{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T13:29:09Z","timestamp":1725974949682},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319897219"},{"type":"electronic","value":"9783319897226"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-89722-6_12","type":"book-chapter","created":{"date-parts":[[2018,4,13]],"date-time":"2018-04-13T10:53:50Z","timestamp":1523616830000},"page":"278-299","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["UniTraX: Protecting Data Privacy with Discoverable Biases"],"prefix":"10.1007","author":[{"given":"Reinhard","family":"Munz","sequence":"first","affiliation":[]},{"given":"Fabienne","family":"Eigner","sequence":"additional","affiliation":[]},{"given":"Matteo","family":"Maffei","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Francis","sequence":"additional","affiliation":[]},{"given":"Deepak","family":"Garg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,14]]},"reference":[{"issue":"2","key":"12_CR1","first-page":"127","volume":"7","author":"M Allagan","year":"2016","unstructured":"Allagan, M., Gambs, S., Kermarrec, A.M.: Heterogeneous differential privacy. J. Priv. Confidentiality 7(2), 127\u2013158 (2016). Article 6, http:\/\/repository.cmu.edu\/jpc\/vol7\/iss2\/6\/","journal-title":"J. Priv. Confidentiality"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-31680-7_8","volume-title":"Privacy Enhancing Technologies","author":"T-HH Chan","year":"2012","unstructured":"Chan, T.-H.H., Li, M., Shi, E., Xu, W.: Differentially private continual monitoring of heavy hitters from distributed streams. In: Fischer-H\u00fcbner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 140\u2013159. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31680-7_8"},{"issue":"3","key":"12_CR3","doi-asserted-by":"publisher","first-page":"26:1","DOI":"10.1145\/2043621.2043626","volume":"14","author":"T-HH Chan","year":"2011","unstructured":"Chan, T.-H.H., Shi, E., Song, D.: Private and continual release of statistics. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(3), 26:1\u201326:24 (2011). https:\/\/doi.org\/10.1145\/2043621.2043626","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-32946-3_15","volume-title":"Financial Cryptography and Data Security","author":"T-HH Chan","year":"2012","unstructured":"Chan, T.-H.H., Shi, E., Song, D.: Privacy-preserving stream aggregation with fault tolerance. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 200\u2013214. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32946-3_15"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-642-35311-6_23","volume-title":"Internet and Network Economics","author":"P Dandekar","year":"2012","unstructured":"Dandekar, P., Fawaz, N., Ioannidis, S.: Privacy auctions for recommender systems. In: Goldberg, P.W. (ed.) WINE 2012. LNCS, vol. 7695, pp. 309\u2013322. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-35311-6_23"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"issue":"1","key":"12_CR8","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork, C.: A firm foundation for private data analysis. Commun. ACM (CACM) 54(1), 86\u201395 (2011). https:\/\/doi.org\/10.1145\/1866739.1866758","journal-title":"Commun. ACM (CACM)"},{"key":"12_CR9","doi-asserted-by":"publisher","unstructured":"Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential privacy under continual observation. In: Mitzenmacher, M., Schulman, L.J. (eds.) Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC 2010), pp. 715\u2013724. ACM, New York (2010). https:\/\/doi.org\/10.1145\/1806689.1806787","DOI":"10.1145\/1806689.1806787"},{"key":"12_CR10","doi-asserted-by":"publisher","unstructured":"Ebadi, H., Sands, D., Schneider, G.: Differential privacy: now it\u2019s getting personal. In: Rajamani, S.K., Walker, D. (eds.) Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2015), pp. 69\u201381. ACM, New York (2015). https:\/\/doi.org\/10.1145\/2676726.2677005","DOI":"10.1145\/2676726.2677005"},{"key":"12_CR11","doi-asserted-by":"publisher","unstructured":"Erlingsson, \u00da., Pihur, V., Korolova, A.: RAPPOR: randomized aggregatable privacy-preserving ordinal response. In: Ahn, G., Yung, M., Li, N. (eds.) Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS 2014), pp. 1054\u20131067. ACM, New York (2014). https:\/\/doi.org\/10.1145\/2660267.2660348","DOI":"10.1145\/2660267.2660348"},{"key":"12_CR12","doi-asserted-by":"publisher","unstructured":"Esp\u00edn Noboa, L., Lemmerich, F., Singer, P., Strohmaier, M.: Discovering and characterizing mobility patterns in urban spaces: a study of Manhattan taxi data. In: Bourdeau, J., Hendler, J., Nkambou, R., Horrocks, I., Zhao, B.Y. (eds.) Proceedings of the 25th International Conference Companion on World Wide Web (WWW 2016 Companion), pp. 537\u2013542. