{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T00:02:43Z","timestamp":1765843363120,"version":"3.48.0"},"reference-count":94,"publisher":"Emerald","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,22]]},"abstract":"<jats:p>Differential privacy is a promising approach to formalizing privacy\u2014that is, for writing down what privacy means as a mathematical equation. This book is provides overview of differential privacy techniques for answering database-style queries. Within this area, we describe useful algorithms and their applications, and systems and tools that implement them.<\/jats:p>","DOI":"10.1561\/1900000066","type":"journal-article","created":{"date-parts":[[2021,7,22]],"date-time":"2021-07-22T03:01:21Z","timestamp":1626922881000},"page":"109-225","source":"Crossref","is-referenced-by-count":11,"title":["Differential Privacy for Databases"],"prefix":"10.1561","volume":"11","author":[{"given":"Joseph P.","family":"Near","sequence":"first","affiliation":[{"name":"University of Vermont"}]},{"given":"Xi","family":"He","sequence":"additional","affiliation":[{"name":"University of Waterloo"}]}],"member":"140","published-online":{"date-parts":[[2021,7,22]]},"reference":[{"key":"2025121519001452300_ref001","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1145\/2976749.2978318","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","author":"Abadi","year":"2016"},{"key":"2025121519001452300_ref002","doi-asserted-by":"crossref","first-page":"2867","DOI":"10.1145\/3219819.3226070","article-title":"The US Census Bureau adopts differential privacy","volume-title":"Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"Abowd","year":"2018"},{"key":"2025121519001452300_ref003","article-title":"Encrypted Databases for Differential Privacy","volume-title":"IACR Cryptology ePrint Archive","author":"Agarwal","year":"2018"},{"key":"2025121519001452300_ref004","doi-asserted-by":"crossref","DOI":"10.1145\/2465351.2465355","article-title":"BlinkDB: Queries with Bounded Errors and Bounded Response Times on Very Large Data","volume-title":"EuroSys","author":"Agarwal","year":"2013"},{"key":"2025121519001452300_ref005","first-page":"1","article-title":"Sensitivity of Counting Queries","volume":"120","author":"Arapinis","year":"2016","journal-title":"ICALP"},{"key":"2025121519001452300_ref006","unstructured":"Balle, B., G.Barthe, and M.Gaboardi. (2018). \u201cPrivacy Amplification by Subsampling: Tight Analyses via Couplings and Divergences\u201d. In: Advances in Neural Information Processing Systems 31. Ed. by S.Bengio, H.Wallach, H.Larochelle, K.Grauman, N.Cesa- Bianchi, and R.Garnett. Curran Associates, Inc.6277\u20136287. url: http:\/\/papers.nips.cc\/paper\/7865-privacy-amplification-by-subsampling-tight-analyses-via-couplings-and-divergences.pdf."},{"key":"2025121519001452300_ref007","doi-asserted-by":"crossref","DOI":"10.1145\/3372297.3417242","article-title":"Private summation in the multi-message shuffle model","volume-title":"arXiv preprint arXiv:2002.00817","author":"Balle","year":"2020"},{"key":"2025121519001452300_ref008","first-page":"638","volume-title":"Annual International Cryptology Conference","author":"Balle","year":"2019"},{"key":"2025121519001452300_ref009","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1145\/2976749.2978371","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016","author":"Barthe","year":"2016"},{"issue":"6","key":"2025121519001452300_ref010","doi-asserted-by":"publisher","first-page":"673","DOI":"10.14778\/3055330.3055334","article-title":"SMCQL: Secure Querying for Federated Databases","volume":"10","author":"Bater","year":"2017","journal-title":"pvldb"},{"key":"2025121519001452300_ref011","first-page":"441","article-title":"Prochlo: Strong Privacy for Analytics in the Crowd","volume-title":"Proceedings of the 26th Symposium on Operating Systems Principles, Shanghai, China, October 28-31, 2017","author":"Bittau","year":"2017"},{"key":"2025121519001452300_ref012","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/2422436.2422449","volume-title":"Innovations in Theoretical Computer Science, ITCS \u201913, Berkeley, CA, USA, January 9-12, 2013","author":"Blocki","year":"2013"},{"key":"2025121519001452300_ref013","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/3188745.3188946","volume-title":"Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing","author":"Bun","year":"2018"},{"key":"2025121519001452300_ref014","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1007\/978-3-662-53641-4_24","volume-title":"Theory of Cryptography Conference","author":"Bun","year":"2016"},{"key":"2025121519001452300_ref015","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/978-3-642-14162-1_34","volume-title":"International Colloquium on Automata, Languages, and Programming","author":"Chan","year":"2010"},{"key":"2025121519001452300_ref016","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-39077-7\\_5","volume-title":"Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings","author":"Chatzikokolakis","year":"2013"},{"issue":"2","key":"2025121519001452300_ref017","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","article-title":"Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms","volume":"24","author":"Chaum","year":"1981","journal-title":"Commun. ACM"},{"key":"2025121519001452300_ref018","doi-asserted-by":"crossref","DOI":"10.1145\/2463676.2465304","article-title":"Recursive Mechanism: Towards Node Differential Privacy and Unrestricted Joins","volume-title":"ACM SIGMOD","author":"Chen","year":"2013"},{"key":"2025121519001452300_ref019","doi-asserted-by":"crossref","first-page":"1375","DOI":"10.1145\/3133956.3134102","article-title":"Pegasus: Data-adaptive differentially private stream processing","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","author":"Chen","year":"2017"},{"key":"2025121519001452300_ref020","unstructured":"Cummings, R., S.Krehbiel, K. A.Lai, and U. T.Tantipongpipat. (2018). \u201cDifferential Privacy for Growing Databases\u201d. In: Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montr\u00e9al, Canada. Ed. by S.Bengio, H. M.Wallach, H.Larochelle, K.Grauman, N.Cesa-Bianchi, and R.Garnett. 8878\u20138887. url: https:\/\/proceedings.neurips.cc\/paper\/2018\/hash\/ ac27b77292582bc293a51055bfc994ee-Abstract.html."},{"key":"2025121519001452300_ref021","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1145\/773153.773173","article-title":"Revealing information while preserving privacy","volume-title":"Proceedings of the twenty-second ACM SIGMOD- SIGACT-SIGART symposium on Principles of database systems","author":"Dinur","year":"2003"},{"key":"2025121519001452300_ref022","first-page":"1","article-title":"Differential Privacy","volume":"4052","author":"Dwork","year":"2006","journal-title":"33rd International Colloquium on Automata, Languages and Programming, part II (ICALP 2006)"},{"issue":"1","key":"2025121519001452300_ref023","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","article-title":"A firm foundation for private data analysis","volume":"54","author":"Dwork","year":"2011","journal-title":"Commun. ACM"},{"key":"2025121519001452300_ref024","first-page":"486","article-title":"Our Data, Ourselves: Privacy Via Distributed Noise Generation","volume":"4004","author":"Dwork","year":"2006","journal-title":"EUROCRYPT"},{"key":"2025121519001452300_ref025","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1145\/ 1536414.1536466","article-title":"Differential privacy and robust statistics","volume-title":"Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009","author":"Dwork","year":"2009"},{"key":"2025121519001452300_ref026","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/11681878_14","article-title":"Calibrating Noise to Sensitivity in Private Data Analysis","volume-title":"Theory of Cryptography","author":"Dwork","year":"2006"},{"key":"2025121519001452300_ref027","doi-asserted-by":"crossref","DOI":"10.1145\/1806689.1806787","article-title":"Differential Privacy Under Continual Observation","volume-title":"Proceedings of the Forty-second ACM Symposium on Theory of Computing","author":"Dwork","year":"2010"},{"key":"2025121519001452300_ref028","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1145\/1536414.1536467","article-title":"On