{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T18:08:53Z","timestamp":1648663733653},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2009,2,27]],"date-time":"2009-02-27T00:00:00Z","timestamp":1235692800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Distrib Parallel Databases"],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1007\/s10619-009-7035-x","type":"journal-article","created":{"date-parts":[[2009,2,26]],"date-time":"2009-02-26T16:09:01Z","timestamp":1235664541000},"page":"5-28","source":"Crossref","is-referenced-by-count":1,"title":["Revelation on demand"],"prefix":"10.1007","volume":"25","author":[{"given":"Nicolas","family":"Anciaux","sequence":"first","affiliation":[]},{"given":"Mehdi","family":"Benzine","sequence":"additional","affiliation":[]},{"given":"Luc","family":"Bouganim","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Pucheral","sequence":"additional","affiliation":[]},{"given":"Dennis","family":"Shasha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,2,27]]},"reference":[{"issue":"4","key":"7035_CR1","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N.R. Adam","year":"1989","unstructured":"Adam, N.R., Wortmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Comput. Surv. 21(4), 515\u2013556 (1989)","journal-title":"ACM Comput. Surv."},{"key":"7035_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: The International Conference on Very Large Databases, pp.\u00a0143\u2013154 (2002)","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"7035_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: ACM International Conference on Management of Data (SIGMOD), pp.\u00a0439\u2013450 (2000)","DOI":"10.1145\/342009.335438"},{"key":"7035_CR4","doi-asserted-by":"crossref","unstructured":"Anciaux, N., Benzine, M., Bouganim, L., Pucheral, P., Shasha, D.: GhostDB: querying visible and hidden data without leaks. In: ACM International Conference on Management of Data (SIGMOD), pp.\u00a0677\u2013688 (2007)","DOI":"10.1145\/1247480.1247555"},{"key":"7035_CR5","doi-asserted-by":"crossref","unstructured":"Anciaux, N., Bouganim, L., van Heerde, H., Pucheral, P., Apers, P.M.G.: Data degradation: making private data less sensitive over time. In: ACM Conference on Information and Knowledge Management (CIKM) (2008)","DOI":"10.1145\/1458082.1458301"},{"key":"7035_CR6","doi-asserted-by":"crossref","unstructured":"Anciaux, N., Bouganim, L., Pucheral, P.: Memory requirements for query execution in highly constrained devices. In: The International Conference on Very Large Data Bases (VLDB), pp.\u00a0694\u2013705 (2003)","DOI":"10.1016\/B978-012722442-8\/50067-7"},{"key":"7035_CR7","unstructured":"BBC News, Bank customer data sold on eBay, August 26, 2008. http:\/\/news.bbc.co.uk\/2\/hi\/uk_news\/7581540.stm"},{"issue":"7","key":"7035_CR8","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B. Bloom","year":"1970","unstructured":"Bloom, B.: Space\/time tradeoffs in hash coding with allowable errors. Commun. ACM 13(7), 422\u2013426 (1970)","journal-title":"Commun. ACM"},{"key":"7035_CR9","doi-asserted-by":"crossref","unstructured":"Bolchini, C., Salice, F., Schreiber, F., Tanca, L.: Logical and physical design issues for smart card databases, ACM Trans. Inf. Syst. 254\u2013285 (2003)","DOI":"10.1145\/858476.858478"},{"key":"7035_CR10","unstructured":"Bratbergsengen, B.: Hashing methods and relational algebra operators. In: The International Conference on Very Large Databases (VLDB), pp.\u00a0323\u2013333 (1984)"},{"key":"7035_CR11","unstructured":"Computer Security Institute: CSI\/FBI computer crime and security survey (2006). http:\/\/www.gocsi.com"},{"key":"7035_CR12","unstructured":"Computer World: NASA sites hacked. December 2003. http:\/\/www.computerworld.com\/securitytopics\/security\/cybercrime\/story\/0,10801,88348,00.html"},{"key":"7035_CR13","doi-asserted-by":"crossref","unstructured":"Damiani, E., De Capitani Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: ACM Conference on Computer and Communications Security (CCS), pp.\u00a093\u2013102 (2003)","DOI":"10.1145\/948109.948124"},{"key":"7035_CR14","unstructured":"Gray, J., Barkhatov, A.: DBGen synthetic data generator for SQL tables and text files on Windows platforms (1999). http:\/\/research.microsoft.com\/~Gray\/dbgen\/"},{"issue":"3","key":"7035_CR15","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s007780050043","volume":"6","author":"L.M. Haas","year":"1997","unstructured":"Haas, L.M., Carey, M.J., Livny, M., Shukla, A.: SEEKing the truth about ad hoc join costs. Very Large Data Bases J. 6(3), 241\u2013256 (1997)","journal-title":"Very Large Data Bases J."},{"key":"7035_CR16","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: ACM International Conference on Management of Data (SIGMOD), pp.