{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:09:37Z","timestamp":1773655777139,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T00:00:00Z","timestamp":1623196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Israeli Science Foundation","award":["978\/17"],"award-info":[{"award-number":["978\/17"]}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["804302"],"award-info":[{"award-number":["804302"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,9]]},"DOI":"10.1145\/3448016.3452835","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T17:22:39Z","timestamp":1624036959000},"page":"379-391","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["On Optimizing the Trade-off between Privacy and Utility in Data Provenance"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Deutch","sequence":"first","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"given":"Ariel","family":"Frankenthal","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"given":"Amir","family":"Gilad","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Yuval","family":"Moskovitch","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989284.1989302"},{"key":"e_1_3_2_2_2_1","volume-title":"4th Workshop on the Theory and Practice of Provenance, TaPP","author":"Anderson Paul","year":"2012","unstructured":"Paul Anderson and James Cheney . Toward provenance-based security for configuration languages. In Umut A. Acar and Todd J. Green, editors , 4th Workshop on the Theory and Practice of Provenance, TaPP , 2012 . Paul Anderson and James Cheney. Toward provenance-based security for configuration languages. In Umut A. Acar and Todd J. Green, editors, 4th Workshop on the Theory and Practice of Provenance, TaPP, 2012."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983825"},{"key":"e_1_3_2_2_4_1","first-page":"1","volume-title":"ICDT","volume":"48","author":"Assadi Sepehr","year":"2016","unstructured":"Sepehr Assadi , Sanjeev Khanna , Yang Li , and Val Tannen . Algorithms for provisioning queries and analytics . In ICDT , volume 48 , pages 18: 1 -- 18 :18, 2016 . Sepehr Assadi, Sanjeev Khanna, Yang Li, and Val Tannen. Algorithms for provisioning queries and analytics. In ICDT, volume 48, pages 18:1--18:18, 2016."},{"key":"e_1_3_2_2_5_1","unstructured":"TPC Benchmark. http:\/\/www.tpc.org\/tpch.  TPC Benchmark. http:\/\/www.tpc.org\/tpch."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-014-0322-7"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497516"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1412331.1412340"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/645504.656274"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998456"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/800105.803397"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559901"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAIM.2008.41"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2010.38"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(99)00220-0"},{"key":"e_1_3_2_2_16_1","first-page":"379","volume-title":"Foundations and Trends in Databases","author":"Cheney J.","year":"2009","unstructured":"J. Cheney , L. Chiticariu , and W. C. Tan . Provenance in databases: Why, how, and where . Foundations and Trends in Databases , pages 379 -- 474 , 2009 . J. Cheney, L. Chiticariu, and W. C. Tan. Provenance in databases: Why, how, and where. Foundations and Trends in Databases, pages 379--474, 2009."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.26"},{"key":"e_1_3_2_2_18_1","first-page":"113","volume-title":"IPAW","volume":"8628","author":"Cheney James","year":"2014","unstructured":"James Cheney and Roly Perera . An analytical survey of provenance sanitization . In IPAW , volume 8628 , pages 113 -- 126 , 2014 . James Cheney and Roly Perera. An analytical survey of provenance sanitization. In IPAW, volume 8628, pages 113--126, 2014."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989284.1989305"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1938551.1938554"},{"key":"e_1_3_2_2_21_1","first-page":"215","volume-title":"CIDR","author":"Davidson Susan B.","year":"2011","unstructured":"Susan B. Davidson , Sanjeev Khanna , Val Tannen , Sudeepa Roy , Yi Chen , Tova Milo , and Julia Stoyanovich . Enabling privacy in provenance-aware workflow systems . In CIDR , pages 215 -- 218 , 2011 . Susan B. Davidson, Sanjeev Khanna, Val Tannen, Sudeepa Roy, Yi Chen, Tova Milo, and Julia Stoyanovich. Enabling privacy in provenance-aware workflow systems. In CIDR, pages 215--218, 2011."