the Complexity of Differentially Private Data Release: Efficient Algorithms and Hardness Results","volume-title":"Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing. STOC \u201909","author":"Dwork","year":"2009"},{"issue":"3-4","key":"2025121519001452300_ref029","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"2025121519001452300_ref030","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/ 2676726.2677005","article-title":"Differential Privacy: Now it\u2019s Getting Personal","volume-title":"Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2015, Mumbai, India, January 15-17, 2015","author":"Ebadi","year":"2015"},{"key":"2025121519001452300_ref031","first-page":"2468","article-title":"Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity","volume-title":"Annual ACM-SIAM Symposium on Discrete Algorithms","author":"Erlingsson","year":"2019"},{"key":"2025121519001452300_ref032","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1145\/2660267.2660348","article-title":"RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response","volume-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014","author":"Erlingsson","year":"2014"},{"key":"2025121519001452300_ref033","first-page":"1170","article-title":"Dual query: Practical private query release for high dimensional data","volume-title":"International Conference on Machine Learning","author":"Gaboardi","year":"2014"},{"key":"2025121519001452300_ref034","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/3411497.3420211","article-title":"Randomness Concerns when Deploying Differential Privacy","volume-title":"WPES\u201920: Proceedings of the 19th Workshop on Privacy in the Electronic Society, Virtual Event, USA, November 9, 2020","author":"Garfinkel","year":"2020"},{"key":"2025121519001452300_ref035","first-page":"177","article-title":"APEx: Accuracy-Aware Differentially Private Data Exploration","volume-title":"Proceedings of the 2019 International Conference on Management of Data, SIGMOD Conference 2019, Amsterdam, The Netherlands, June 30 - July 5, 2019","author":"Ge","year":"2019"},{"key":"2025121519001452300_ref036","first-page":"798","article-title":"Private aggregation from fewer anonymous messages","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Ghazi","year":"2020"},{"key":"2025121519001452300_ref037","unstructured":"Haeberlen, A., B. C.Pierce, and A.Narayan. (2011). \u201cDifferential Privacy Under Fire\u201d. In: 20th USENIX Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings. USENIX Association. url: http:\/\/static.usenix.org\/events\/sec11\/tech\/full%5C_papers\/Haeberlen.pdf."},{"key":"2025121519001452300_ref038","first-page":"2339","article-title":"A simple and practical algorithm for differentially private data release","volume-title":"Advances in Neural Information Processing Systems","author":"Hardt","year":"2012"},{"key":"2025121519001452300_ref039","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/2882903.2882931","article-title":"Principled evaluation of differentially private algorithms using dpbench","volume-title":"Proceedings of the 2016 International Conference on Management of Data","author":"Hay","year":"2016"},{"key":"2025121519001452300_ref040","doi-asserted-by":"publisher","first-page":"2101","DOI":"10.1145\/2882903.2899387","article-title":"Exploring Privacy-Accuracy Tradeoffs using DPComp","volume-title":"Proceedings of the 2016 International Conference on Management of Data, SIGMOD Conference 2016, San Francisco, CA, USA, June 26 - July 01, 2016","author":"Hay","year":"2016"},{"key":"2025121519001452300_ref041","doi-asserted-by":"publisher","first-page":"1447","DOI":"10.1145\/2588555.2588581","article-title":"Blowfish privacy: tuning privacy-utility trade-offs using policies","volume-title":"International Conference on Management of Data, SIGMOD 2014, Snowbird, UT, USA, June 22-27, 2014","author":"He","year":"2014"},{"key":"2025121519001452300_ref042","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1109\/CSF.2014.35","article-title":"Differential Privacy: An Economic Method for Choosing Epsilon","volume-title":"IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014","author":"Hsu","year":"2014"},{"key":"2025121519001452300_ref043","unstructured":"\u201cIBM Differential Privacy Library\u201d\n          . https:\/\/github.com\/IBM\/differential-privacy-library."