{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T18:43:24Z","timestamp":1773945804362,"version":"3.50.1"},"reference-count":273,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1109\/comst.2024.3519861","type":"journal-article","created":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T14:59:09Z","timestamp":1734533949000},"page":"3266-3307","source":"Crossref","is-referenced-by-count":12,"title":["Characterization and Quantification of User Privacy: Key Challenges, Regulations, and Future Directions"],"prefix":"10.1109","volume":"27","author":[{"given":"Razi","family":"Arshad","sequence":"first","affiliation":[{"name":"Surrey Centre for Cyber Security, University of Surrey, Guildford, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9607-376X","authenticated-orcid":false,"given":"Muhammad Rizwan","family":"Asghar","sequence":"additional","affiliation":[{"name":"Surrey Centre for Cyber Security, University of Surrey, Guildford, U.K."}]}],"member":"263","reference":[{"issue":"5","key":"ref1","doi-asserted-by":"crossref","first-page":"193","DOI":"10.2307\/1321160","article-title":"The right to privacy","volume":"4","author":"Warren","year":"1890","journal-title":"Harvard Law Rev."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/356546.356548"},{"key":"ref3","first-page":"31","article-title":"Directive 95\/46\/EC of the European parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data","volume":"281","author":"DATA","year":"1995","journal-title":"Off. J. L"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78461-8_1"},{"key":"ref5","volume-title":"The digitization of the world from edge to core","author":"Rydning","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsx.2020.06.063"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0252169"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3389\/fpubh.2020.00305"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0181-6"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref11","first-page":"18","article-title":"Towards a global data privacy standard","volume":"71","author":"Rustad","year":"2018","journal-title":"Florida Law Rev."},{"key":"ref12","volume-title":"California Consumer Privacy act (CCPa)","year":"2024"},{"key":"ref13","volume-title":"Brazilian general data protection law (LGPD, English translation)","year":"2024"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401904"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557079"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119785"},{"key":"ref17","volume-title":"ISO-international organization for standardization","year":"2024"},{"key":"ref18","volume-title":"IEEE Recommended Practice for Secure Multi-Party Computation","year":"2021"},{"key":"ref19","volume-title":"National institute of standards and technology","year":"2024"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5_3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1214\/11-ss074"},{"key":"ref23","volume":"155","author":"Willenborg","year":"2012","journal-title":"Elements of Statistical Disclosure Control"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3588765"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3168389"},{"key":"ref26","volume-title":"Royalsociety","year":"2024"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3172869"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3316481"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3360498"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2944748"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3343038"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3547299"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3412383"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3558095"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3624010"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3645086"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3372777"},{"key":"ref38","volume-title":"The Anonymisation Decision-Making Framework","author":"Elliot","year":"2016"},{"key":"ref39","first-page":"1701","article-title":"Broken promises of privacy: Responding to the surprising failure of anonymization","volume":"57","author":"Ohm","year":"2011","journal-title":"UCLA Law Rev."},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.09.004"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M1241"},{"key":"ref42","article-title":"Privacy and data protection by design-from policy to engineering","author":"Danezis","year":"2015","journal-title":"arXiv:1501.03726"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-016-0525-8"},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-4028-0","volume":"111","author":"Willenborg","year":"1996","journal-title":"Statistical Disclosure Control in Practice"},{"key":"ref45","first-page":"135","article-title":"Disclosure limitation methods and information loss for tabular data","volume-title":"Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies","author":"Duncan","year":"2001"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-12837-0"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5_2"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-019-10933-3"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"ref50","volume-title":"Reidentification of Individuals in Chicago\u2019s Homicide Database: A Technical and Legal Study","author":"Ochoa","year":"2001"},{"key":"ref51","volume-title":"Simple demographics often identify people uniquely","author":"Sweeney","year":"2000"},{"key":"ref52","first-page":"901","article-title":"On k-anonymity and the curse of dimensionality","volume-title":"Proc. VLDB","author":"Aggarwal"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.22"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3423165"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2013.42011"},{"key":"ref57","volume-title":"Security Techniques\u2014Extension to ISO\/IEC 27001 and ISO\/IEC 27002 for Privacy Information Management\u2014Requirements and Guidelines","year":"2019"},{"key":"ref58","volume-title":"Information Technology\u2014Security Techniques\u2014Code of Practice for Protection of Personally Identifiable Information (PII) in Public Clouds Acting as PII