{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:14:05Z","timestamp":1763968445433,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,20]],"date-time":"2021-06-20T00:00:00Z","timestamp":1624147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,20]]},"DOI":"10.1145\/3452021.3458816","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T14:21:58Z","timestamp":1624026118000},"page":"33-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Privacy"],"prefix":"10.1145","author":[{"given":"Kobbi","family":"Nissim","sequence":"first","affiliation":[{"name":"Georgetown University, Washington, DC, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,20]]},"reference":[{"volume-title":"2019 a","author":"Abowd John","key":"e_1_3_2_1_1_1","unstructured":"John Abowd . 2019 a . Stepping-up : The Census Bureau Tries to Be a Good Data Steward in the 21st Century, Presentation at the Simons Institute for the Theory of Computing. https:\/\/simons.berkeley.edu\/talks\/tba-30 . John Abowd. 2019 a. Stepping-up: The Census Bureau Tries to Be a Good Data Steward in the 21st Century, Presentation at the Simons Institute for the Theory of Computing. https:\/\/simons.berkeley.edu\/talks\/tba-30 ."},{"key":"e_1_3_2_1_2_1","unstructured":"John Abowd. 2019 b. Tweetorial: Reconstruction-abetted re-identification attacks and other traditional vulnerabilities (blogpost). http:\/\/blogs.cornell.edu\/abowd\/special-materials\/245--2\/.  John Abowd. 2019 b. Tweetorial: Reconstruction-abetted re-identification attacks and other traditional vulnerabilities (blogpost). http:\/\/blogs.cornell.edu\/abowd\/special-materials\/245--2\/."},{"key":"e_1_3_2_1_3_1","article-title":"forthcoming. What a Hybrid Legal-Technical Analysis Teaches Us About Privacy Regulation: The Case of Singling Out","volume":"27","author":"Altman Micah","year":"2021","unstructured":"Micah Altman , Aloni Cohen , Kobbi Nissim , and Alexandra Wood . 2021 forthcoming. What a Hybrid Legal-Technical Analysis Teaches Us About Privacy Regulation: The Case of Singling Out . Boston University Journal of Science & Technology Law , Vol. 27 , 1 (2021 forthcoming). Micah Altman, Aloni Cohen, Kobbi Nissim, and Alexandra Wood. 2021 forthcoming. What a Hybrid Legal-Technical Analysis Teaches Us About Privacy Regulation: The Case of Singling Out. Boston University Journal of Science & Technology Law , Vol. 27, 1 (2021 forthcoming).","journal-title":"Boston University Journal of Science & Technology Law"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043174.2043199"},{"key":"e_1_3_2_1_5_1","volume-title":"The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. In 28th USENIX Security Symposium, USENIX Security 2019","author":"Carlini Nicholas","year":"2019","unstructured":"Nicholas Carlini , Chang Liu , \u00da lfar Erlingsson, Jernej Kos , and Dawn Song . 2019 . The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. In 28th USENIX Security Symposium, USENIX Security 2019 , Santa Clara, CA, USA, August 14--16 , 2019 , , Nadia Heninger and Patrick Traynor (Eds.). USENIX Association, 267--284. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/carlini Nicholas Carlini, Chang Liu, \u00da lfar Erlingsson, Jernej Kos, and Dawn Song. 2019. The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14--16, 2019 , , Nadia Heninger and Patrick Traynor (Eds.). USENIX Association, 267--284. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/carlini"},{"key":"e_1_3_2_1_6_1","unstructured":"Aloni Cohen. 2021. The Quasi-identifiers are the Problem: Attacking and Reidentifying k-Anonymous Datasets. Manuscript in preparation.  Aloni Cohen. 2021. The Quasi-identifiers are the Problem: Attacking and Reidentifying k-Anonymous Datasets. Manuscript in preparation."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.711"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1914598117"},{"key":"e_1_3_2_1_9_1","first-page":"169","article-title":"Compelled Decryption and the Fifth Amendment: Exploring the Technical Boundaries","volume":"32","author":"Cohen Aloni","year":"2018","unstructured":"Aloni Cohen and Sunoo Park . 