{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T20:10:55Z","timestamp":1774987855109,"version":"3.50.1"},"publisher-location":"New York, New York, USA","reference-count":11,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1145\/2687148.2687150","type":"proceedings-article","created":{"date-parts":[[2015,1,5]],"date-time":"2015-01-05T13:32:15Z","timestamp":1420464735000},"page":"19-26","source":"Crossref","is-referenced-by-count":4,"title":["Privacy integrated data stream queries"],"prefix":"10.1145","author":[{"given":"Lucas","family":"Waye","sequence":"first","affiliation":[]}],"member":"320","reference":[{"key":"key-10.1145\/2687148.2687150-1","doi-asserted-by":"crossref","unstructured":"T.-H. H. Chan, E. Shi, and D. Song. Private and continual release of statistics. ACM Trans. Inf. Syst. Secur., 14(3):26:1--26:24, Nov. 2011.","DOI":"10.1145\/2043621.2043626"},{"key":"key-10.1145\/2687148.2687150-2","doi-asserted-by":"crossref","unstructured":"C. Dwork. Differential privacy. In ICALP, pages 1--12. Springer, 2006.","DOI":"10.1007\/11787006_1"},{"key":"key-10.1145\/2687148.2687150-3","doi-asserted-by":"crossref","unstructured":"C. Dwork, M. Naor, T. Pitassi, and G. N. Rothblum. Differential privacy under continual observation. In Proc. 42nd ACM symposium on Theory of computing, STOC '10, pages 715--724, New York, NY, USA, 2010. ACM.","DOI":"10.1145\/1806689.1806787"},{"key":"key-10.1145\/2687148.2687150-4","unstructured":"C. Dwork, M. Naor, T. Pitassi, G. N. Rothblum, and S. Yekhanin. Pan-private streaming algorithms. In Proc. ICS, 2010."},{"key":"key-10.1145\/2687148.2687150-5","unstructured":"A. Haeberlen, B. C. Pierce, and A. Narayan. Differential privacy under fire. In Proc. 20th USENIX conference on Security, SEC'11, pages 33--33, Berkeley, CA, USA, 2011. USENIX Association."},{"key":"key-10.1145\/2687148.2687150-6","doi-asserted-by":"crossref","unstructured":"G. Kellaris, S. Papadopoulos, X. Xiao, and D. Papadias. Differentially private event sequences over infinite streams. PVLDB, 7(12):1155--1166, 2014.","DOI":"10.14778\/2732977.2732989"},{"key":"key-10.1145\/2687148.2687150-7","doi-asserted-by":"crossref","unstructured":"F. McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. Commun. ACM, 53(9):89--97, Sept. 2010.","DOI":"10.1145\/1810891.1810916"},{"key":"key-10.1145\/2687148.2687150-8","unstructured":"Microsoft. Linq (language integrated query)."},{"key":"key-10.1145\/2687148.2687150-9","doi-asserted-by":"crossref","unstructured":"J. Reed and B. C. Pierce. Distance makes the types grow stronger: a calculus for differential privacy. In Proc. 15th ICFP, ICFP '10, pages 157--168, New York, NY, USA, 2010. ACM.","DOI":"10.1145\/1863543.1863568"},{"key":"key-10.1145\/2687148.2687150-10","unstructured":"I. Roy, S. T. V. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: security and privacy for mapreduce. In Proc. 7th NSDI, NSDI'10, pages 20--20, Berkeley, CA, USA, 2010. USENIX Association."},{"key":"key-10.1145\/2687148.2687150-11","doi-asserted-by":"crossref","unstructured":"L. Sweeney. Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicine &#38; Ethics, 25-2 &#38; 3):98--110, 1997.","DOI":"10.1111\/j.1748-720X.1997.tb01885.x"}],"event":{"name":"the 2014 International Workshop","location":"Portland, Oregon, USA","acronym":"PSP '14","number":"2014","sponsor":["SIGAda, ACM Special Interest Group on Ada Programming Language","SIGPLAN, ACM Special Interest Group on Programming Languages"],"start":{"date-parts":[[2014,10,21]]},"end":{"date-parts":[[2014,10,21]]}},"container-title":["Proceedings of the 2014 International Workshop on Privacy &amp; Security in Programming - PSP '14"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2687148.2687150","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2687150&amp;ftid=1523854&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:13Z","timestamp":1750227133000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2687148.2687150"}},"subtitle":[],"proceedings-subject":"Privacy & Security in Programming","short-title":[],"issued":{"date-parts":[[2014]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1145\/2687148.2687150","relation":{},"subject":[],"published":{"date-parts":[[2014]]}}}