{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:15:34Z","timestamp":1725747334600},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642410970"},{"type":"electronic","value":"9783642410987"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41098-7_3","type":"book-chapter","created":{"date-parts":[[2013,9,4]],"date-time":"2013-09-04T13:16:01Z","timestamp":1378300561000},"page":"33-48","source":"Crossref","is-referenced-by-count":0,"title":["Maintaining Database Anonymity in the Presence of Queries"],"prefix":"10.1007","author":[{"given":"Ryan","family":"Riley","sequence":"first","affiliation":[]},{"given":"Chris","family":"Clifton","sequence":"additional","affiliation":[]},{"given":"Qutaibah","family":"Malluhi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"3_CR1","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"5","key":"3_CR2","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty Fuzziness and Knowledge Based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal of Uncertainty Fuzziness and Knowledge Based Systems"},{"issue":"1","key":"3_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A. Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD)\u00a01(1), 3 (2007)","journal-title":"ACM Transactions on Knowledge Discovery from Data (TKDD)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, ICDE 2007, pp. 106\u2013115. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"6","key":"3_CR5","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B. Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. Journal of the ACM\u00a045(6), 965\u2013981 (1998)","journal-title":"Journal of the ACM"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-642-22348-8_12","volume-title":"Data and Applications Security and Privacy XXV","author":"A.E. Nergiz","year":"2011","unstructured":"Nergiz, A.E., Clifton, C.: Query processing in private data outsourcing using anonymization. In: Li, Y. (ed.) Data and Applications Security and Privacy XXV. LNCS, vol.\u00a06818, pp. 138\u2013153. Springer, Heidelberg (2011)"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1145\/2452376.2452399","volume-title":"Proceedings of the 16th International Conference on Extending Database Technology, EDBT 2013","author":"A.E. Nergiz","year":"2013","unstructured":"Nergiz, A.E., Clifton, C., Malluhi, Q.M.: Updating outsourced anatomized private databases. In: Proceedings of the 16th International Conference on Extending Database Technology, EDBT 2013, pp. 179\u2013190. ACM, New York (2013)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation. In: Proceedings of the 32nd International Conf. on Very Large Data Bases, pp. 139\u2013150 (2006)","DOI":"10.1145\/1142473.1142500"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1145\/1806689.1806716","volume-title":"Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010","author":"M. Ajtai","year":"2010","unstructured":"Ajtai, M.: Oblivious rams without cryptogrpahic assumptions. In: Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, pp. 181\u2013190. ACM, New York (2010)"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/978-3-642-14623-7_27","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"B. Pinkas","year":"2010","unstructured":"Pinkas, B., Reinman, T.: Oblivious RAM revisited. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 502\u2013519. Springer, Heidelberg (2010)"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-25385-0_11","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"E. Shi","year":"2011","unstructured":"Shi, E., Chan, T.-H.H., Stefanov, E., Li, M.: Oblivious RAM with o((logn)3) worst-case cost. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol.\u00a07073, pp. 197\u2013214. Springer, Heidelberg (2011)"},{"key":"3_CR12","unstructured":"Boneh, D., Mazieres, D., Popa, R.A.: Remote Oblivious Storage: Making Oblivious RAM Practical. Technical Report MIT-CSAIL-TR-2011-018, Computer Science and Aritificial Intelligence Laboratory (March 2011)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Goodrich, M.T., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Practical oblivious storage. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, pp. 13\u201324 (2012)","DOI":"10.1145\/2133601.2133604"},{"key":"3_CR14","unstructured":"Amazon: Amazon Simple Storage Service (S3), http:\/\/aws.amazon.com\/documentation\/s3\/"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/3-540-36467-6_16","volume-title":"Privacy Enhancing Technologies","author":"D. Asonov","year":"2003","unstructured":"Asonov, D., Freytag, J.-C.: Almost optimal private information retrieval. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 209\u2013223. Springer, Heidelberg (2003)"},{"key":"3_CR16","unstructured":"Paulet, R., Kaosar, M.G., Yi, X.: K-anonymous private query based on blind signature and oblivious transfer. In: 2nd International Cyber Resilience Conference, pp. 55\u201362 (2011)"},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1145\/564691.564717","volume-title":"Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, SIGMOD 2002","author":"H. Hacig\u00fcm\u00fc\u015f","year":"2002","unstructured":"Hacig\u00fcm\u00fc\u015f, H., Iyer, B., Li, C., Mehrotra, S.: Executing sql over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, SIGMOD 2002, pp. 216\u2013227. ACM, New York (2002)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Redfield, C., Zeldovich, N., Balakrishnan, H.: Cryptdb: protecting confidentiality with encrypted query processing. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pp. 85\u2013100. ACM (2011)","DOI":"10.1145\/2043556.2043566"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1007\/978-3-642-23822-2_34","volume-title":"Computer Security \u2013 ESORICS 2011","author":"N.L. Farnan","year":"2011","unstructured":"Farnan, N.L., Lee, A.J., Chrysanthis, P.K., Yu, T.: Don\u2019t reveal my intension: Protecting user privacy using declarative preferences during distributed query processing. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol.\u00a06879, pp. 628\u2013647. Springer, Heidelberg (2011)"},{"key":"3_CR20","unstructured":"Moore Jr., R.A.: Controlled data-swapping techniques for masking public use microdata sets. In: Statistical Research Division Report Series RR 96-04, U.S. Bureau of the Census, Washington, DC (1996)"},{"key":"3_CR21","unstructured":"Subcommittee on Disclosure Limitation Methodology, Federal Committee on Statistical Methodology: Report on statistical disclosure limitation methodology. Statistical Policy Working Paper 22 (NTIS PB94-16530), Statistical Policy Office, Office of Information and Regulatory Affairs, Office of Management and Budget, Washington, DC (May 1994)"},{"issue":"3","key":"3_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1805974.1805978","volume":"13","author":"V. Ciriani","year":"2010","unstructured":"Ciriani, V., di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Transactions on Information and System Security (TISSEC)\u00a013(3), 22:1\u201322:33 (2010)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41098-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T09:45:01Z","timestamp":1688463901000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41098-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642410970","9783642410987"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41098-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}