{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:15Z","timestamp":1750306875687,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,3,18]],"date-time":"2013-03-18T00:00:00Z","timestamp":1363564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007458","name":"Qatar Foundation","doi-asserted-by":"publisher","award":["09-256-1-046"],"award-info":[{"award-number":["09-256-1-046"]}],"id":[{"id":"10.13039\/100007458","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,3,18]]},"DOI":"10.1145\/2452376.2452399","type":"proceedings-article","created":{"date-parts":[[2013,3,25]],"date-time":"2013-03-25T14:14:26Z","timestamp":1364220866000},"page":"179-190","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Updating outsourced anatomized private databases"],"prefix":"10.1145","author":[{"given":"Ahmet Erhan","family":"Nergiz","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, Indiana"}]},{"given":"Chris","family":"Clifton","sequence":"additional","affiliation":[{"name":"CERIAS Purdue University, West Lafayette, Indiana"}]},{"given":"Qutaibah M.","family":"Malluhi","sequence":"additional","affiliation":[{"name":"Qatar University, Doha, Qatar"}]}],"member":"320","published-online":{"date-parts":[[2013,3,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"In Proc. CIDR","author":"Aggarwal G.","year":"2005","unstructured":"G. Aggarwal , M. Bawa , P. Ganesan , H. Garcia-Molina , K. Kenthapadi , R. Motwani , U. Srivastava , D. Thomas , and Y. Xu . Two can keep a secret: A distributed architecture for secure database services . In In Proc. CIDR , 2005 . G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, and Y. Xu. Two can keep a secret: A distributed architecture for secure database services. In In Proc. CIDR, 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_1_3_1","volume-title":"UCI machine learning repository","author":"Asuncion A.","year":"2007","unstructured":"A. Asuncion and D. Newman . UCI machine learning repository , 2007 . A. Asuncion and D. Newman. UCI machine learning repository, 2007."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1777777.1777820"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453948"},{"key":"e_1_3_2_1_6_1","volume-title":"Riak. Network World","author":"Bushik S.","year":"2012","unstructured":"S. Bushik . A vendor-independent comparison of NoSQL databases: Cassandra, HBase, MongoDB , Riak. Network World , Oct. 22 2012 . S. Bushik. A vendor-independent comparison of NoSQL databases: Cassandra, HBase, MongoDB, Riak. Network World, Oct. 22 2012."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11844662_4"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1805974.1805978"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948124"},{"key":"e_1_3_2_1_10_1","volume-title":"No I.(281):31-50","author":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.","year":"1995","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities , No I.(281):31-50 , Oct. 24 1995 . Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities, No I.(281):31-50, Oct. 24 1995."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353343.1353378"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767924"},{"issue":"157","key":"e_1_3_2_1_14_1","first-page":"53181","article-title":"for privacy of individually identifiable health information","volume":"67","author":"Standard","year":"2002","unstructured":"Standard for privacy of individually identifiable health information . Federal Register , 67 ( 157 ): 53181 -- 53273 , Aug. 14 2002 . Standard for privacy of individually identifiable health information. Federal Register, 67(157):53181--53273, Aug. 14 2002.","journal-title":"Federal Register"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1316689.1316752"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535706_24"},{"key":"e_1_3_2_1_17_1","volume-title":"La cryptographie militaire. Journal des sciences militaires, 9(1):5--38","author":"Kerckhoffs A.","year":"1883","unstructured":"A. Kerckhoffs . La cryptographie militaire. Journal des sciences militaires, 9(1):5--38 , 1883 . A. Kerckhoffs. La cryptographie militaire. Journal des sciences militaires, 9(1):5--38, 1883."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_20_1","first-page":"138","volume-title":"Query processing in private data outsourcing using anonymization","author":"Nergiz A. E.","year":"2011","unstructured":"A. E. Nergiz and C. Clifton . Query processing in private data outsourcing using anonymization . In Y. Li, editor, Data and Applications Security and Privacy XXV , pages 138 -- 153 , 2011 . A. E. Nergiz and C. Clifton. Query processing in private data outsourcing using anonymization. In Y. Li, editor, Data and Applications Security and Privacy XXV, pages 138--153, 2011."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.210"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0933-3657(98)00056-6"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSDBM.2007.16"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150449"},{"key":"e_1_3_2_1_28_1","first-page":"543","volume-title":"Proc. VLDB","author":"Wong R.","year":"2007","unstructured":"R. Wong , A. Fu , K. Wang , and J. Pei . Minimality attack in privacy preserving data publishing . In Proc. VLDB , pages 543 -- 554 , 2007 . R. Wong, A. Fu, K. Wang, and J. Pei. Minimality attack in privacy preserving data publishing. In Proc. VLDB, pages 543--554, 2007."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2010.5447859"},{"key":"e_1_3_2_1_30_1","volume-title":"Proc","author":"Xiao X.","year":"2006","unstructured":"X. Xiao and Y. Tao . Anatomy: Simple and effective privacy preservation . In Proc . VLDB , Seoul, Korea , Sept. 12--15 2006 . X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In Proc. VLDB, Seoul, Korea, Sept. 12--15 2006."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"}],"event":{"name":"EDBT\/ICDT '13: Joint 2013 EDBT\/ICDT Conferences","acronym":"EDBT\/ICDT '13","location":"Genoa Italy"},"container-title":["Proceedings of the 16th International Conference on Extending Database Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2452376.2452399","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2452376.2452399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:24Z","timestamp":1750234704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2452376.2452399"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,18]]},"references-count":31,"alternative-id":["10.1145\/2452376.2452399","10.1145\/2452376"],"URL":"https:\/\/doi.org\/10.1145\/2452376.2452399","relation":{},"subject":[],"published":{"date-parts":[[2013,3,18]]},"assertion":[{"value":"2013-03-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}