{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:09:06Z","timestamp":1776092946233,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T00:00:00Z","timestamp":1529452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1430145,1414119,1718135,1739000"],"award-info":[{"award-number":["1430145,1414119,1718135,1739000"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,20]]},"DOI":"10.1145\/3209811.3212701","type":"proceedings-article","created":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T12:12:39Z","timestamp":1529496759000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Accessible Privacy-Preserving Web-Based Data Analysis for Assessing and Addressing Economic Inequalities"],"prefix":"10.1145","author":[{"given":"Andrei","family":"Lapets","sequence":"first","affiliation":[{"name":"Boston University"}]},{"given":"Frederick","family":"Jansen","sequence":"additional","affiliation":[{"name":"Boston University"}]},{"given":"Kinan Dak","family":"Albab","sequence":"additional","affiliation":[{"name":"Boston University"}]},{"given":"Rawane","family":"Issa","sequence":"additional","affiliation":[{"name":"Boston University"}]},{"given":"Lucy","family":"Qin","sequence":"additional","affiliation":[{"name":"Boston University"}]},{"given":"Mayank","family":"Varia","sequence":"additional","affiliation":[{"name":"Boston University"}]},{"given":"Azer","family":"Bestavros","sequence":"additional","affiliation":[{"name":"Boston University"}]}],"member":"320","published-online":{"date-parts":[[2018,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Tom Ashbrook. 2016. Will Data Help Close the Gender Pay Gap? NPR OnPoint radio show WBUR 90.9. (March 2016). Retrieved May 8 2018 from http:\/\/www.wbur.org\/onpoint\/2016\/03\/30\/gender-gap-pay-gap-boston-amazon.  Tom Ashbrook. 2016. Will Data Help Close the Gender Pay Gap? NPR OnPoint radio show WBUR 90.9. (March 2016). Retrieved May 8 2018 from http:\/\/www.wbur.org\/onpoint\/2016\/03\/30\/gender-gap-pay-gap-boston-amazon."},{"key":"e_1_3_2_1_2_1","unstructured":"Laura Bassett. 2016. Apple Facebook Other Major Companies Commit to Paying Women the Same as Men. HuffPost News. (August 2016). Retrieved May 8 2018 from http:\/\/www.huffingtonpost.com\/entry\/apple-facebook-obama-pay-gap_us_57bf44ede4b02673444f228f.  Laura Bassett. 2016. Apple Facebook Other Major Companies Commit to Paying Women the Same as Men. HuffPost News. (August 2016). Retrieved May 8 2018 from http:\/\/www.huffingtonpost.com\/entry\/apple-facebook-obama-pay-gap_us_57bf44ede4b02673444f228f."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455804"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029603"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Dan Bogdanov Marko J\u00f5emets Sander Siim and Meril Vaht. 2015. How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation. Springer Berlin Heidelberg Berlin Heidelberg 227--234.  Dan Bogdanov Marko J\u00f5emets Sander Siim and Meril Vaht. 2015. How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation. Springer Berlin Heidelberg Berlin Heidelberg 227--234.","DOI":"10.1007\/978-3-662-47854-7_14"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_20"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 19th USENIX Conference on Security (USENIX Security'10)","author":"Burkhart Martin","year":"2010"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"e_1_3_2_1_11_1","unstructured":"U.S. Equal Employment Opportunity Commission. 2018. EEO-1 Survey. (2018). Retrieved May 8 2018 from https:\/\/www.eeoc.gov\/employers\/eeo1survey\/index.cfm.  U.S. Equal Employment Opportunity Commission. 2018. EEO-1 Survey. (2018). Retrieved May 8 2018 from https:\/\/www.eeoc.gov\/employers\/eeo1survey\/index.cfm."},{"key":"e_1_3_2_1_12_1","volume-title":"Council Report","author":"Boston Women's Workforce Council","year":"2017"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Ivan Damg\u00e5rd Kasper Damg\u00e5rd Kurt Nielsen Peter Sebastian Nordholt and Tomas Toft. 2017. Confidential Benchmarking Based on Multiparty Computation. In Financial Cryptography and Data Security. Springer Berlin Heidelberg Berlin Heidelberg 169--187.  Ivan Damg\u00e5rd Kasper Damg\u00e5rd Kurt Nielsen Peter Sebastian Nordholt and Tomas Toft. 2017. Confidential Benchmarking Based on Multiparty Computation. In Financial Cryptography and Data Security. Springer Berlin Heidelberg Berlin Heidelberg 169--187.","DOI":"10.1007\/978-3-662-54970-4_10"},{"key":"e_1_3_2_1_14_1","volume-title":"ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In 22nd Annual Network and Distributed System Security Symposium (NDSS","author":"Demmler Daniel","year":"2015"},{"key":"e_1_3_2_1_15_1","volume-title":"SCAPI: The Secure Computation Application Programming Interface. Cryptology ePrint Archive, Report 2012\/629. (November","author":"Ejgenberg Yael","year":"2012"},{"key":"e_1_3_2_1_16_1","first-page":"3","article-title":"A secure protocol for protecting the identity of providers when disclosing data for disease surveillance","volume":"18","author":"Emam Khaled El","year":"2011","journal-title":"Journal of the American Medical Informatics Association"},{"key":"e_1_3_2_1_17_1","unstructured":"Oded Goldreich. 2004. The Foundations of Cryptography - Volume 2 Basic Applications. Cambridge University Press New York NY USA.   Oded Goldreich. 2004. The Foundations of Cryptography - Volume 2 Basic Applications. Cambridge University Press New York NY USA."