{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:35:07Z","timestamp":1725528907054},"publisher-location":"Wiesbaden","reference-count":19,"publisher":"Vieweg+Teubner","isbn-type":[{"type":"print","value":"9783834806604"},{"type":"electronic","value":"9783834892836"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-8348-9283-6_10","type":"book-chapter","created":{"date-parts":[[2009,3,6]],"date-time":"2009-03-06T16:17:39Z","timestamp":1236356259000},"page":"99-107","source":"Crossref","is-referenced-by-count":1,"title":["The Anonymity vs. Utility Dilemma"],"prefix":"10.1007","author":[{"given":"Michele","family":"Bezzi","sequence":"first","affiliation":[]},{"given":"Jean-Christophe","family":"Pazzaglia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Ashley, P., Hada, S., Karjoth, G, Schunter, M.: E-P3P privacy policies and privacy authorization. In Proc. of the ACM workshop on Privacy in the Electronic Society (WPES 2002), Washington, DC, USA, November 2002.","key":"10_CR1","DOI":"10.1145\/644527.644538"},{"unstructured":"Ateniese, G., Blanton, M., Kirsch, J.: Secret Handshakes with Dynamic and Fuzzy Matching. In 14th Annual Network & Distributed System Security Symposium (NDSS\u201907), 2007.","key":"10_CR2"},{"doi-asserted-by":"crossref","unstructured":"Baldwin, Gramlich, W.C.: Cryptographic Protocol for Trustable Match Making, Proc., IEEE Symposium on Security and Privacy, 1985.","key":"10_CR3","DOI":"10.1109\/SP.1985.10011"},{"doi-asserted-by":"crossref","unstructured":"Balfanz, Dirk, Durfee, Glenn, Shankar, Narendar, Smetters, Diana K., Staddon, Jessica, Wong, Hao-Chi: Secret Handshakes from Pairing-Based Key Agreements. IEEE Symposium on Security and Privacy 2003: 180\u2013196","key":"10_CR4","DOI":"10.1109\/SECPRI.2003.1199336"},{"key":"10_CR5","volume-title":"Secure data management in decentralized systems","author":"V. Ciriani","year":"2007","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Microdata protection, (Advances in information security). \u2014 In: Secure data management in decentralized systems; Eds. by Ting Yu, Sushil Jajodia. \u2014 New York: Springer, 2007."},{"unstructured":"CyLab Privacy Interest Group, Carnegie Mellon University, 2006 Privacy Policy Trends Report http:\/\/www.chariotsfire.com\/pub\/cpig-jan2007.pdf","key":"10_CR6"},{"doi-asserted-by":"crossref","unstructured":"Duncan, G. T., Lambert, D.: Disclosure-limited data dissemination, Journal of the American Statistical Association, vol. 81, no. 393, 1986.","key":"10_CR7","DOI":"10.1080\/01621459.1986.10478229"},{"doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy, ICALP, 2006.","key":"10_CR8","DOI":"10.1007\/11787006_1"},{"unstructured":"Data Protection in the European Union Report, Citizens\u2019 perceptions, Flash Eurobarometer 225, 2008, http:\/\/ec.europa.eu\/public_opinion\/flash\/fl_225_en.pdf","key":"10_CR9"},{"unstructured":"Directive 95\/46\/EC on the protection of personal data, http:\/\/ec.europa.eu\/justice_home\/fsj\/privacy\/index_en.htm","key":"10_CR10"},{"doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity, ICDE, 2007.","key":"10_CR11","DOI":"10.1109\/ICDE.2007.367856"},{"doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data, vol. 1, no. 1, 2007.","key":"10_CR12","DOI":"10.1145\/1217299.1217302"},{"doi-asserted-by":"crossref","unstructured":"Meadows, \u2014 Catherine: A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party. IEEE Symposium on Security and Privacy 1986: 134\u2013137.","key":"10_CR13","DOI":"10.1109\/SP.1986.10022"},{"unstructured":"2006 Annual Study: Cost of a Data Breach, Ponemon Institute, see also K. Kark, Calculating The Cost Of A Security Breach, Forrester, 2007.","key":"10_CR14"},{"unstructured":"Privacy Rights Clearinghouse, A Chronology of Data Breaches, http:\/\/www.privacyrights.org\/ar\/ChronDataBreaches.htm","key":"10_CR15"},{"unstructured":"Shin, Ji Sun, Gligor, Virgil D., A New Privacy-Enhanced Matchmaking Protocol, NDSS Symposium 2008.","key":"10_CR16"},{"doi-asserted-by":"crossref","unstructured":"Slagell, A., and Yurcik, W., Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization, SECOVAL: The Workshop on the Value of Security through Collaboration, Athens, Greece, 2005","key":"10_CR17","DOI":"10.1109\/SECCMW.2005.1588299"},{"unstructured":"Sweeney, L.,: Uniqueness of simple demographics in the u.s. population. Technical report, Carnegie Mellon University, 2000.","key":"10_CR18"},{"doi-asserted-by":"crossref","unstructured":"Samarati, P., Protecting Respondent\u2019s Privacy in Microdata Release, in IEEE Transactions on Knowledge and Data Engineering, vol. 13, n. 6, November\/December 2001.","key":"10_CR19","DOI":"10.1109\/69.971193"}],"container-title":["ISSE 2008 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9283-6_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T12:22:42Z","timestamp":1606134162000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9283-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783834806604","9783834892836"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9283-6_10","relation":{},"subject":[]}}