{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:20:48Z","timestamp":1764588048446},"reference-count":24,"publisher":"Association for Computing Machinery (ACM)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2019,8]]},"abstract":"<jats:p>Over the last 20 years, the progress of information technology has allowed many companies to generate, integrate, store, and analyze data of unprecedented size and complexity. In many cases, this data is personal data and how it can be used is therefore subject to laws that depend on the specific countries and application domains. For example, the General Data Protection Regulation (GDPR) introduced in the European Union imposes strict rules on how personal data can be processed.<\/jats:p>\n          <jats:p>\n            Analyzing personal data can create tremendous value, but at the same time companies must ensure that they remain legally compliant. Unfortunately, existing systems offer only limited or no support at all for processing personal data in a\n            <jats:italic>privacy-aware<\/jats:italic>\n            manner. Approaches that have emerged from the academic and industrial research environments need to be integrated into large systems (like enterprise systems) in a manageable and scalable way. In many IT environments, it is also desirable and necessary to combine and to integrate personal data with other (non-personal) data in a seamless fashion.\n          <\/jats:p>\n          <jats:p>\n            In this paper, we present the first steps that SAP has taken to provide its database management system SAP HANA with privacy-enhanced processing capabilities, referred to in the following as SAP HANA Data Anonymization. Various goals on both the conceptual and technical levels were followed with the aim of providing SAP customers\n            <jats:italic>today<\/jats:italic>\n            with an\n            <jats:italic>integrated<\/jats:italic>\n            processing environment for personal and non-personal data.\n          <\/jats:p>","DOI":"10.14778\/3352063.3352119","type":"journal-article","created":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T18:36:11Z","timestamp":1568831771000},"page":"1998-2009","source":"Crossref","is-referenced-by-count":18,"title":["SAP HANA goes private"],"prefix":"10.14778","volume":"12","author":[{"given":"Stephan","family":"Kessler","sequence":"first","affiliation":[{"name":"SAP SE, Walldorf, Germany"}]},{"given":"Jens","family":"Hoff","sequence":"additional","affiliation":[{"name":"SAP SE, Walldorf, Germany"}]},{"given":"Johann-Christoph","family":"Freytag","sequence":"additional","affiliation":[{"name":"Humboldt-Universit\u00e4t zu Berlin, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,8]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"CNIL. Data Protection around the World. https:\/\/www.cnil.fr\/en\/data-protection-around-the-world.  CNIL. Data Protection around the World. https:\/\/www.cnil.fr\/en\/data-protection-around-the-world."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2320765.2320816"},{"key":"e_1_2_1_3_1","unstructured":"Diffix. Anonymisation with Diffix: how it works. https:\/\/aircloak.com\/solutions\/diffix-en\/.  Diffix. Anonymisation with Diffix: how it works. https:\/\/aircloak.com\/solutions\/diffix-en\/."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_2_1_6_1","first-page":"141","volume-title":"Vienna","author":"Francis P.","year":"2017"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2899387"},{"key":"e_1_2_1_8_1","unstructured":"HIPPA. Health Insurance Portability and Accountability Act of 1996. https:\/\/www.congress.gov\/bill\/104th-congress\/house-bill\/3103.  HIPPA. Health Insurance Portability and Accountability Act of 1996. https:\/\/www.congress.gov\/bill\/104th-congress\/house-bill\/3103."},{"key":"e_1_2_1_9_1","volume-title":"KIT-Bibliothek","author":"Kessler S.","year":"2015"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.52"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_2_1_15_1","unstructured":"Oracle. Database Advanced Security Administrator s Guide. https:\/\/docs.oracle.com\/en\/database\/oracle\/oracle-database\/18\/asoag\/asopart2.html 2016.  Oracle. Database Advanced Security Administrator s Guide. https:\/\/docs.oracle.com\/en\/database\/oracle\/oracle-database\/18\/asoag\/asopart2.html 2016."},{"key":"e_1_2_1_16_1","unstructured":"E. Parliament and E. Council. General Data Protection Regulation. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/HTML\/?uri=CELEX:32016R0679&from=EN.  E. Parliament and E. Council. General Data Protection Regulation. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/HTML\/?uri=CELEX:32016R0679&from=EN."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2017.2676880"},{"key":"e_1_2_1_18_1","unstructured":"SAP. SAP HANA Express Edition. https:\/\/developers.sap.com\/topics\/sap-hana-express.html.  SAP. SAP HANA Express Edition. https:\/\/developers.sap.com\/topics\/sap-hana-express.html."},{"key":"e_1_2_1_19_1","unstructured":"SAP. SAP HANA Modeling Guide. https:\/\/help.sap.com\/viewer\/e8e6c8142e60469bb401de5fdb6f7c00\/2.0.03\/en-US\/a9ab474a16d34e56bd72572b9a598216.html.  SAP. SAP HANA Modeling Guide. https:\/\/help.sap.com\/viewer\/e8e6c8142e60469bb401de5fdb6f7c00\/2.0.03\/en-US\/a9ab474a16d34e56bd72572b9a598216.html."},{"key":"e_1_2_1_20_1","unstructured":"SAP. SAP HANA Web IDE sample project. https:\/\/github.com\/SAP\/hana-data-anonymization-vldb-demo.  SAP. SAP HANA Web IDE sample project. https:\/\/github.com\/SAP\/hana-data-anonymization-vldb-demo."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213946"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_2_1_23_1","volume-title":"26th USENIX Security Symposium, USENIX Security","author":"Wang T.","year":"2017"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3352063.3352119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T10:43:16Z","timestamp":1672224196000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3352063.3352119"}},"subtitle":["from privacy research to privacy aware enterprise analytics"],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":24,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["10.14778\/3352063.3352119"],"URL":"https:\/\/doi.org\/10.14778\/3352063.3352119","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2019,8]]}}}