},{"key":"2025121519001452300_ref044","doi-asserted-by":"crossref","DOI":"10.1145\/3372297.3417269","article-title":"Implementing the Exponential Mechanism with Base-2 Differential Privacy","volume-title":"CCS \u201920: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020","author":"Ilvento","year":"2020"},{"key":"2025121519001452300_ref045","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/EuroSP48549.2020.00041","article-title":"Chorus: a Programming Framework for Building Scalable Differential Privacy Mechanisms","volume-title":"IEEE European Symposium on Security and Privacy, EuroS&P 2020, Genoa, Italy, September 7-11, 2020","author":"Johnson","year":"2020"},{"issue":"5","key":"2025121519001452300_ref046","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1145\/3187009.3177733","article-title":"Towards Practical Differential Privacy for SQL Queries","volume":"11","author":"Johnson","year":"2018","journal-title":"Proc. VLDB Endow."},{"key":"2025121519001452300_ref047","doi-asserted-by":"crossref","DOI":"10.14778\/3402707.3402749","article-title":"Private Analysis of Graph Structure","volume-title":"PVLDB","author":"Karwa","year":"2011"},{"issue":"3","key":"2025121519001452300_ref048","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1137\/090756090","article-title":"What Can We Learn Privately?","volume":"40","author":"Kasiviswanathan","year":"2011","journal-title":"SIAM J. Comput."},{"key":"2025121519001452300_ref049","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-642-36594-2\\_26","article-title":"Analyzing Graphs with Node Differential Privacy","volume":"7785","author":"Kasiviswanathan","year":"2013","journal-title":"Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings"},{"issue":"1","key":"2025121519001452300_ref050","doi-asserted-by":"publisher","first-page":"3:1","DOI":"10.1145\/2514689","article-title":"Pufferfish: A framework for mathematical privacy definitions","volume":"39","author":"Kifer","year":"2014","journal-title":"ACM Trans. Database Syst."},{"key":"2025121519001452300_ref051","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1145\/1526709.1526733","article-title":"Releasing search queries and clicks privately","volume-title":"Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009","author":"Korolova","year":"2009"},{"issue":"11","key":"2025121519001452300_ref052","doi-asserted-by":"publisher","first-page":"1371","DOI":"10.14778\/3342263.3342274","article-title":"PrivateSQL: A Differentially Private SQL Query Engine","volume":"12","author":"Kotsogiannis","year":"2019","journal-title":"Proc. VLDB Endow."},{"key":"2025121519001452300_ref053","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642- 24861-0\\_22","article-title":"How Much Is Enough? Choosing \u03f5 for Differential Privacy","volume":"7001","author":"Lee","year":"2011","journal-title":"Information Security, 14th International Conference, ISC 2011, Xi\u2019an, China, October 26-29, 2011. Proceedings"},{"key":"2025121519001452300_ref054","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1145\/2623330.2623723","article-title":"Top-k Frequent Itemsets via Differentially Private FP-Trees","volume-title":"Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Lee","year":"2014"},{"issue":"6","key":"2025121519001452300_ref055","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1007\/s00778- 015-0398-x","article-title":"The matrix mechanism: optimizing linear counting queries under differential privacy","volume":"24","author":"Li","year":"2015","journal-title":"VLDB J."