{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T11:49:13Z","timestamp":1752666553047,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"publisher","award":["SFI\/12\/RC\/2289"],"award-info":[{"award-number":["SFI\/12\/RC\/2289"]}],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1145\/3341325.3342002","type":"proceedings-article","created":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T13:04:52Z","timestamp":1567775092000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Sensitive and Private Data Analysis"],"prefix":"10.1145","author":[{"given":"Syeda Sana e","family":"Zainab","sequence":"first","affiliation":[{"name":"Insight Centre for Data Analytics, University College Dublin, Dublin, Ireland"}]},{"given":"Tahar","family":"Kechadi","sequence":"additional","affiliation":[{"name":"Insight Centre for Data Analytics, University College Dublin, Dublin, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2019,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24741-8_12"},{"volume-title":"Privacy-preserving data mining","author":"Aggarwal Charu C","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Charu C Aggarwal and S Yu Philip. 2008. Privacy-preserving data mining: models and algorithms. Springer Science & Business Media.   Charu C Aggarwal and S Yu Philip. 2008. Privacy-preserving data mining: models and algorithms. Springer Science & Business Media.","DOI":"10.1007\/978-0-387-70992-5"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/519168.788219"},{"key":"e_1_3_2_1_6_1","first-page":"1","article-title":"Global trends in privacy protection: An international survey of privacy, data protection, and surveillance laws and developments","author":"Banisar David","year":"1999","journal-title":"J. Marshall J. Computer & Info."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-005-0006-6"},{"volume-title":"Privacy-preserving data mining","author":"Bertino Elisa","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2009.5277074"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/582353.582376"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2838421.2838448"},{"volume-title":"Data and Application Security","author":"Chang LiWu","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Gauthier Chassang. 2017. The impact of the EU general data protection regulation on scientific research. ecancermedicalscience 11 (2017).  Gauthier Chassang. 2017. The impact of the EU general data protection regulation on scientific research. ecancermedicalscience 11 (2017).","DOI":"10.3332\/ecancer.2017.709"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972771.8"},{"key":"e_1_3_2_1_15_1","unstructured":"Lorrie Cranor Tal Rabin Vitaly Shmatikov Salil Vadhan and Daniel Weitzner. 2016. Towards a privacy research roadmap for the computing community. arXiv preprint arXiv:1604.03160 (2016).  Lorrie Cranor Tal Rabin Vitaly Shmatikov Salil Vadhan and Daniel Weitzner. 2016. Towards a privacy research roadmap for the computing community. arXiv preprint arXiv:1604.03160 (2016)."},{"key":"e_1_3_2_1_16_1","first-page":"555","article-title":"Advanced content and data distribution techniques","volume":"7","author":"Decasper Dan S","year":"2009","journal-title":"US Patent"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772869"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2003.09.001"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2307\/795891"},{"key":"e_1_3_2_1_20_1","unstructured":"Ahmed HajYasien. 2007. Preserving privacy in association rule mining. Ph.D. Dissertation. Ph. D Thesis University of Griffith.  Ahmed HajYasien. 2007. Preserving privacy in association rule mining. Ph.D. Dissertation. Ph. D Thesis University of Griffith."},{"volume-title":"International social work 51, 6","year":"2008","author":"Healy Lynne M","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2012.6250782"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3137616.3137618"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WICT.2011.6141241"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.45"},{"key":"e_1_3_2_1_26_1","unstructured":"MohammadReza Keyvanpour and Somayyeh Seifi Moradi. 2011. Classification and evaluation the privacy preserving data mining techniques by using a data modification-based framework. arXiv preprint arXiv:1105.1945 (2011).  MohammadReza Keyvanpour and Somayyeh Seifi Moradi. 2011. Classification and evaluation the privacy preserving data mining techniques by using a data modification-based framework. arXiv preprint arXiv:1105.1945 (2011)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISA.2013.6623688"},{"volume-title":"Proc. of the ESSV 2014, Conference on Electronic Speech Signal Processing. 1--10","year":"2014","author":"Lange Patrick","key":"e_1_3_2_1_28_1"},{"volume-title":"Ubiquitous computing fundamentals","author":"Langheinrich Marc","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CONIELECOMP.2007.80"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2010.66"},{"key":"e_1_3_2_1_32_1","unstructured":"Daniel D Lee and H Sebastian Seung. 