10.1145\/1807167.1807219"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"issue":"2","key":"28_CR10","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1145\/857076.857078","volume":"35","author":"P.T. Eugster","year":"2003","unstructured":"Eugster, P.T., Felber, P., Guerraoui, R., Kermarrec, A.-M.: The many faces of publish\/subscribe. ACM Comput. Surv.\u00a035(2), 114\u2013131 (2003)","journal-title":"ACM Comput. Surv."},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Skiadopoulos, S.: Prive: anonymous location-based queries in distributed mobile systems. In: WWW (2007)","DOI":"10.1145\/1242572.1242623"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218\u2013229 (1987)","DOI":"10.1145\/28395.28420"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Liu, H., Ramasubramanian, V., Sirer, E.G.: Client behavior and feed characteristics of rss, a publish-subscribe system for web micronews. In: IMC, pp. 29\u201334 (2005)","DOI":"10.1145\/1330107.1330111"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: ICDE (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Opyrchal, L., Prakash, A., Agrawal, A.: Supporting privacy policies in a publish-subscribe substrate for pervasive environments. JNW (2007)","DOI":"10.4304\/jnw.2.1.17-26"},{"issue":"4","key":"28_CR16","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/BF02579324","volume":"7","author":"P. Raghavan","year":"1987","unstructured":"Raghavan, P., Thompson, C.D.: Randomized rounding: a technique for provably good algorithms and algorithmic proofs. Combinatorica\u00a07(4), 365\u2013374 (1987)","journal-title":"Combinatorica"},{"key":"28_CR17","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1007\/s00778-011-0224-z","volume":"20","author":"W. Rao","year":"2011","unstructured":"Rao, W., Chen, L., Fu, A.: Stairs: Towards efficient full-text filtering and dissemination in dht environments. The VLDB Journal\u00a020, 793\u2013817 (2011)","journal-title":"The VLDB Journal"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Rao, W., Chen, L., Tarkoma, S.: Towards efficient filter privacy-aware content-based pub\/sub systems. Accepted by IEEE Trans. Knowl. Data Eng. (2012)","DOI":"10.1109\/TKDE.2012.177"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6) (2001)","DOI":"10.1109\/69.971193"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Shang, N., Nabeel, M., Paci, F., Bertino, E.: A privacy-preserving approach to policy-based content dissemination. In: ICDE (2010)","DOI":"10.1109\/ICDE.2010.5447902"},{"key":"28_CR21","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-01244-0_24","volume-title":"Emerging Challenges for Security, Privacy and Trust","author":"A. Shikfa","year":"2009","unstructured":"Shikfa, A., \u00d6nen, M., Molva, R.: Privacy-preserving content-based publish\/subscribe networks. In: Gritzalis, D., Lopez, J. (eds.) SEC 2009. IFIP AICT, vol.\u00a0297, pp. 270\u2013282. Springer, Heidelberg (2009)"},{"issue":"5","key":"28_CR22","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Wang, T., Liu, L.: Privacy-aware mobile services over road networks. In: PVLDB, vol.\u00a02(1), pp. 1042\u20131053 (2009)","DOI":"10.14778\/1687627.1687745"},{"key":"28_CR24","doi-asserted-by":"crossref","unstructured":"Yao, A.C.-C.: Protocols for secure computations (extended abstract). In: FOCS, pp. 160\u2013164 (1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Yuan, M., Chen, L., Rao, W., Mei, H.: A general framework for publishing privacy protected and utility preserved graph. In: ICDM, pp. 1182\u20131187 (2012)","DOI":"10.1109\/ICDM.2012.62"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37487-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:30:45Z","timestamp":1558301445000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37487-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642374869","9783642374876"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37487-6_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}