},{"key":"e_1_3_2_2_22_1","volume-title":"On optimizing the trade-off between privacy and utility in data provenance. CoRR, abs\/2103.00288","author":"Deutch Daniel","year":"2021","unstructured":"Daniel Deutch , Ariel Frankenthal , Amir Gilad , and Yuval Moskovitch . On optimizing the trade-off between privacy and utility in data provenance. CoRR, abs\/2103.00288 , 2021 . Daniel Deutch, Ariel Frankenthal, Amir Gilad, and Yuval Moskovitch. On optimizing the trade-off between privacy and utility in data provenance. CoRR, abs\/2103.00288, 2021."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-019-00584-7"},{"key":"e_1_3_2_2_24_1","first-page":"277","volume-title":"EDBT","author":"Deutch Daniel","year":"2019","unstructured":"Daniel Deutch and Amir Gilad . Reverse-engineering conjunctive queries from provenance examples . In EDBT , pages 277 -- 288 , 2019 . Daniel Deutch and Amir Gilad. Reverse-engineering conjunctive queries from provenance examples. In EDBT, pages 277--288, 2019."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3300084"},{"key":"e_1_3_2_2_26_1","first-page":"225","volume-title":"SSDBM","volume":"6809","author":"Dey Saumen C.","year":"2011","unstructured":"Saumen C. Dey , Daniel Zinn , and Bertram Lud\"a scher. Propub : Towards a declarative approach for publishing customized, policy-aware provenance . In SSDBM , volume 6809 , pages 225 -- 243 , 2011 . Saumen C. Dey, Daniel Zinn, and Bertram Lud\"a scher. Propub: Towards a declarative approach for publishing customized, policy-aware provenance. In SSDBM, volume 6809, pages 225--243, 2011."},{"key":"e_1_3_2_2_27_1","unstructured":"Facebook. Understand why you're seeing certain ads and how you can adjust your ad experience. https:\/\/about.fb.com\/news\/2019\/07\/understand-why-youre-seeing-ads\/.  Facebook. Understand why you're seeing certain ads and how you can adjust your ad experience. https:\/\/about.fb.com\/news\/2019\/07\/understand-why-youre-seeing-ads\/."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.14778\/2140436.2140445"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jal.2009.09.001"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3417451"},{"key":"e_1_3_2_2_31_1","volume-title":"TaPP","author":"Glavic B.","year":"2013","unstructured":"B. Glavic , J. Siddique , P. Andritsos , and R. J. Miller . Provenance for data mining . In TaPP , 2013 . B. Glavic, J. Siddique, P. Andritsos, and R. J. Miller. Provenance for data mining. In TaPP, 2013."},{"key":"e_1_3_2_2_32_1","unstructured":"Google. Why you're seeing an ad. https:\/\/support.google.com\/accounts\/answer\/1634057.  Google. Why you're seeing an ad. https:\/\/support.google.com\/accounts\/answer\/1634057."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514894.1514930"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1265530.1265535"},{"key":"e_1_3_2_2_35_1","unstructured":"Big Data UN Global Working Group. Un handbook on privacy-preserving computation techniques. http:\/\/publications.officialstatistics.org\/handbooks\/privacy-preserving-techniques-handbook\/UN%20Handbook%20for%20Privacy-Preserving%20Techniques.pdf 2019.  Big Data UN Global Working Group. Un handbook on privacy-preserving computation techniques. http:\/\/publications.officialstatistics.org\/handbooks\/privacy-preserving-techniques-handbook\/UN%20Handbook%20for%20Privacy-Preserving%20Techniques.pdf 2019."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-017-0486-1"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18422-7_21"},{"key":"e_1_3_2_2_38_1","unstructured":"IMDB. https:\/\/www.imdb.com\/interfaces.  IMDB. https:\/\/www.imdb.com\/interfaces."},{"key":"e_1_3_2_2_39_1","first-page":"337","volume-title":"SIGMOD","author":"Kalashnikov Dmitri V.","year":"2018","unstructured":"Dmitri V. Kalashnikov , Laks V. S. Lakshmanan , and Divesh Srivastava . Fastqre : Fast query reverse engineering . In SIGMOD , pages 337 -- 350 , 2018 . Dmitri V. Kalashnikov, Laks V. S. Lakshmanan, and Divesh Srivastava. Fastqre: Fast query reverse engineering. In SIGMOD, pages 337--350, 2018."