2001. Algorithms for non-negative matrix factorization. In Advances in neural information processing systems. 556--562.  Daniel D Lee and H Sebastian Seung. 2001. Algorithms for non-negative matrix factorization. In Advances in neural information processing systems. 556--562."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.124"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/646765.704129"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.14"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2012.15"},{"volume-title":"23rd BILETA Conference","year":"2008","author":"Cullagh Karen Mc","key":"e_1_3_2_1_40_1"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2016.7543742"},{"key":"e_1_3_2_1_42_1","article-title":"A survey on privacy preserving data mining: approaches and techniques","volume":"3","author":"Nayak Gayatri","year":"2011","journal-title":"International Journal of Engineering Science and Technology"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/850782.850789"},{"key":"e_1_3_2_1_44_1","first-page":"473","article-title":"Data loss prevention (DLP) methods by a cloud service including third party integration architectures","volume":"9","author":"Pearl Annie","year":"2016","journal-title":"US Patent"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proenv.2012.01.432"},{"key":"e_1_3_2_1_46_1","article-title":"A Study on Privacy Preserving Data Mining: Techniques, Challenges and Future Prospects","volume":"3","author":"Raj Ronica","year":"2015","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/1287369.1287428"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.94"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/882479.883719"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Ferdinand David Schoeman. 1984. Philosophical dimensions of privacy: An anthology. Cambridge University Press.  Ferdinand David Schoeman. 1984. Philosophical dimensions of privacy: An anthology. Cambridge University Press.","DOI":"10.1017\/CBO9780511625138"},{"key":"e_1_3_2_1_52_1","first-page":"300","article-title":"Review of business intelligence through data analysis. Benchmarking","volume":"21","author":"Xia Belle Selene","year":"2014","journal-title":"An International Journal"},{"key":"e_1_3_2_1_53_1","first-page":"40","article-title":"Privacy preserving data mining: Techniques classification and implications\u00e2\u0102\u0164A survey","volume":"137","author":"Shah Alpa","year":"2016","journal-title":"Int. J. Comput. Appl"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2006.116"},{"volume-title":"Grid and Distributed Computing, Control and Automation","author":"Tsiafoulis S","key":"e_1_3_2_1_55_1"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5120\/21056-3704"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775142"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"},{"volume-title":"A practical approach to microarray data analysis","author":"Wall Michael E","key":"e_1_3_2_1_59_1"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Gregory J Walters. 2002. Human rights in an information age: A philosophical analysis. University of Toronto Press.   Gregory J Walters. 2002. Human rights in an information age: A philosophical analysis. University of Toronto Press.","DOI":"10.3138\/9781442675926"},{"key":"e_1_3_2_1_61_1","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin Alan F","year":"1968","journal-title":"Washington and Lee Law Review"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150499"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.9"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Shui Yu. 2016. Big privacy: Challenges and opportunities of privacy study in the age of big data. IEEE access 4 (2016) 2751--2763.  Shui Yu. 2016. Big privacy: Challenges and opportunities of privacy study in the age of big data. IEEE access 4 (2016) 2751--2763.","DOI":"10.1109\/ACCESS.2016.2577036"}],"event":{"name":"ICFNDS '19: 3rd International Conference on Future Networks and Distributed Systems","sponsor":["CNAM Conservatoire des Arts et M\u00e9tiers"],"location":"Paris France","acronym":"ICFNDS '19"},"container-title":["Proceedings of the 3rd International Conference on Future Networks and Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342002","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341325.3342002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:57Z","timestamp":1750201977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342002"}},"subtitle":["A Systematic Review"],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":64,"alternative-id":["10.1145\/3341325.3342002","10.1145\/3341325"],"URL":"https:\/\/doi.org\/10.1145\/3341325.3342002","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]},"assertion":[{"value":"2019-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}