},{"key":"2025121519001452300_ref056","doi-asserted-by":"crossref","unstructured":"Liu, C., S.Chakraborty, and P.Mittal. (2016). \u201cDependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples\u201d. In: 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21-24, 2016. The Internet Society. url: http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2017\/09\/dependence-makes-you-vulnerable-differential-privacy-under-dependent-tuples.pdf.","DOI":"10.14722\/ndss.2016.23279"},{"key":"2025121519001452300_ref057","doi-asserted-by":"crossref","DOI":"10.1109\/ICDE.2014.6816689","article-title":"Generating Private Synthetic Databases for Untrusted System Evaluation","volume-title":"ICDE","author":"Lu","year":"2014"},{"key":"2025121519001452300_ref058","doi-asserted-by":"crossref","DOI":"10.14778\/3055330.3055331","article-title":"Understanding the Sparse Vector Technique for Differential Privacy","volume-title":"Proc. VLDB Endow.","author":"Lyu","year":"2017"},{"issue":"1","key":"2025121519001452300_ref059","doi-asserted-by":"crossref","first-page":"3\u2013es","DOI":"10.1145\/1217299.1217302","article-title":"l-diversity: Privacy beyond k-anonymity","volume":"1","author":"Machanavajjhala","year":"2007","journal-title":"ACM Transactions on Knowledge Discovery from Data (TKDD)"},{"issue":"10","key":"2025121519001452300_ref060","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.14778\/3231751.3231769","article-title":"Optimizing error of high-dimensional statistical queries under differential privacy","volume":"11","author":"McKenna","year":"2018","journal-title":"PVLDB"},{"key":"2025121519001452300_ref061","doi-asserted-by":"crossref","DOI":"10.1109\/FOCS.2010.14","article-title":"The Limits of Two-Party Differential Privacy","volume-title":"Annual Symposium on Foundations of Computer Science","author":"McGregor","year":"2010"},{"issue":"11","key":"2025121519001452300_ref062","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.14778\/3407790.3407798","article-title":"A workload-adaptive mechanism for linear queries under local differential privacy","volume":"13","author":"McKenna","year":"2020","journal-title":"Proc. VLDB Endow."},{"key":"2025121519001452300_ref063","first-page":"4435","article-title":"Graphical-model based estimation and inference for differential privacy","volume":"97","author":"McKenna","year":"2019","journal-title":"Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9-15 June 2019, Long Beach, California, USA"},{"key":"2025121519001452300_ref064","doi-asserted-by":"crossref","unstructured":"McSherry, F. and K.Talwar. (2007). \u201cMechanism Design via Differential Privacy\u201d. In: Annual IEEE Symposium on Foundations of Computer Science (FOCS). IEEE. url: https:\/\/www.microsoft.com\/en-us\/research\/publication\/mechanism-design-via-differential-privacy\/.","DOI":"10.1109\/FOCS.2007.4389483"},{"key":"2025121519001452300_ref065","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/1559845.1559850","article-title":"Privacy Integrated Queries: An Extensible Platform for Privacy-Preserving Data Analysis","volume-title":"Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data","author":"McSherry","year":"2009"},{"key":"2025121519001452300_ref066","doi-asserted-by":"crossref","first-page":"650","DOI":"10.1145\/2382196.2382264","article-title":"On significance of the least significant bits for differential privacy","volume-title":"Proceedings of the 2012 ACM conference on Computer and communications security","author":"Mironov","year":"2012"},{"key":"2025121519001452300_ref067","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1109\/CSF.2017.11","article-title":"Renyi differential privacy","volume-title":"Computer Security Foundations Symposium (CSF), 2017 IEEE 30th","author":"Mironov","year":"2017"},{"key":"2025121519001452300_ref068","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-642-03356-8_8","article-title":"Computational Differential Privacy","volume-title":"Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology","author":"Mironov","year":"2009"},{"key":"2025121519001452300_ref069","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1145\/2213836.2213876","article-title":"GUPT: privacy preserving data analysis made easy","volume-title":"Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2012, Scottsdale, AZ, USA, May 20-24, 2012","author":"Mohan","year":"2012"},{"article-title":"Usable Differential Privacy: A Case Study with PSI","year":"2018","author":"Murtagh","key":"2025121519001452300_ref070"},{"key":"2025121519001452300_ref071","unstructured":"Narayan, A. and A.Haeberlen. (2012). \u201cDJoin: Differentially Private Join Queries over Distributed Databases\u201d. In: 10th USENIX Symposium on Operating Systems Design and Implementation. 