Processors","year":"2019"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"ref60","volume-title":"A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management","author":"Pfitzmann","year":"2010"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20769-3_5"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2861765"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3280341"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2023.3315131"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103167"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3226861"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/11861386_4"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75551-7_1"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1015"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.6028\/nist.cswp.01162020"},{"key":"ref72","volume-title":"Information Technology\u2014Security Techniques\u2014Privacy Framework","year":"2011"},{"key":"ref73","volume-title":"Implementing the ISO\/IEC 27001: 2013 ISMS Standard","author":"Humphreys","year":"2016"},{"key":"ref74","volume-title":"Information Security, Cybersecurity and Privacy Protection\u2014Information Security Controls","year":"2022"},{"key":"ref75","volume-title":"Information Technology\u2014Security Techniques\u2014Code of Practice for Personally Identifiable Information Protection","year":"2017"},{"key":"ref76","volume-title":"IEEE Standard for Data Privacy Process","year":"2022"},{"key":"ref77","volume-title":"IEEE P7006 Working Group Draft Meeting Agenda Teleconference","year":"2024"},{"key":"ref78","first-page":"429","article-title":"Towards a methodology for statistical disclosure control","volume":"15","author":"Dalenius","year":"1977","journal-title":"Statistik Tidskrift"},{"key":"ref79","first-page":"1125","article-title":"Sensitive information","volume":"88","author":"Ohm","year":"2014","journal-title":"S. Cal. L. Rev."},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2017.11.001"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/11734727_17"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.119"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.09.018"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(09)70008-X"},{"key":"ref85","year":"2024","journal-title":"IEEE-the world\u2019s largest technical professional organization dedicated to advancing technology for the benefit of humanity"},{"key":"ref86","volume-title":"Guide to data-centric system threat modeling","author":"Souppaya","year":"2016"},{"key":"ref87","volume-title":"Measuring and Managing Information Risk: A FAIR Approach","author":"Freund","year":"2014"},{"key":"ref88","volume-title":"Information Technology\u2014Security Techniques\u2014Guidelines for Privacy Impact Assessment","year":"2023"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3211013"},{"key":"ref90","volume-title":"Personal information protection and electronic documents act","year":"2000"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"ref92","volume-title":"Measuring Privacy Risk in Online Social Networks","author":"Becker","year":"2009"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00305-0_17"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-79026-8_23"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5_8"},{"issue":"3","key":"ref96","first-page":"199","article-title":"An information theoretic approach for privacy metrics","volume":"3","author":"Bezzi","year":"2010","journal-title":"Trans. Data Privacy"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0023"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/1179529.1179539"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/1456441.1456453"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_8"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_7"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36213-2_25"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1142\/s0218488502001648"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150499"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_7"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/11428572_10"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_1"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314347"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414474"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142500"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866936"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-006-0035-5"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367857"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315316"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.11.011"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_20"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376666"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_4"},{"issue":"12","key":"ref127","doi-asserted-by":"crossref","first-page":"1414","DOI":"10.1016\/j.comcom.2010.02.032","article-title":"Measuring long-term location privacy in vehicular communication systems","volume":"33","author":"Ma","year":"2010","journal-title":"Comput. Commun."},{"key":"ref128","first-page":"1","article-title":"Measuring anonymity revisited","volume-title":"Proc. 9th Nordic Workshop Secure IT Syst.","author":"T\u00f3th"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_5"},{"key":"ref130","first-page":"1292","article-title":"An asymmetric entropy measure for decision trees","volume-title":"Proc. 11th Inf. Process. Manag. Uncertainty Knowl.-Based Syst. (IPMU)","author":"Marcellin"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517843"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75227-1_5"},{"key":"ref133","first-page":"454","article-title":"Using binning to maintain confidentiality of medical data","volume-title":"Proc. AMIA Symp.","author":"Lin"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2253320"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772865"},{"key":"ref136","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2015.05.002","article-title":"A taxonomy for privacy enhancing technologies","volume":"53","author":"Heurix","year":"2015","journal-title":"Comput. Secur."},{"issue":"1","key":"ref137","first-page":"95","article-title":"A view on statistical disclosure control for microdata","volume":"22","author":"De Waal","year":"1996","journal-title":"Surv. Methodol."},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-02347-7"},{"issue":"2","key":"ref139","first-page":"461","article-title":"Statistical disclosure limitation","volume":"9","author":"Rubin","year":"1993","journal-title":"J. Off. Statist."