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517845"},{"key":"e_1_3_2_1_20_1","unstructured":"Katie Johnston. 2015. Mayor Walsh pushes to gather data on gender wage gap. The Boston Globe. (April 2015). Retrieved May 8 2018 from https:\/\/www.bostonglobe.com\/business\/2015\/04\/07\/walsh-women-venture-capital-summit-says-female-staff-members-underpaid\/nKlivDh1VtOCV8hwVJ5XNM\/story.html.  Katie Johnston. 2015. Mayor Walsh pushes to gather data on gender wage gap. The Boston Globe. (April 2015). Retrieved May 8 2018 from https:\/\/www.bostonglobe.com\/business\/2015\/04\/07\/walsh-women-venture-capital-summit-says-female-staff-members-underpaid\/nKlivDh1VtOCV8hwVJ5XNM\/story.html."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Andrei Lapets Nikolaj Volgushev Azer Bestavros Frederick Jansen and Mayank Varia. 2016. Secure MPC for Analytics as a Web Application. In 2016 IEEE Cybersecurity Development (SecDev). 73--74.  Andrei Lapets Nikolaj Volgushev Azer Bestavros Frederick Jansen and Mayank Varia. 2016. Secure MPC for Analytics as a Web Application. In 2016 IEEE Cybersecurity Development (SecDev). 73--74.","DOI":"10.1109\/SecDev.2016.027"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2364527.2364556"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.29"},{"key":"e_1_3_2_1_25_1","unstructured":"Alfred J. Menezes Scott A. Vanstone and Paul C. Van Oorschot. 1996. Handbook of Applied Cryptography (1st ed.). CRC Press Inc. Boca Raton FL USA.   Alfred J. Menezes Scott A. Vanstone and Paul C. Van Oorschot. 1996. Handbook of Applied Cryptography (1st ed.). CRC Press Inc. Boca Raton FL USA."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.30"},{"key":"e_1_3_2_1_27_1","unstructured":"Greater Boston Chamber of Commerce. 2018. GBCC Launches Pacesetters Initiative Aimed at Uniting the Business Community's Response to Economic Inclusion. (January 2018). Retrieved May 8 2018 from http:\/\/bostonchamber.com\/about-us\/media-center\/gbcc-launches-pacesetters-initiative.  Greater Boston Chamber of Commerce. 2018. GBCC Launches Pacesetters Initiative Aimed at Uniting the Business Community's Response to Economic Inclusion. (January 2018). Retrieved May 8 2018 from http:\/\/bostonchamber.com\/about-us\/media-center\/gbcc-launches-pacesetters-initiative."},{"key":"e_1_3_2_1_28_1","unstructured":"Greater Boston Chamber of Commerce. 2018. Pacesetters Initiative. (January 2018). Retrieved May 8 2018 from http:\/\/bostonchamber.com\/programs-events\/pacesetters.  Greater Boston Chamber of Commerce. 2018. Pacesetters Initiative. (January 2018). Retrieved May 8 2018 from http:\/\/bostonchamber.com\/programs-events\/pacesetters."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Jason Perry Debayan Gupta Joan Feigenbaum and Rebecca N. Wright. 2014. Systematizing Secure Computation for Research and Decision Support. In Security and Cryptography for Networks Michel Abdalla and Roberto De Prisco (Eds.). Springer International Publishing Cham 380--397.  Jason Perry Debayan Gupta Joan Feigenbaum and Rebecca N. Wright. 2014. Systematizing Secure Computation for Research and Decision Support. In Security and Cryptography for Networks Michel Abdalla and Roberto De Prisco (Eds.). Springer International Publishing Cham 380--397.","DOI":"10.1007\/978-3-319-10879-7_22"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.48"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2093509"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.32"},{"key":"e_1_3_2_1_34_1","unstructured":"Multiparty.org Development Team. 2018. JavaScript Implementation of Federated Functionalities. (May 2018). Retrieved May 8 2018 from https:\/\/github.com\/multiparty\/jiff.  Multiparty.org Development Team. 2018. JavaScript Implementation of Federated Functionalities. (May 2018). Retrieved May 8 2018 from https:\/\/github.com\/multiparty\/jiff."},{"key":"e_1_3_2_1_35_1","unstructured":"Multiparty.org Development Team. 2018. Web-MPC. (March 2018). Retrieved May 8 2018 from https:\/\/github.com\/multiparty\/web-mpc.  Multiparty.org Development Team. 2018. Web-MPC. (March 2018). Retrieved May 8 2018 from https:\/\/github.com\/multiparty\/web-mpc."},{"key":"e_1_3_2_1_36_1","unstructured":"VIFF Development Team. 2009. VIFF the Virtual Ideal Functionality Framework. (December 2009). Retrieved May 8 2018 from http:\/\/viff.dk\/.  VIFF Development Team. 2009. VIFF the Virtual Ideal Functionality Framework. (December 2009). Retrieved May 8 2018 from http:\/\/viff.dk\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"}],"event":{"name":"COMPASS '18: ACM SIGCAS Conference on Computing and Sustainable Societies","location":"Menlo Park and San Jose CA USA","acronym":"COMPASS '18","sponsor":["SIGCAS ACM Special Interest Group on Computers and Society"]},"container-title":["Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209811.3212701","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3209811.3212701","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3209811.3212701","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:09Z","timestamp":1750212789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209811.3212701"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,20]]},"references-count":36,"alternative-id":["10.1145\/3209811.3212701","10.1145\/3209811"],"URL":"https:\/\/doi.org\/10.1145\/3209811.3212701","relation":{},"subject":[],"published":{"date-parts":[[2018,6,20]]},"assertion":[{"value":"2018-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}