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","first-page":"3410","DOI":"10.1109\/ICMLC.2005.1527531","volume-title":"2005 International Conference on Machine Learning and Cybernetics","volume":"6","author":"Li Man","year":"2005","unstructured":"Man Li , Xiao-Yong Du , and Shan Wang . Learning ontology from relational database . In 2005 International Conference on Machine Learning and Cybernetics , volume 6 , pages 3410 -- 3415 . IEEE, 2005 . Man Li, Xiao-Yong Du, and Shan Wang. Learning ontology from relational database. In 2005 International Conference on Machine Learning and Cybernetics, volume 6, pages 3410--3415. IEEE, 2005."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_2_42_1","volume-title":"Trusted smart statistics: Motivations and principles. Statistical Journal of the IAOS, (Preprint):1--15","author":"Ricciato Fabio","year":"2019","unstructured":"Fabio Ricciato , Albrecht Wirthmann , Kostas Giannakouris , Michail Skaliotis , Trusted smart statistics: Motivations and principles. Statistical Journal of the IAOS, (Preprint):1--15 , 2019 . Fabio Ricciato, Albrecht Wirthmann, Kostas Giannakouris, Michail Skaliotis, et al. Trusted smart statistics: Motivations and principles. Statistical Journal of the IAOS, (Preprint):1--15, 2019."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.14778\/3329772.3329775"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355229"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497511"},{"key":"e_1_3_2_2_46_1","volume-title":"A mathematical theory of communication. The Bell system technical journal, 27(3):379--423","author":"Shannon Claude E","year":"1948","unstructured":"Claude E Shannon . A mathematical theory of communication. The Bell system technical journal, 27(3):379--423 , 1948 . Claude E Shannon. A mathematical theory of communication. The Bell system technical journal, 27(3):379--423, 1948."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2593664"},{"key":"e_1_3_2_2_48_1","volume-title":"Preliminary opinion on privacy by design. https:\/\/edps.europa.eu\/sites\/edp\/files\/publication\/18-05--31_preliminary_opinion_on_privacy_by_design_en_0.pdf","author":"Protection Supervisor European Data","year":"2018","unstructured":"European Data Protection Supervisor . Preliminary opinion on privacy by design. https:\/\/edps.europa.eu\/sites\/edp\/files\/publication\/18-05--31_preliminary_opinion_on_privacy_by_design_en_0.pdf , 2018 . European Data Protection Supervisor. Preliminary opinion on privacy by design. https:\/\/edps.europa.eu\/sites\/edp\/files\/publication\/18-05--31_preliminary_opinion_on_privacy_by_design_en_0.pdf, 2018."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_2_50_1","first-page":"37","volume-title":"DBPL","author":"Tan Wang Chiew","year":"2003","unstructured":"Wang Chiew Tan . Containment of relational queries with annotation propagation . In DBPL , pages 37 -- 53 , 2003 . Wang Chiew Tan. Containment of relational queries with annotation propagation. In DBPL, pages 37--53, 2003."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137628.3137648"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.and.EUC.2013.221"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0349-3"},{"key":"e_1_3_2_2_54_1","first-page":"809","volume-title":"SIGMOD","author":"Zhang Meihui","year":"2014","unstructured":"Meihui Zhang , Hazem Elmeleegy , Cecilia M. Procopiuc , and Divesh Srivastava . Reverse engineering complex join queries . In SIGMOD , pages 809 -- 820 , 2014 . Meihui Zhang, Hazem Elmeleegy, Cecilia M. Procopiuc, and Divesh Srivastava. Reverse engineering complex join queries. In SIGMOD, pages 809--820, 2014."}],"event":{"name":"SIGMOD\/PODS '21: International Conference on Management of Data","location":"Virtual Event China","acronym":"SIGMOD\/PODS '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2021 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3452835","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448016.3452835","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:05Z","timestamp":1750195685000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3452835"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,9]]},"references-count":54,"alternative-id":["10.1145\/3448016.3452835","10.1145\/3448016"],"URL":"https:\/\/doi.org\/10.1145\/3448016.3452835","relation":{},"subject":[],"published":{"date-parts":[[2021,6,9]]},"assertion":[{"value":"2021-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}