{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:16Z","timestamp":1750308016151,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,10,30]],"date-time":"2006-10-30T00:00:00Z","timestamp":1162166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,10,30]]},"DOI":"10.1145\/1501434.1501468","type":"proceedings-article","created":{"date-parts":[[2009,2,4]],"date-time":"2009-02-04T13:02:04Z","timestamp":1233752524000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Query rewriting for detection of privacy violation through inferencing"],"prefix":"10.1145","author":[{"given":"Vikram","family":"Goyal","sequence":"first","affiliation":[{"name":"I.I.T. Delhi, Hauz Khas, New Delhi"}]},{"given":"S. K.","family":"Gupta","sequence":"additional","affiliation":[{"name":"I.I.T. Delhi, Hauz Khas, New Delhi"}]},{"given":"Shobhit","family":"Saxena","sequence":"additional","affiliation":[{"name":"I.I.T. Delhi, Hauz Khas, New Delhi"}]}],"member":"320","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AT &amp; T privacy bird. http:\/\/www.privacybird.com\/.  AT &amp; T privacy bird. http:\/\/www.privacybird.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"IBM Tivoli Privacy Manager for e-business. http:\/\/www-306.ibm.com\/software\/info\/ecatalog\/en_TH\/products\/K106003J38182X80.html.  IBM Tivoli Privacy Manager for e-business. http:\/\/www-306.ibm.com\/software\/info\/ecatalog\/en_TH\/products\/K106003J38182X80.html."},{"key":"e_1_3_2_1_3_1","unstructured":"MalDViP: Malafide Intension Based Detection of Privacy Violation. www.cse.iitd.ernet.in\/~vkgoyal.  MalDViP: Malafide Intension Based Detection of Privacy Violation. www.cse.iitd.ernet.in\/~vkgoyal."},{"key":"e_1_3_2_1_4_1","volume-title":"eXtensible Access Control Markup Language (XACML) Version 1.1. OASIS","author":"OASIS","year":"2003","unstructured":"OASIS , eXtensible Access Control Markup Language (XACML) Version 1.1. OASIS , 07 August 2003 . OASIS, eXtensible Access Control Markup Language (XACML) Version 1.1. OASIS, 07 August 2003."},{"volume-title":"Associated Press","year":"2000","key":"e_1_3_2_1_5_1","unstructured":"Toys R Us faces suit for alleged privacy violation . Associated Press , August 3, 2000 . Toys R Us faces suit for alleged privacy violation. Associated Press, August 3, 2000."},{"key":"e_1_3_2_1_6_1","unstructured":"Fliers File Suit Against Jetblue. Associated Press Sep 23 2003.  Fliers File Suit Against Jetblue. Associated Press Sep 23 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1316689.1316735"},{"key":"e_1_3_2_1_8_1","volume-title":"Hippocratic Databases. In Proceedings of the 28th VLDB Conference","author":"Agrawal R.","year":"2002","unstructured":"R. Agrawal , J. Kiernan , R. Srikant , and Y. Xu . Hippocratic Databases. In Proceedings of the 28th VLDB Conference , Hong Kong, China , 2002 . R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic Databases. In Proceedings of the 28th VLDB Conference, Hong Kong, China, 2002."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/509404.509414"},{"key":"e_1_3_2_1_11_1","first-page":"01","volume":"2005","author":"Bhattacharya J.","year":"2005","unstructured":"J. Bhattacharya , R. Dass , V. Kapoor , and S. Gupta . Privacy Violation and Detection Using Pattern Mining Techniques. IIMA Working Papers 2005-07 - 01 , 2005 . J. Bhattacharya, R. Dass, V. Kapoor, and S. Gupta. Privacy Violation and Detection Using Pattern Mining Techniques. IIMA Working Papers 2005-07-01, 2005.","journal-title":"Privacy Violation and Detection Using Pattern Mining Techniques. IIMA Working Papers"},{"key":"e_1_3_2_1_12_1","volume-title":"KBCS","author":"Bhattacharya J.","year":"2004","unstructured":"J. Bhattacharya and S. Gupta . Privacy Broker for Enforcing Privacy Policies in Databases . In KBCS , 2004 . J. Bhattacharya and S. Gupta. Privacy Broker for Enforcing Privacy Policies in Databases. In KBCS, 2004."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.895801"},{"key":"e_1_3_2_1_14_1","volume-title":"Security Breach Could Expose 40M to Fraud","author":"Bruno J. B.","year":"2005","unstructured":"J. B. Bruno . Security Breach Could Expose 40M to Fraud . Associated Press , June 18 2005 . J. B. Bruno. Security Breach Could Expose 40M to Fraud. Associated Press, June 18 2005."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11552338_10"},{"key":"e_1_3_2_1_16_1","volume-title":"Introduction to algorithms","author":"Corman T.","year":"1990","unstructured":"T. Corman , C. Leiserson , and R. Rivest . Introduction to algorithms , 1990 . T. Corman, C. Leiserson, and R. Rivest. Introduction to algorithms, 1990."},{"key":"e_1_3_2_1_17_1","unstructured":"S. M. et al. Enterprise Privacy Authorization Language (EPAL 1.1). http:\/\/www.zurich.ibm.com\/security\/enterpriseprivacy\/epal. IBM Research Report.  S. M. et al. Enterprise Privacy Authorization Language (EPAL 1.1). http:\/\/www.zurich.ibm.com\/security\/enterpriseprivacy\/epal. IBM Research Report."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11961635_29"},{"key":"e_1_3_2_1_19_1","volume-title":"Privacy Violation Detection. Master's thesis","author":"Krekke T.","year":"2004","unstructured":"T. Krekke . Privacy Violation Detection. Master's thesis , Norwegian University of Science and Technology (NTNU) , 22nd June 2004 . Master's Thesis. T. Krekke. Privacy Violation Detection. Master's thesis, Norwegian University of Science and Technology (NTNU), 22nd June 2004. Master's Thesis."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1316689.1316701"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.485628"},{"key":"e_1_3_2_1_22_1","volume-title":"Oracle Privacy Security Auditing","author":"Nanda A.","year":"2003","unstructured":"A. Nanda and D. K. Burleson . Oracle Privacy Security Auditing , 2003 , Rampant . A. Nanda and D. K. Burleson. Oracle Privacy Security Auditing, 2003, Rampant."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.109108"},{"key":"e_1_3_2_1_24_1","volume-title":"January 11","author":"Teasley B.","year":"2005","unstructured":"B. Teasley . Does Your Privacy Policy Mean Anything? http:\/\/www.clickz.com\/experts\/crm\/analyze_data\/article.php , January 11 2005 . B. Teasley. Does Your Privacy Policy Mean Anything? http:\/\/www.clickz.com\/experts\/crm\/analyze_data\/article.php, January 11 2005."}],"event":{"name":"PST06: International Conference on Privacy, Security and Trust","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Markham Ontario Canada","acronym":"PST06"},"container-title":["Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1501434.1501468","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1501434.1501468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:40Z","timestamp":1750259200000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1501434.1501468"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10,30]]},"references-count":23,"alternative-id":["10.1145\/1501434.1501468","10.1145\/1501434"],"URL":"https:\/\/doi.org\/10.1145\/1501434.1501468","relation":{},"subject":[],"published":{"date-parts":[[2006,10,30]]},"assertion":[{"value":"2006-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}