},{"key":"ref140","volume-title":"Handbook on Statistical Disclosure Control","author":"Hundepool","year":"2010"},{"issue":"2","key":"ref141","first-page":"275","article-title":"Local recoding and record swapping by maximum weight matching for disclosure control of microdata sets","volume":"18","author":"Takemura","year":"2002","journal-title":"J. Off. Statist."},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150504"},{"issue":"4","key":"ref143","first-page":"437","article-title":"Models and algorithms for the microdata protection problem","volume":"14","author":"Hurkens","year":"1998","journal-title":"J. Off. Statist."},{"key":"ref144","first-page":"31","article-title":"Disclosure control for census microdata","volume":"10","author":"Skinner","year":"1994","journal-title":"J. Off. Statist."},{"issue":"1","key":"ref145","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/0378-3758(82)90058-1","article-title":"Data-swapping: A technique for disclosure control","volume":"6","author":"Dalenius","year":"1982","journal-title":"J. Statist. Plan. Inference"},{"key":"ref146","first-page":"261","article-title":"A bootstrap procedure to preserve statistical confidentiality in contingency tables","volume-title":"Proc. Int. Seminar Statist. Confidential.","author":"Heer"},{"key":"ref147","first-page":"303","article-title":"A method for limiting disclosure in microdata based on random noise and transformation","volume-title":"Proc. Sect. Surv. Res. Methods","author":"Kim"},{"issue":"4","key":"ref148","first-page":"1","article-title":"The confidentiality and analytic usefulness of masked business microdata","volume":"12","author":"Spruill","year":"1984","journal-title":"Rev. Public Data Use"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1016\/0378-3758(91)90047-I"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47804-3_8"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.31274\/rtd-180813-9036"},{"issue":"3","key":"ref152","first-page":"527","article-title":"Statistical properties of multiplicative noise masking for confidentiality protection","volume":"27","author":"Nayak","year":"2011","journal-title":"J. Off. Statist."},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/69.979982"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001594"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25955-8_13"},{"key":"ref156","first-page":"195","article-title":"Panels of enterprises and confidentiality: The small aggregates method","volume-title":"Proc. Symp. Design Anal. Longitudinal Surv.","author":"Defays"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0007-0"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.112"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.04.003"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1209020"},{"key":"ref161","first-page":"202","article-title":"A simple procedure for controlled rounding","volume":"3","author":"Dalenius","year":"1981","journal-title":"Statistik Tidskrift"},{"issue":"4","key":"ref162","first-page":"463","article-title":"Post randomisation for statistical disclosure control: Theory and implementation","volume":"14","author":"Gouweleeuw","year":"1998","journal-title":"J. Off. Statist."},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25955-8_2"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025610705286"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025614806194"},{"key":"ref166","first-page":"139","article-title":"Anatomy: Simple and effective privacy preservation","volume-title":"Proc. 32nd Int. Conf. Very Large Data Bases","author":"Xiao"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2017.8108955"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.65"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.236"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"ref171","article-title":"Privacy-preserving data synthetisation for secure information sharing","author":"Carvalho","year":"2022","journal-title":"arXiv:2212.00484"},{"key":"ref172","first-page":"407","article-title":"Statistical analysis of masked data","volume":"9","author":"Little","year":"1993","journal-title":"J. Off. Statist."},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1002\/0470090456.ch13"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47804-3_12"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.04.005"},{"key":"ref176","volume-title":"Synthetic Data Industry Connections Activity Initiation Document (ICAID)","year":"2024"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/168\/01688"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"ref182","volume-title":"A Fully Homomorphic Encryption Scheme","author":"Gentry","year":"2009"},{"key":"ref183","volume-title":"IT Security Techniques\u2014Encryption Algorithms","year":"2019"},{"key":"ref184","volume-title":"Information Security\u2014Encryption Algorithms","year":"2024"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"ref187","volume-title":"How to exchange secrets with oblivious transfer","author":"Rabin","year":"2005"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"ref189","volume-title":"Information Technology\u2014Security Techniques\u2014Secret Sharing","year":"2024"},{"key":"ref190","volume-title":"Information Technology\u2014Security Techniques\u2014Secret Sharing","year":"2024"},{"key":"ref191","volume-title":"Information Security\u2014Secure Multiparty Computation","year":"2024"},{"key":"ref192","article-title":"A survey of published attacks on Intel SGX","author":"Nilsson","year":"2020","journal-title":"arXiv:2006.13598"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122410"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0067"},{"key":"ref196","volume-title":"Information Technology\u2014Trusted Platform Module Library","year":"2015"},{"key":"ref197","volume-title":"IEEE Standard for Technical Framework and Requirements of Trusted Execution Environment based Shared Machine Learning","year":"2024"},{"key":"ref198","volume-title":"Advanced Trusted Environment: OMTP TR1","year":"2024"},{"key":"ref199","volume-title":"Specifications archive","year":"2024"},{"key":"ref200","volume-title":"PSA certified: IoT security framework and certification","year":"2024"},{"key":"ref201","volume-title":"P2952 standard