{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:34:39Z","timestamp":1725471279266},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540359692"},{"type":"electronic","value":"9783540359715"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11788911_9","type":"book-chapter","created":{"date-parts":[[2006,9,25]],"date-time":"2006-09-25T09:15:34Z","timestamp":1159175734000},"page":"102-114","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Preservation and Protection by Extending Generalized Partial Indices"],"prefix":"10.1007","author":[{"given":"Guoqiang","family":"Zhan","sequence":"first","affiliation":[]},{"given":"Zude","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaojun","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Jianmin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Keirnan, J., Srikant, R., Xu, Y.: Hippocratic database. In: Proceedings of the 28th VLDB Conference (2002)","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Byun, J.-W., Berino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Proceedings of the tenth ACM symposium on Access control models and technologies (SACMAT 2005), pp. 102\u2013110 (2005)","DOI":"10.1145\/1063979.1063998"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Byun, J.-W., Bertino, E.: Vision paper: Micro-views, or on how to protect privacy while enhancing data usability. In: SIGMOD Record (2005) (to be published)","DOI":"10.1145\/1121995.1121997"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Byun, J.-W., Bertino, E., Li, N.: Purpose based access control for privacy protection in relational dtabase systems. Technical Report 2004-52, Purdue Univ. (2004)","DOI":"10.1145\/1063979.1063998"},{"key":"9_CR5","unstructured":"W. W. W. Consortium (W3C). A p3p preference exchange language 1.0 (appel 1.0), Available at: www.zurich.ibm.com\/security\/enterprise-privacy\/epal"},{"key":"9_CR6","unstructured":"Bitton, D., DeWitt, D.J., Turbyfill, C.: Benchmarking database: system a systematic approach. In: Ninth International Conference on Very Large Data Bases, pp. 8\u201319 (October 1983)"},{"key":"9_CR7","unstructured":"Bitton, D., DeWitt, D.J., Turbyfill, C.: Benchmarking database system a systematic approach. In: Proceeding of CCS 2004, pp. 25\u201329 (October 2004)"},{"key":"9_CR8","first-page":"72","volume":"82","author":"W. Gasarch","year":"2004","unstructured":"Gasarch, W.: A survey on private information retrieval. The Bulletin of the EATCS\u00a082, 72\u2013107 (2004)","journal-title":"The Bulletin of the EATCS"},{"issue":"2","key":"9_CR9","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/152610.152611","volume":"25","author":"G. Graef","year":"1993","unstructured":"Graef, G.: Query evaluation techniques for large databases. ACM Computing Surveys\u00a025(2), 73\u2013169 (1993)","journal-title":"ACM Computing Surveys"},{"key":"9_CR10","unstructured":"IBM. The enterprise privacy authorization language (epal), Available at: www.w3.org\/TR\/P3P-preferences"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D.: Limiting disclosure in hippocratic database. In: The 30th International Conference on Very Large Databases (August 2004)","DOI":"10.1016\/B978-012088469-8.50013-9"},{"key":"9_CR12","unstructured":"T. C. C. P. S. Organisations. Common criteria for information technology security evaluation, part 2, draft version 3 and version 2.1-2.3 (August 2005)"},{"key":"9_CR13","unstructured":"Ashley, P., Powers, C.S., Schunter, M.: Privacy, access control, and privacy management. In: Third International Symposium on Electronic Commerce (2002)"},{"issue":"1","key":"9_CR14","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/290163.290171","volume":"1","author":"R. Sandhu","year":"1998","unstructured":"Sandhu, R., Chen, F.: The multilevel relational (mlr) data model. ACM Transactions on Information and System Security\u00a01(1), 93\u2013132 (1998)","journal-title":"ACM Transactions on Information and System Security"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Selinger, P.G., Astrahan, M.M., Chamberlin, D.d., Lorie, R.A., Price, T.G.: Access path selection in a relational dababase management system. In: Proceedings of the 1979 ACM SIGMOD Conference on the Management of Data (May-June 1979)","DOI":"10.1145\/582095.582099"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Seshadri, P., Swami, A.: Generalized partial indexes. In: Proceedings of the Eleventh International Conference on Data Engineering (ICDE), pp. 420\u2013427 (1995)","DOI":"10.1109\/ICDE.1995.380355"},{"issue":"5","key":"9_CR17","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L.. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"9_CR18","unstructured":"W. W. W. C. (W3C). Platform for privacy preferences (p3p), Available at: http:\/\/www.w3.org\/P3P"}],"container-title":["Lecture Notes in Computer Science","Flexible and Efficient Information Handling"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11788911_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:09:56Z","timestamp":1605643796000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11788911_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540359692","9783540359715"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11788911_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}