149\u2013162. url: https:\/\/www.usenix.org\/conference\/osdi12\/technical-sessions\/presentation\/narayan."},{"key":"2025121519001452300_ref072","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/1250790.1250803","article-title":"Smooth sensitivity and sampling in private data analysis","volume-title":"Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007","author":"Nissim","year":"2007"},{"key":"2025121519001452300_ref073","first-page":"1701","article-title":"Broken promises of privacy: Responding to the surprising failure of anonymization","volume":"57","author":"Ohm","year":"2009","journal-title":"UCLA l. Rev."},{"key":"2025121519001452300_ref074","unstructured":"\u201cOpenDP\u201d. https:\/\/privacytools.seas.harvard.edu\/opendp."},{"key":"2025121519001452300_ref075","unstructured":"Raskhodnikova, S. and A. D.Smith. (2015). \u201cEfficient Lipschitz Extensions for High-Dimensional Graph Statistics and Node Private Degree Distributions\u201d. CoRR. abs\/1504.07912. arXiv: 1504.07912. url: http:\/\/arxiv.org\/abs\/1504.07912."},{"key":"2025121519001452300_ref076","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1145\/3341301.3359660","article-title":"Honeycrisp: large-scale differentially private aggregation without a trusted core","volume-title":"Proceedings of the 27th ACM Symposium on Operating Systems Principles, SOSP 2019, Huntsville, ON, Canada, October 27-30, 2019","author":"Roth","year":"2019"},{"key":"2025121519001452300_ref077","unstructured":"Roy, I., S. T. V.Setty, A.Kilzer, V.Shmatikov, and E.Witchel. (2010). \u201cAiravat: Security and Privacy for MapReduce\u201d. In: Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2010, April 28-30, 2010, San Jose, CA, USA. USENIX Association. 297\u2013312. url: http:\/\/www.usenix.org\/events\/ nsdi10\/tech\/full%5C_papers\/roy.pdf."},{"key":"2025121519001452300_ref078","unstructured":"\u201cSmart Noise\u201d\n          . https:\/\/github.com\/opendp\/smartnoise-samples."},{"key":"2025121519001452300_ref079","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1145\/1993636.1993743","article-title":"Privacy-preserving statistical estimation with optimal convergence rates","volume-title":"Proceedings of the 43rd ACM Symposium on Theory of Computing, STOC 2011, San Jose, CA, USA, 6-8 June 2011","author":"Smith","year":"2011"},{"key":"2025121519001452300_ref080","doi-asserted-by":"publisher","first-page":"1291","DOI":"10.1145\/3035918.3064025","article-title":"Pufferfish Privacy Mechanisms for Correlated Data","volume-title":"Proceedings of the 2017 ACM International Conference on Management of Data, SIGMOD Conference 2017, Chicago, IL, USA, May 14-19, 2017","author":"Song","year":"2017"},{"issue":"2000","key":"2025121519001452300_ref081","first-page":"1","article-title":"Simple demographics often identify people uniquely","volume":"671","author":"Sweeney","year":"2000","journal-title":"Health (San Francisco)"},{"issue":"05","key":"2025121519001452300_ref082","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"k-anonymity: A model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"2025121519001452300_ref083","unstructured":"Tang, J., A.Korolova, X.Bai, X.Wang, and X.Wang. (2017). \u201cPrivacy Loss in Apple\u2019s Implementation of Differential Privacy on MacOS 10.12\u201d. CoRR. abs\/1709.02753. arXiv: 1709.02753. url: http:\/\/arxiv.org\/abs\/1709.02753."},{"key":"2025121519001452300_ref084","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1145\/3318464. 