{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:36:55Z","timestamp":1775281015644,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,6,13]],"date-time":"2004-06-13T00:00:00Z","timestamp":1087084800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,6,13]]},"DOI":"10.1145\/1008694.1008698","type":"proceedings-article","created":{"date-parts":[[2004,7,20]],"date-time":"2004-07-20T15:55:38Z","timestamp":1090338938000},"page":"19-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":131,"title":["Privacy-preserving data integration and sharing"],"prefix":"10.1145","author":[{"given":"Chris","family":"Clifton","sequence":"first","affiliation":[{"name":"Purdue University"}]},{"given":"Murat","family":"Kantarcio\u01e7lu","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"AnHai","family":"Doan","sequence":"additional","affiliation":[{"name":"University of Illinois"}]},{"given":"Gunther","family":"Schadow","sequence":"additional","affiliation":[{"name":"The Regenstrief Institute for Healthcare"}]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[{"name":"Rutgers University"}]},{"given":"Ahmed","family":"Elmagarmid","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Dan","family":"Suciu","sequence":"additional","affiliation":[{"name":"The University of Washington"}]}],"member":"320","published-online":{"date-parts":[[2004,6,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/76894.76895"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872771"},{"key":"e_1_3_2_1_3_1","first-page":"143","volume-title":"Hong Kong, Aug. 20--23","author":"Agrawal R.","year":"2002","unstructured":"R. Agrawal , J. Kiernan , R. Srikant , and Y. Xu , \" Hippocratic databases,\" in Proceedings of the 28th International Conference on Very Large Databases , Hong Kong, Aug. 20--23 2002 , pp. 143 -- 154 . {Online}. Available: http:\/\/www.vldb.org\/conf\/2002\/S05P02.pdf R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, \"Hippocratic databases,\" in Proceedings of the 28th International Conference on Very Large Databases, Hong Kong, Aug. 20--23 2002, pp. 143--154. {Online}. Available: http:\/\/www.vldb.org\/conf\/2002\/S05P02.pdf"},{"key":"e_1_3_2_1_4_1","first-page":"293","volume-title":"Secure supply-chain protocols,\" in IEEE International Conference on E-Commerce","author":"Atallah M. J.","year":"2003","unstructured":"M. J. Atallah , H. G. Elmongui , V. Deshpande , and L. B. Schwarz , \" Secure supply-chain protocols,\" in IEEE International Conference on E-Commerce , Newport Beach , California, June 24--27 2003 , pp. 293 -- 302 . {Online}. Available: http:\/\/ieeexplore.ieee. org\/xpl\/citationdwnld.jsp?arNumber=1210264 M. J. Atallah, H. G. Elmongui, V. Deshpande, and L. B. Schwarz, \"Secure supply-chain protocols,\" in IEEE International Conference on E-Commerce, Newport Beach, California, June 24--27 2003, pp. 293--302. {Online}. Available: http:\/\/ieeexplore.ieee. org\/xpl\/citationdwnld.jsp?arNumber=1210264"},{"key":"e_1_3_2_1_5_1","volume-title":"Database Engineering and Applications Symposium (IDEAS)","author":"Castano S.","year":"1999","unstructured":"S. Castano and V. D. Antonellis , \" A schema analysis and reconciliation tool environment,\" in Proceedings of the Int . Database Engineering and Applications Symposium (IDEAS) , 1999 . S. Castano and V. D. Antonellis, \"A schema analysis and reconciliation tool environment,\" in Proceedings of the Int. Database Engineering and Applications Symposium (IDEAS), 1999."},{"key":"e_1_3_2_1_6_1","first-page":"3","volume-title":"Jan. 3--6","author":"Chowdhury S. D.","year":"1996","unstructured":"S. D. Chowdhury , G. T. Duncan , R. Krishnan , S. Roehrig , and S. Mukherjee , \" Logical vs. numerical inference on statistical databases,\" in Proceedings of the Twenty-Ninth Hawaii International Conference on System Sciences , Jan. 3--6 1996 , pp. 3 -- 10 . S. D. Chowdhury, G. T. Duncan, R. Krishnan, S. Roehrig, and S. Mukherjee, \"Logical vs. numerical inference on statistical databases,\" in Proceedings of the Twenty-Ninth Hawaii International Conference on System Sciences, Jan. 3--6 1996, pp. 3--10."},{"key":"e_1_3_2_1_7_1","first-page":"428","volume-title":"Experience with a combined approach to attribute-matching across heterogeneous databases,\" in 7th IFIP 2.6 Working Conference on Database Semantics","author":"Clifton C.","year":"1997","unstructured":"C. Clifton , E. Housman , and A. Rosenthal , \" Experience with a combined approach to attribute-matching across heterogeneous databases,\" in 7th IFIP 2.6 Working Conference on Database Semantics . Leysin, Switzerland : Chapman & Hall , Oct. 7--10 1997 , pp. 428 -- 451 . C. Clifton, E. Housman, and A. Rosenthal, \"Experience with a combined approach to attribute-matching across heterogeneous databases,\" in 7th IFIP 2.6 Working Conference on Database Semantics. Leysin, Switzerland: Chapman & Hall, Oct. 7--10 1997, pp. 428--451."