{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:57Z","timestamp":1750307517385,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,29]],"date-time":"2009-06-29T00:00:00Z","timestamp":1246233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,29]]},"DOI":"10.1145\/1559845.1559863","type":"proceedings-article","created":{"date-parts":[[2009,7,8]],"date-time":"2009-07-08T17:34:19Z","timestamp":1247074459000},"page":"153-164","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Privacy preservation of aggregates in hidden databases"],"prefix":"10.1145","author":[{"given":"Arjun","family":"Dasgupta","sequence":"first","affiliation":[{"name":"University of Texas at Arlington, Arlington, TX, USA"}]},{"given":"Nan","family":"Zhang","sequence":"additional","affiliation":[{"name":"George Washington University, Washington D.C., DC, USA"}]},{"given":"Gautam","family":"Das","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington, Arlington, TX, USA"}]},{"given":"Surajit","family":"Chaudhuri","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,6,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Disclose Limitation of Sensitive Rules. Knowledge and Data Exchange Workshop","author":"Atallah M.","year":"1999","unstructured":"M. Atallah , E. Bertino , A. K. Elmagarmid , M. Ibrahim , V. S. Verykios , Disclose Limitation of Sensitive Rules. Knowledge and Data Exchange Workshop 1999 . M. Atallah, E. Bertino, A. K. Elmagarmid, M. Ibrahim, V. S. Verykios, Disclose Limitation of Sensitive Rules. Knowledge and Data Exchange Workshop 1999."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872771"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066187"},{"key":"e_1_3_2_1_5_1","volume-title":"WWW","author":"Bharat K.","year":"1998","unstructured":"K. Bharat and A. Broder . A Technique for Measuring the Relative Size and Overlap of Public Web Search Engines . WWW 1998 . K. Bharat and A. Broder. A Technique for Measuring the Relative Size and Overlap of Public Web Search Engines. WWW 1998."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135833"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242627"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2002.994751"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/382979.383040"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564731"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453916"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247550"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.112"},{"key":"e_1_3_2_1_17_1","volume-title":"CCS","author":"Elson J.","year":"2007","unstructured":"J. Elson , J. R. Douceur , J. Howell , J. Saul : Asirra: a CAPTCHA that exploits interest-aligned manual image categorization , CCS 2007 . J. Elson, J. R. Douceur, J. Howell, J. Saul: Asirra: a CAPTCHA that exploits interest-aligned manual image categorization, CCS 2007."},{"key":"e_1_3_2_1_18_1","unstructured":"http:\/\/code.google.com\/apis\/soapsearch\/api_faq.html  http:\/\/code.google.com\/apis\/soapsearch\/api_faq.html"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183614.1183721"},{"key":"e_1_3_2_1_20_1","volume-title":"The UCI KDD Archive {http:\/\/kdd.ics.uci.edu}","author":"Hettich S.","year":"1999","unstructured":"S. Hettich and S. D. Bay , The UCI KDD Archive {http:\/\/kdd.ics.uci.edu} . Irvine, CA : University of California, Department of Information and Computer Science . 1999 . S. Hettich and S. D. Bay, The UCI KDD Archive {http:\/\/kdd.ics.uci.edu}. Irvine, CA: University of California, Department of Information and Computer Science. 1999."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031453.1031456"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2006.01.009"},{"key":"e_1_3_2_1_23_1","volume-title":"VLDB","author":"Ipeirotis P. G.","year":"2002","unstructured":"P. G. Ipeirotis , L. Gravano : Distributed Search over the Hidden Web: Hierarchical Database Sampling and Selection . VLDB 2002 . P. G. Ipeirotis, L. Gravano: Distributed Search over the Hidden Web: Hierarchical Database Sampling and Selection. VLDB 2002."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/383891.383894"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065183"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454163"},{"key":"e_1_3_2_1_28_1","volume-title":"VLDB","author":"Nabar S. U.","year":"2006","unstructured":"S. U. Nabar , B. Marthi , K. Kenthapadi , N. Mishra , and R. Motwani , Towards robustness in query auditing . VLDB 2006 . S. U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra, and R. Motwani, Towards robustness in query auditing. VLDB 2006."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1269668"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.142"}],"event":{"name":"SIGMOD\/PODS '09: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","ACM Association for Computing Machinery"],"location":"Providence Rhode Island USA","acronym":"SIGMOD\/PODS '09"},"container-title":["Proceedings of the 2009 ACM SIGMOD International Conference on Management of data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1559845.1559863","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1559845.1559863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:11Z","timestamp":1750249091000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1559845.1559863"}},"subtitle":["why and how?"],"short-title":[],"issued":{"date-parts":[[2009,6,29]]},"references-count":31,"alternative-id":["10.1145\/1559845.1559863","10.1145\/1559845"],"URL":"https:\/\/doi.org\/10.1145\/1559845.1559863","relation":{},"subject":[],"published":{"date-parts":[[2009,6,29]]},"assertion":[{"value":"2009-06-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}