\u00a0216\u2013227 (2002)","DOI":"10.1145\/564716.564717"},{"key":"7035_CR17","doi-asserted-by":"crossref","unstructured":"Henderson, N.J., White, N.M., Hartel, P.H.: iButton enrolment and verification requirments for the pressure sequence smart card biometric. In: The International Conference on Research in Smart Cards (2001)","DOI":"10.1007\/3-540-45418-7_11"},{"key":"7035_CR18","first-page":"2","volume":"20","author":"D. Hillyard","year":"2007","unstructured":"Hillyard, D., Gauen, M.: Issues around the protection or revelation of personal information. Knowl. Technol. Policy 20, 2 (2007)","journal-title":"Knowl. Technol. Policy"},{"key":"7035_CR19","unstructured":"IBM corporation: IBM Data Encryption for IMS and DB2 Databases v. 1.1 (2003). http:\/\/www-306.ibm.com\/software\/data\/db2imstools\/html\/ibmdataencryp.html"},{"key":"7035_CR20","unstructured":"Lane, P.: Oracle9i Data Warehousing Guide, Release 1 (9.0.1). Oracle Corporation (2001)"},{"issue":"1","key":"7035_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s007780050071","volume":"8","author":"Z. Li","year":"1999","unstructured":"Li, Z., Ross, K.A.: Fast joins using join indices. Very Large Data Bases J. 8(1), 1\u201324 (1999)","journal-title":"Very Large Data Bases J."},{"key":"7035_CR22","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-Diversity: privacy beyond K-anonymity. In: International Conference on Data Engineering (ICDE) (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"7035_CR23","doi-asserted-by":"crossref","unstructured":"O\u2019Neil, P., Graefe, G.: Multi-table joins through bitmapped join indices. In: SIGMOD Record (1995)","DOI":"10.1145\/211990.212001"},{"key":"7035_CR24","unstructured":"Oracle Corporation: Oracle Database, Advanced Security Administrator\u2019s Guide, 10g Release 2 (10.2). Oracle documentation B14268-02 (2005)"},{"key":"7035_CR25","unstructured":"Praca, D.: Next generation smart card: new features, new architecture and system integration, deliverable of the Inspired IST project (2005)"},{"issue":"2\u20133","key":"7035_CR26","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/s007780100047","volume":"10","author":"P. Pucheral","year":"2001","unstructured":"Pucheral, P., Bouganim, L., Valduriez, P., Bobineau, C.: PicoDBMS: scaling down database techniques for the smart card. Very Large Data Bases J. 10(2\u20133), 120\u2013132 (2001)","journal-title":"Very Large Data Bases J."},{"issue":"5","key":"7035_CR27","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"7035_CR28","unstructured":"The Financial Times: Chinese military hacked into Pentagon, Sept. 2007. http:\/\/www.ft.com\/cms\/s\/0\/9dba9ba2-5a3b-11dc-9bcd-0000779fd2ac.html"},{"key":"7035_CR29","unstructured":"The Washington Post. Consultant Breached FBI\u2019s Computers, July 2007. http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2006\/07\/05\/AR2006070501489_pf.html"},{"key":"7035_CR30","unstructured":"UK government loses personal data on 25 million citizens. http:\/\/www.edri.org\/edrigram\/number5.22\/personal-data-lost-uk"},{"issue":"2","key":"7035_CR31","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1145\/22952.22955","volume":"12","author":"P. Valduriez","year":"1987","unstructured":"Valduriez, P.: Join indices. ACM Trans. Database Syst. 12(2), 218\u2013246 (1987)","journal-title":"ACM Trans. Database Syst."},{"key":"7035_CR32","doi-asserted-by":"crossref","unstructured":"Vingralek, R.: Gnatdb: a small-footprint, secure database system. In: International Conference on Very Large Databases (VLDB), pp.\u00a0884\u2013893 (2002)","DOI":"10.1016\/B978-155860869-6\/50087-1"},{"key":"7035_CR33","doi-asserted-by":"crossref","unstructured":"Weininger, A.: Efficient execution of joins in a star schema. In: ACM International Conference on Management of Data (SIGMOD), pp.\u00a0542\u2013545 (2002)","DOI":"10.1145\/564691.564754"}],"container-title":["Distributed and Parallel Databases"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10619-009-7035-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10619-009-7035-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10619-009-7035-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T05:16:24Z","timestamp":1589606184000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10619-009-7035-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,2,27]]},"references-count":33,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2009,4]]}},"alternative-id":["7035"],"URL":"https:\/\/doi.org\/10.1007\/s10619-009-7035-x","relation":{},"ISSN":["0926-8782","1573-7578"],"issn-type":[{"value":"0926-8782","type":"print"},{"value":"1573-7578","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,2,27]]}}}