{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:17:53Z","timestamp":1729628273823,"version":"3.28.0"},"reference-count":54,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/bigdata.2015.7364057","type":"proceedings-article","created":{"date-parts":[[2015,12,28]],"date-time":"2015-12-28T16:36:21Z","timestamp":1451320581000},"page":"2591-2599","source":"Crossref","is-referenced-by-count":1,"title":["A framework for consensual and online privacy preserving record linkage in real-time"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Muller","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Mau","sequence":"additional","affiliation":[]},{"given":"Irena Pletikosa","family":"Cvijikj","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Data Protection Day 2014: Full Speed on EU Data","author":"reding","year":"2014","journal-title":"European Commission Brussels"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2011.04.004"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/978-3-642-22263-4_13","article-title":"A constraint satisfaction cryptoanalysis of bloom filters in private record linkage","volume":"6794","author":"kuzu","year":"2011","journal-title":"Privacy Enhancing Technologies"},{"key":"ref32","article-title":"Similarity Filtering with Multibit Trees for Record Linkage","author":"bachteler","year":"2013","journal-title":"Working Paper WP-GRLC-2013&#x2013;02 German Record Linkage Center Nuernberg"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15838-4_24"},{"journal-title":"Report of the US General Accounting Office","article-title":"Record linkage and privacy: issues in creating new federal research and statistical information, Technical Report GAO-'1&#x2013;126SP","year":"2007","key":"ref30"},{"journal-title":"Processing Standards Publication 197 Gaithersburg","article-title":"Announcing the Advanced Encryption standard (AES)","year":"2001","key":"ref37"},{"key":"ref36","article-title":"The tradeoff fallacy. How marketers are misrepresenting American Consumers And Opening Them Up to Exploitation","author":"turow","year":"2015","journal-title":"Annenberg School for Communication &#x2013; University of Pennsylvania"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113271"},{"key":"ref34","article-title":"Towards Scalable Real-Time Entity Resolution using a Similarity-Aware Inverted Index Approach","author":"christen","year":"2008","journal-title":"Seventh Australasian Data Mining Conference (AusDM 2008)"},{"key":"ref28","article-title":"LinkClus: Efficient clustering via heterogeneous semantic links","author":"yin","year":"2006","journal-title":"International Conference on Very Large Data Bases"},{"key":"ref27","article-title":"Space and time scalability of duplicate detection in graph data","author":"weis","year":"2007","journal-title":"Technical Report"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/11508069_15"},{"key":"ref2","article-title":"Overview of record linkage and current research directions","author":"winkler","year":"0","journal-title":"Tech Rep 2006&#x2013;05"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5120\/17039-7347"},{"key":"ref20","article-title":"Adaptive d'uplicate detection using learning string similarity measures","author":"blienko","year":"2003","journal-title":"Proceedings of ACM SIGKDD"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1613\/jair.2290","article-title":"Query-time Entity Resolution","volume":"30","author":"bhattacharya","year":"2007","journal-title":"Journal of Artificial Intelligence Research"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.125"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2002.994694"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47887-6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1138394.1138401"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066168"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2008.11.003"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01307-2_47"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICPCA.2008.4783622"},{"journal-title":"Bloomberg","year":"0","author":"brustein","key":"ref53"},{"year":"0","key":"ref52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2359666"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/269012.269025"},{"journal-title":"European Commission Brussels","article-title":"Regulation of the European Parlament and of the Counsil on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation)","year":"2012","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-012-0145-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(01)00110-5"},{"key":"ref14","article-title":"Machine Learning, Information Retrieval, and Record Linkage","author":"winkler","year":"2000","journal-title":"Proceedings of the Survey Research Methods Section American Statistical Association"},{"key":"ref15","article-title":"Towards Automated Record Linkage","author":"goise","year":"2006","journal-title":"Fifth Australasian Data Mining Conference"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2307\/2286061"},{"key":"ref17","article-title":"Getting Big Data but avoiding Big Brother","volume":"6","author":"schnell","year":"2013","journal-title":"German Record Linkage Center Working Paper Series"},{"year":"1997","author":"mitchell","key":"ref18"},{"key":"ref19","article-title":"A comparison of string distance metrics for name matching tasks","author":"cohen","year":"2003","journal-title":"Proceedings of IJCAI-03 Workshop on Information Integration on the Web (IIWeb-03)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2011.04.004"},{"key":"ref3","article-title":"Some methods for blindfolded record linkage","volume":"4","author":"churches","year":"2004","journal-title":"BioMed Central Medical Informatics and Decision Making"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"},{"year":"2010","author":"hall","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14778\/2732967.2732975"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"59","DOI":"10.29012\/jpc.v6i2.640","article-title":"Cryptanalysis of Basic Bloom Filters Used for","volume":"6","author":"niedermeyer","year":"2014","journal-title":"Journal of Privacy and Confidentiality"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.02.021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.43"},{"article-title":"Data Quality Mining: Making a Virtue of Necessity. In the ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery","year":"2001","author":"hipp","key":"ref46"},{"year":"2009","key":"ref45","article-title":"Data Privacy and Protection at the Tipping Point"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8116(02)00121-0"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICMIRA.2013.42"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/278476.278491"},{"journal-title":"Applied Cyptogography Ptrotocols Algorithms and Source Code in C","year":"2006","author":"schneier","key":"ref41"},{"key":"ref44","article-title":"A Survey of Entity Resolution and Record Linkage Methodologies","volume":"6","author":"brizan","year":"2006","journal-title":"Communications of the IIMA"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"641","DOI":"10.14778\/2735479.2735495","article-title":"Crowdsourcing algorithms for entity resolution","volume":"8","author":"vesdapunt","year":"2015","journal-title":"Proceedings of the VLDB Endowment"}],"event":{"name":"2015 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2015,10,29]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2015,11,1]]}},"container-title":["2015 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7347101\/7363706\/07364057.pdf?arnumber=7364057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T20:35:36Z","timestamp":1567456536000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7364057\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2015.7364057","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}