{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T19:59:08Z","timestamp":1760385548860,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/bigdata.2016.7841037","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T21:46:59Z","timestamp":1486504019000},"page":"3693-3702","source":"Crossref","is-referenced-by-count":37,"title":["Security and privacy for big data: A systematic literature review"],"prefix":"10.1109","author":[{"given":"Boel","family":"Nelson","sequence":"first","affiliation":[]},{"given":"Tomas","family":"Olovsson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/969458"},{"key":"ref38","first-page":"733","article-title":"Secure nearest neighbor revisited","author":"yao","year":"2013","journal-title":"2013 IEEE 29th International Conference on Data Engineering (ICDE) 2013 IEEE 29th International Conference on Data Engineering (ICDE)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824067"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.16"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.80"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350255"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2014.6816690"},{"key":"ref36","first-page":"118","article-title":"Differentially private learning with kernels","author":"jain","year":"2013","journal-title":"Proceedings of the 30th International Conference on Machine Learning (ICML-13)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14778\/2732296.2732300"},{"journal-title":"International Organization for Standardization Information technology - Security techniques - Privacy framework Standard","year":"2011","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113387"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113273"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.17"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2593663"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213918"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2378356.2378367"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35063-4_66"},{"key":"ref17","first-page":"1689","article-title":"Is Feature Selection Secure against Training Data Poisoning?","author":"xiao","year":"2015","journal-title":"Proceedings of the 32nd International Conference on Machine Learning (ICML-15)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2467797"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2735376"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113272"},{"key":"ref4","first-page":"63","article-title":"Privacy in the Age of Big Data: A Time for Big Decisions","volume":"64","author":"tene","year":"2012","journal-title":"Stanford Law Review Online"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2791347.2791380"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nature07634"},{"journal-title":"3d Data Management Controlling Data Volume Velocity and Variety","year":"2001","author":"laney","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.138"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.645"},{"key":"ref8","first-page":"26","author":"kitchenham","year":"2004","journal-title":"Procedures for performing systematic reviews Technical report"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6863131"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-013-0489-0"},{"journal-title":"International Organization for Standardization Information technology - Security techniques - Information security management systems - Overview and vocabulary Standard","year":"2016","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2782759.2782765"},{"key":"ref20","article-title":"A Face Is Exposed for AOL Searcher No. 4417749","author":"barbaro","year":"2006","journal-title":"The New York Times"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544835"},{"journal-title":"Protecting Privacy when Disclosing Information k-anonymity and its Enforcement Through Generalization and Suppression","year":"1998","author":"samarati","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1145\/1806689.1806787","article-title":"Differential privacy under continual observation","author":"dwork","year":"2010","journal-title":"Proceedings of the Forty-Second ACM Symposium on Theory of Computing"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.14778\/2732977.2732989"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488339"},{"key":"ref26","first-page":"1","article-title":"Differential privacy","author":"dwork","year":"2006","journal-title":"Automata Languages and Programming"},{"key":"ref43","first-page":"1093","article-title":"Query optimization for differentially private data management systems","author":"peng","year":"2013","journal-title":"2013 IEEE 29th International Conference on Data Engineering (ICDE) 2013 IEEE 29th International Conference on Data Engineering (ICDE)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"}],"event":{"name":"2016 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2016,12,5]]},"location":"Washington DC,USA","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7818133\/7840573\/07841037.pdf?arnumber=7841037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,23]],"date-time":"2022-07-23T19:06:32Z","timestamp":1658603192000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7841037\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2016.7841037","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}