2018 . Compelled Decryption and the Fifth Amendment: Exploring the Technical Boundaries . Harvard Journal of Law & Technology , Vol. 32 (2018), 169 -- 234 . https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3117984 Aloni Cohen and Sunoo Park. 2018. Compelled Decryption and the Fifth Amendment: Exploring the Technical Boundaries. Harvard Journal of Law & Technology , Vol. 32 (2018), 169--234. https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3117984","journal-title":"Harvard Journal of Law & Technology"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250804"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-statistics-060116-054123"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--45724--2_13"},{"key":"e_1_3_2_1_16_1","volume-title":"Craig","author":"Homer Nils","year":"2008","unstructured":"Nils Homer , Szabolcs Szelinger , Margot Redman , David Duggan , Waibhav Tembe , Jill Muehling , John V. Pearson , Dietrich A. Stephan , Stanley F. Nelson , and David W . Craig . 2008 . Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays. PLoS Genetics , Vol. 4(8) (2008). Nils Homer, Szabolcs Szelinger, Margot Redman, David Duggan, Waibhav Tembe, Jill Muehling, John V. Pearson, Dietrich A. Stephan, Stanley F. Nelson, and David W. Craig. 2008. Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays. PLoS Genetics , Vol. 4(8) (2008)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73009"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055591"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214090"},{"key":"e_1_3_2_1_22_1","volume-title":"How To Break Anonymity of the Netflix Prize Dataset. CoRR","author":"Narayanan Arvind","year":"2006","unstructured":"Arvind Narayanan and Vitaly Shmatikov . 2006. How To Break Anonymity of the Netflix Prize Dataset. CoRR , Vol. abs\/cs\/ 0610105 ( 2006 ). arxiv: cs\/0610105 http:\/\/arxiv.org\/abs\/cs\/0610105 Arvind Narayanan and Vitaly Shmatikov. 2006. How To Break Anonymity of the Netflix Prize Dataset. CoRR , Vol. abs\/cs\/0610105 (2006). arxiv: cs\/0610105 http:\/\/arxiv.org\/abs\/cs\/0610105"},{"volume-title":"Security and Privacy","author":"Narayanan Arvind","key":"e_1_3_2_1_23_1","unstructured":"Arvind Narayanan and Vitaly Shmatikov . 2008. Robust de-anonymization of large sparse datasets . In Security and Privacy . IEEE , 111--125. Arvind Narayanan and Vitaly Shmatikov. 2008. Robust de-anonymization of large sparse datasets. In Security and Privacy. IEEE, 111--125."},{"key":"e_1_3_2_1_24_1","first-page":"687","article-title":"Bridging the gap between computer science and legal approaches to privacy","volume":"31","author":"Nissim Kobbi","year":"2018","unstructured":"Kobbi Nissim , Aaron Bembenek , Alexandra Wood , Mark Bun , Marco Gaboardi , Urs Gasser , David R. O'Brien , Thomas Steinke , and Salil Vadhan . 2018 . Bridging the gap between computer science and legal approaches to privacy . Harvard Journal of Law & Technology , Vol. 31 , 2 (2018), 687 -- 780 . Kobbi Nissim, Aaron Bembenek, Alexandra Wood, Mark Bun, Marco Gaboardi, Urs Gasser, David R. O'Brien, Thomas Steinke, and Salil Vadhan. 2018. Bridging the gap between computer science and legal approaches to privacy. Harvard Journal of Law & Technology , Vol. 31, 2 (2018), 687--780.","journal-title":"Harvard Journal of Law & Technology"},{"key":"e_1_3_2_1_25_1","article-title":"Is privacy privacy","volume":"376","author":"Nissim Kobbi","year":"2018","unstructured":"Kobbi Nissim and Alexandra Wood . 2018 . Is privacy privacy ? Philosophical Transactions of the Royal Society A , Vol. 376 , 2128 (2018). Kobbi Nissim and Alexandra Wood. 2018. Is privacy privacy? Philosophical Transactions of the Royal Society A , Vol. 376, 2128 (2018).","journal-title":"Philosophical Transactions of the Royal Society A"},{"key":"e_1_3_2_1_26_1","first-page":"1701","article-title":"Broken promises of privacy: Responding to the surprising failure of anonymization","volume":"57","author":"Ohm Paul","year":"2010","unstructured":"Paul Ohm . 2010 . Broken promises of privacy: Responding to the surprising failure of anonymization . UCLA Law Review , Vol. 57 (2010), 1701 . Paul Ohm. 2010. Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review , Vol. 57 (2010), 1701.","journal-title":"UCLA Law Review"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"e_1_3_2_1_28_1","first-page":"862","article-title":"Protecting Cryptography Against Compelled Self-Incrimination","volume":"2020","author":"Scheffler Sarah","year":"2020","unstructured":"Sarah Scheffler and Mayank Varia . 2020 . Protecting Cryptography Against Compelled Self-Incrimination . IACR Cryptol. ePrint Arch. , Vol. 2020 (2020), 862 . https:\/\/eprint.iacr.org\/2020\/862 Sarah Scheffler and Mayank Varia. 2020. Protecting Cryptography Against Compelled Self-Incrimination. IACR Cryptol. ePrint Arch. , Vol. 2020 (2020), 862. https:\/\/eprint.iacr.org\/2020\/862","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_29_1","first-page":"1814","article-title":"The PII Problem: Privacy and a New Concept of Personally Identifiable Information","volume":"86","author":"Schwartz P","year":"2011","unstructured":"P Schwartz and D Solove . 2011 . The PII Problem: Privacy and a New Concept of Personally Identifiable Information . New York University Law Review , Vol. 86 , 4 (2011), 1814 -- 1895 . P Schwartz and D Solove. 2011. The PII Problem: Privacy and a New Concept of Personally Identifiable Information. New York University Law Review , Vol. 86, 4 (2011), 1814--1895.","journal-title":"New York University Law Review"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--57048--8_7"},{"key":"e_1_3_2_1_34_1","first-page":"209","article-title":"Differential privacy: A primer for a non-technical audience","volume":"21","author":"Wood Alexandra","year":"2018","unstructured":"Alexandra Wood , Micah Altman , Aaron Bembenek , Mark Bun , Marco Gaboardi , James Honaker , Kobbi Nissim , David R O'Brien , Thomas Steinke , and Salil Vadhan . 2018 . Differential privacy: A primer for a non-technical audience . Vand. J. Ent. & Tech. L. , Vol. 21 (2018), 209 . Alexandra Wood, Micah Altman, Aaron Bembenek, Mark Bun, Marco Gaboardi, James Honaker, Kobbi Nissim, David R O'Brien, Thomas Steinke, and Salil Vadhan. 2018. Differential privacy: A primer for a non-technical audience. Vand. J. Ent. & Tech. L. , Vol. 21 (2018), 209.","journal-title":"Vand. J. Ent. & Tech. L."},{"volume-title":"Handbook on Using Administrative Data for Research and Evidence-based Policy , , Shawn Cole, Iqbal Dhaliwal, Anja Sautmann, and Lars Vilhuber (Eds.). Abdul Latif Jameel Poverty Action Lab","author":"Wood Alexandra","key":"e_1_3_2_1_35_1","unstructured":"Alexandra Wood , Micah Altman , Kobbi Nissim , and Salil Vadhan . 2020. Designing Access with Differential Privacy . In Handbook on Using Administrative Data for Research and Evidence-based Policy , , Shawn Cole, Iqbal Dhaliwal, Anja Sautmann, and Lars Vilhuber (Eds.). Abdul Latif Jameel Poverty Action Lab , Cambridge , MA. Alexandra Wood, Micah Altman, Kobbi Nissim, and Salil Vadhan. 2020. Designing Access with Differential Privacy. In Handbook on Using Administrative Data for Research and Evidence-based Policy , , Shawn Cole, Iqbal Dhaliwal, Anja Sautmann, and Lars Vilhuber (Eds.). Abdul Latif Jameel Poverty Action Lab, Cambridge, MA."}],"event":{"name":"SIGMOD\/PODS '21: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"Virtual Event China","acronym":"SIGMOD\/PODS '21"},"container-title":["Proceedings of the 40th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3452021.3458816","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3452021.3458816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:07Z","timestamp":1750193287000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3452021.3458816"}},"subtitle":["From Database Reconstruction to Legal Theorems"],"short-title":[],"issued":{"date-parts":[[2021,6,20]]},"references-count":34,"alternative-id":["10.1145\/3452021.3458816","10.1145\/3452021"],"URL":"https:\/\/doi.org\/10.1145\/3452021.3458816","relation":{},"subject":[],"published":{"date-parts":[[2021,6,20]]},"assertion":[{"value":"2021-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}