3389762","article-title":"Computing Local Sensitivities of Counting Queries with Joins","volume-title":"Proceedings of the 2020 International Conference on Management of Data, SIGMOD Conference 2020, online conference [Portland, OR, USA], June 14-19, 2020","author":"Tao","year":"2020"},{"key":"2025121519001452300_ref085","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/SP40000.2020.00086","article-title":"A Programming Framework for Differential Privacy with Accuracy Concentration Bounds","volume-title":"2020 IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, May 18-21, 2020","author":"Vesga","year":"2020"},{"key":"2025121519001452300_ref086","unstructured":"Wang, T., J.Blocki, N.Li, and S.Jha. (2017). \u201cLocally Differentially Private Protocols for Frequency Estimation\u201d. In: 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017. Ed. by E.Kirda and T.Ristenpart. USENIX Association. 729\u2013745. url: https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/wang-tianhao."},{"key":"2025121519001452300_ref087","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1145\/3299869.3319891","article-title":"Answering Multi-Dimensional Analytical Queries under Local Differential Privacy","volume-title":"Proceedings of the 2019 International Conference on Management of Data, SIGMOD Conference 2019, Amsterdam, The Netherlands, June 30 - July 5, 2019","author":"Wang","year":"2019"},{"issue":"309","key":"2025121519001452300_ref088","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","article-title":"Randomized response: A survey technique for eliminating evasive answer bias","volume":"60","author":"Warner","year":"1965","journal-title":"Journal of the American Statistical Association"},{"issue":"2","key":"2025121519001452300_ref089","doi-asserted-by":"crossref","first-page":"230","DOI":"10.2478\/popets-2020-0025","article-title":"Differentially Private SQL with Bounded User Contribution","volume":"2020","author":"Wilson","year":"2020","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"2025121519001452300_ref090","unstructured":"Yang, J., T.Wang, N.Li, X.Cheng, and S.Su. (2020). \u201cAnswering Multi-Dimensional Range Queries under Local Differential Privacy\u201d. CoRR. abs\/2009.06538. arXiv: 2009.06538. url: https:\/\/arxiv.org\/abs\/2009.06538."},{"key":"2025121519001452300_ref091","article-title":"\u03f5KTELO: A Framework for Defining Differentially Private Computations","volume-title":"ACM Trans. Database Syst","author":"Zhang","year":"2020"},{"key":"2025121519001452300_ref092","doi-asserted-by":"crossref","unstructured":"Zhang, D. and D.Kifer. (2017). \u201cLightDP: towards automating differential privacy proofs\u201d. In: Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, POPL 2017, Paris, France, January 18-20, 2017. Ed. by G.Castagna and A. D.Gordon. ACM. 888\u2013901. url: http:\/\/dl.acm.org\/citation.cfm?id=3009884.","DOI":"10.1145\/3009837.3009884"},{"key":"2025121519001452300_ref093","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1145\/ 2588555.2588573","article-title":"PrivBayes: private data release via bayesian networks","volume-title":"International Conference on Management of Data, SIGMOD 2014, Snowbird, UT, USA, June 22-27, 2014","author":"Zhang","year":"2014"},{"key":"2025121519001452300_ref094","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1145\/3243734.3243742","article-title":"CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018","author":"Zhang","year":"2018"}],"container-title":["Foundations and Trends in Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/ftdbs\/article-pdf\/11\/2\/109\/11047402\/1900000066en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ftdbs\/article-pdf\/11\/2\/109\/11047402\/1900000066en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T00:00:29Z","timestamp":1765843229000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ftdbs\/article\/11\/2\/109\/1328612\/Differential-Privacy-for-Databases"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,22]]},"references-count":94,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,7,22]]}},"URL":"https:\/\/doi.org\/10.1561\/1900000066","relation":{},"ISSN":["1931-7883","1931-7891"],"issn-type":[{"type":"print","value":"1931-7883"},{"type":"electronic","value":"1931-7891"}],"subject":[],"published":{"date-parts":[[2021,7,22]]}}}