for secure computing based on trusted execution environment","year":"2024"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106775"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3124599"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1145\/3490237"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1145\/3604904"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"ref208","first-page":"1","article-title":"Privacy-preserving aggregation of time-series data","volume-title":"Proc. Annu. Netw. Distrib. System Secur. Symp. (NDSS)","author":"Shi"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2020.2976185"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12454"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref212","first-page":"1","article-title":"Learning differentially private recurrent language models","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"McMahan"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31594-7_39"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref216","first-page":"3574","article-title":"Collecting telemetry data privately","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Ding"},{"key":"ref217","volume-title":"Differential Privacy: Issues for Policymakers","author":"Feldman","year":"2020"},{"key":"ref218","volume-title":"Privacy Enhancing Data De-Identification Terminology and Classification of Techniques","year":"2018"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1145\/3362032"},{"key":"ref220","first-page":"243","article-title":"Distance-based and probabilistic record linkage for re-identification of records with categorical variables","volume-title":"Proc. Butllet\u00ed de lACIA, Associaci\u00f3 Catalana dIntellig\u00e9ncia Artif.","author":"Domingo-Ferrer"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2015.V7.924"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-74251-5_34"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150435"},{"key":"ref224","first-page":"807","article-title":"Comparing SDC methods for microdata on the basis of information loss and disclosure risk","volume-title":"Proc. ETK-NTTS","author":"Domingo-Ferrer"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775089"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/TechDefense59795.2023.10380808"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833689"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2023.3261111"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2021.3092702"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3304318"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015962"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3189532"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2841875"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/SmartNets50376.2021.9555418"},{"key":"ref235","volume-title":"How large is the digital universe? How fast is it growing? 2014 EMC digital universe study now available:","author":"Price","year":"2014"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1038\/nnano.2014.254"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2748998"},{"key":"ref238","volume-title":"Internet and Social Media Users in the World 2023","year":"2023"},{"key":"ref239","first-page":"45","article-title":"ARGUS, Software for statistical disclosure","volume-title":"Proc. Annu. Res. Conf.","author":"De Waal"},{"key":"ref240","first-page":"111","volume-title":"Putting Statistical Disclosure Control into Practice: The ARX Data Anonymization Tool","author":"Prasser","year":"2015"},{"key":"ref241","volume-title":"Amnesia anonymization tool-data anonymization made easy","author":"Terrovitis","year":"2024"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v067.i04"},{"key":"ref243","volume-title":"GDPR compliant testing","year":"2024"},{"key":"ref244","volume-title":"Peace of mind\u2013immediate insights","year":"2024"},{"key":"ref245","volume-title":"Anonymization toolBox; data security and privacy lab","year":"2024"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"ref247","volume-title":"Cornell anonymization toolkit","year":"2024"},{"key":"ref248","volume-title":"Open anonymizer","year":"2024"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.14778\/1687553.1687607"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71703-4_18"},{"key":"ref252","volume-title":"SECRETA: A System for Evaluating and Comparing Relational and Transaction Anonymization Algorithms","author":"Poulis","year":"2014"},{"key":"ref253","volume-title":"The SECRETa system","year":"2024"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1145\/3358695.3360918"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.14301\/llcs.v9i4.478"},{"key":"ref256","volume-title":"HiPaa home","year":"2024"},{"key":"ref257","volume-title":"Children\u2019s online privacy protection rule (\u2018COPPa\u2019)","year":"2024"},{"key":"ref258","volume-title":"APEC privacy framework","year":"2024"},{"key":"ref259","volume-title":"EU-U.S. privacy shield","year":"2024"},{"key":"ref260","volume-title":"CURIA-documents","year":"2024"},{"key":"ref261","volume-title":"Standard contractual clauses (SCC)","year":"2024"},{"key":"ref262","volume-title":"Guide to binding corporate rules","year":"2024"},{"key":"ref263","volume-title":"Home-the Wassenaar arrangement","year":"2024"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_14"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_7"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_10"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069376"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1145\/3440249"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.15"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1145\/3020003"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142499"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980235"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1109\/SMC42975.2020.9283102"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9739\/11207096\/10806874.pdf?arnumber=10806874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T18:00:02Z","timestamp":1760983202000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10806874\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":273,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/comst.2024.3519861","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}