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland (2016). https:\/\/doi.org\/10.1145\/2872518.2890468","DOI":"10.1145\/2872518.2890468"},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"Friedman, A., Sharfman, I., Keren, D., Schuster, A.: Privacy-preserving distributed stream monitoring. In: Proceedings of the 21st Annual Symposium on Network and Distributed System Security (NDSS 2014). ISOC (2014). https:\/\/doi.org\/10.14722\/ndss.2014.23128","DOI":"10.14722\/ndss.2014.23128"},{"key":"12_CR14","doi-asserted-by":"publisher","unstructured":"Ghosh, A., Roth, A.: Selling privacy at auction. In: Shoham, Y., Chen, Y., Roughgarden, T. (eds.) Proceedings of the 12th ACM Conference on Electronic Commerce (EC 2011), pp. 199\u2013208. ACM, New York (2011). https:\/\/doi.org\/10.1145\/1993574.1993605","DOI":"10.1145\/1993574.1993605"},{"key":"12_CR15","doi-asserted-by":"publisher","unstructured":"Jorgensen, Z., Yu, T., Cormode, G.: Conservative or liberal? Personalized differential privacy. In: Gehrke, J., Lehner, W., Shim, K., Cha, S.K., Lohman, G.M. (eds.) Proceedings of the 31st IEEE International Conference on Data Engineering (ICDE 2015), pp. 1023\u20131034. IEEE (2015). https:\/\/doi.org\/10.1109\/ICDE.2015.7113353","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"12_CR16","doi-asserted-by":"publisher","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: $$l$$l-diversity: privacy beyond $$k$$k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1(1) (2007). Article 3, https:\/\/doi.org\/10.1145\/1217299.1217302","DOI":"10.1145\/1217299.1217302"},{"key":"12_CR17","doi-asserted-by":"publisher","unstructured":"McSherry, F.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: \u00c7etintemel, U., Zdonik, S.B., Kossmann, D., Tatbul, N. (eds.) Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD 2009), pp. 19\u201330. ACM, New York (2009). https:\/\/doi.org\/10.1145\/1559845.1559850","DOI":"10.1145\/1559845.1559850"},{"key":"12_CR18","unstructured":"Monroy-Hern\u00e1ndez, A.: NYC taxi trips, June 2014. http:\/\/www.andresmh.com\/nyctaxitrips\/"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Munz, R., Eigner, F., Maffei, M., Francis, P., Garg, D.: UniTraX: protecting data privacy with discoverable biases. Technical report MPI-SWS-2018-001, Max Planck Institute for Software Systems (MPI-SWS), Kaiserslautern and Saarbr\u00fccken, Germany, February 2018. https:\/\/www.mpi-sws.org\/tr\/2018-001.pdf","DOI":"10.1007\/978-3-319-89722-6_12"},{"key":"12_CR20","doi-asserted-by":"publisher","unstructured":"Nissim, K., Vadhan, S.P., Xiao, D.: Redrawing the boundaries on purchasing data from privacy-sensitive individuals. In: Naor, M. (ed.) Proceedings of the 5th Conference on Innovations in Theoretical Computer Science (ITCS 2014), pp. 411\u2013422. ACM, New York (2014). https:\/\/doi.org\/10.1145\/2554797.2554835","DOI":"10.1145\/2554797.2554835"},{"key":"12_CR21","unstructured":"NYC Taxi & Limousine Commission: TLC trip record data, May 2017. http:\/\/www.nyc.gov\/html\/tlc\/html\/about\/trip_record_data.shtml"},{"key":"12_CR22","doi-asserted-by":"publisher","unstructured":"Rastogi, V., Nath, S.: Differentially private aggregation of distributed time-series with transformation and encryption. In: Elmagarmid, A.K., Agrawal, D. (eds.) Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD 2010), pp. 735\u2013746. ACM, New York (2010). https:\/\/doi.org\/10.1145\/1807167.1807247","DOI":"10.1145\/1807167.1807247"},{"key":"12_CR23","unstructured":"Shi, E., Chan, T.-H.H., Rieffel, E.G., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: Proceedings of the Symposium on Network and Distributed System Security (NDSS 2011). ISOC (2011). https:\/\/www.isoc.org\/isoc\/conferences\/ndss\/11\/pdf\/9_3.pdf"},{"key":"12_CR24","unstructured":"Yu, Y., Isard, M., Fetterly, D., Budiu, M., Erlingsson, \u00da., Gunda, P.K., Currey, J.: DryadLINQ: a system for general-purpose distributed data-parallel computing using a high-level language. In: Draves, R., van Renesse, R. (eds.) Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2008), pp. 1\u201314. USENIX (2008). https:\/\/www.usenix.org\/event\/osdi08\/tech\/full_papers\/yu_y\/yu_y.pdf"}],"container-title":["Lecture Notes in Computer Science","Principles of Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-89722-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,15]],"date-time":"2019-10-15T15:21:54Z","timestamp":1571152914000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-89722-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319897219","9783319897226"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-89722-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}