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0258(19960915)15:17<1895::AID-SIM401>3.0.CO;2-W"},{"key":"e_1_3_2_1_10_1","volume-title":"The platform for privacy preferences 1.0 (P3P1.0) specification","author":"Cranor L.","year":"2002","unstructured":"L. Cranor , M. Langheinrich , M. Marchiori , M. Presler-Marshall , and J. Reagle , \" The platform for privacy preferences 1.0 (P3P1.0) specification ,\" Apr. 16 2002 . {Online}. Available: http:\/\/www.w3.org\/TR\/P3P\/ L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-Marshall, and J. Reagle, \"The platform for privacy preferences 1.0 (P3P1.0) specification,\" Apr. 16 2002. {Online}. Available: http:\/\/www.w3.org\/TR\/P3P\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/320613.320616"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021765902788"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/320064.320068"},{"key":"e_1_3_2_1_15_1","volume-title":"TAILOR: A record linkage toolbox,\" in Proceedings of the 18th International Conference on Data Engineering","author":"Elfeky M.","year":"2002","unstructured":"M. Elfeky , V. Verykios , and A. Elmagarmid , \" TAILOR: A record linkage toolbox,\" in Proceedings of the 18th International Conference on Data Engineering , San Jose , California , Feb. 2002 . M. Elfeky, V. Verykios, and A. Elmagarmid, \"TAILOR: A record linkage toolbox,\" in Proceedings of the 18th International Conference on Data Engineering, San Jose, California, Feb. 2002."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009761603038"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/882082.882102"},{"key":"e_1_3_2_1_18_1","unstructured":"M. Lewis \"Department of defense appropriations act 2004 \" July 17 2003 title VIII section 8120. Enacted as Public Law 108-87. {Online}. Available: http:\/\/thomas.loc.gov\/cgi-bin\/bdquery\/z?d108:h.r.02658:  M. Lewis \"Department of defense appropriations act 2004 \" July 17 2003 title VIII section 8120. Enacted as Public Law 108-87. {Online}. Available: http:\/\/thomas.loc.gov\/cgi-bin\/bdquery\/z?d108:h.r.02658:"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(99)00044-0"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0019-2"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.485628"},{"key":"e_1_3_2_1_22_1","first-page":"898","volume-title":"Controlling access to published data using cryptography,\" in Proceedings of 29th International Conference on Very Large Data Bases (VLDB","author":"Miklau G.","year":"2003","unstructured":"G. Miklau and D. Suciu , \" Controlling access to published data using cryptography,\" in Proceedings of 29th International Conference on Very Large Data Bases (VLDB 2003 ). Berlin, Germany : Morgan-Kaufmann , Sept. 9--12 2003, pp. 898 -- 909 . {Online}. Available: http:\/\/www.vldb.org\/conf\/2003\/papers\/S27P01.pdf G. Miklau and D. Suciu, \"Controlling access to published data using cryptography,\" in Proceedings of 29th International Conference on Very Large Data Bases (VLDB 2003). Berlin, Germany: Morgan-Kaufmann, Sept. 9--12 2003, pp. 898--909. {Online}. Available: http:\/\/www.vldb.org\/conf\/2003\/papers\/S27P01.pdf"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s007780100057"},{"key":"e_1_3_2_1_24_1","first-page":"55","article-title":"Privacy-preserving distributed queries for a clinical case research network,\" in IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, C. Clifton and V. Estivill-Castro, Eds., vol. 14. Maebashi City, Japan","author":"Schadow G.","year":"2002","unstructured":"G. Schadow , S. J. Grannis , and C. J. McDonald , \" Privacy-preserving distributed queries for a clinical case research network,\" in IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, C. Clifton and V. Estivill-Castro, Eds., vol. 14. Maebashi City, Japan : Australian Computer Society , Dec. 9 2002 , pp. 55 -- 65 . {Online}. Available: http:\/\/crpit.com\/Vol14.html G. Schadow, S. J. Grannis, and C. J. McDonald, \"Privacy-preserving distributed queries for a clinical case research network,\" in IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, C. Clifton and V. Estivill-Castro, Eds., vol. 14. Maebashi City, Japan: Australian Computer Society, Dec. 9 2002, pp. 55--65. {Online}. Available: http:\/\/crpit.com\/Vol14.html","journal-title":"Australian Computer Society"},{"key":"e_1_3_2_1_25_1","first-page":"1","article-title":"Don't store my data, Japanese tell government","author":"Struck D.","year":"2002","unstructured":"D. Struck , \" Don't store my data, Japanese tell government ,\" International Herald Tribune , p. 1 , Aug. 24--25 2002 . D. Struck, \"Don't store my data, Japanese tell government,\" International Herald Tribune, p. 1, Aug. 24--25 2002.","journal-title":"International Herald Tribune"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M1345"},{"key":"e_1_3_2_1_27_1","volume-title":"Privacy preserving na\u00efve bayes classifier for vertically partitioned data,\" in 2004 SIAM International Conference on Data Mining","author":"Vaidya J.","year":"2004","unstructured":"J. Vaidya and C. Clifton , \" Privacy preserving na\u00efve bayes classifier for vertically partitioned data,\" in 2004 SIAM International Conference on Data Mining , Lake Buena Vista, Florida , Apr. 22--24 2004 . J. Vaidya and C. Clifton, \"Privacy preserving na\u00efve bayes classifier for vertically partitioned data,\" in 2004 SIAM International Conference on Data Mining, Lake Buena Vista, Florida, Apr. 22--24 2004."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-002-0072-y"}],"event":{"name":"DMKD04: 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery 2004","location":"Paris France","acronym":"DMKD04","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1008694.1008698","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1008694.1008698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:41:07Z","timestamp":1750282867000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1008694.1008698"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,6,13]]},"references-count":27,"alternative-id":["10.1145\/1008694.1008698","10.1145\/1008694"],"URL":"https:\/\/doi.org\/10.1145\/1008694.1008698","relation":{},"subject":[],"published":{"date-parts":[[2004,6,13]]},"assertion":[{"value":"2004-06-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}