{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T01:18:54Z","timestamp":1725758334995},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642420009"},{"type":"electronic","value":"9783642420016"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-42001-6_15","type":"book-chapter","created":{"date-parts":[[2013,11,20]],"date-time":"2013-11-20T23:25:02Z","timestamp":1384989902000},"page":"211-225","source":"Crossref","is-referenced-by-count":1,"title":["Defining Privacy Based on Distributions of Privacy Breaches"],"prefix":"10.1007","author":[{"given":"Matthias","family":"Huber","sequence":"first","affiliation":[]},{"given":"J\u00f6rn","family":"M\u00fcller-Quade","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Nilges","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Kifer, D., Lin, B.R.: An axiomatic view of statistical privacy and utility. Journal of Privacy and Confidentiality\u00a04(1), Article 2","DOI":"10.29012\/jpc.v4i1.610"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1145\/1807085.1807106","volume-title":"Proceedings of the Twenty-Ninth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2010","author":"D. Kifer","year":"2010","unstructured":"Kifer, D., Lin, B.R.: Towards an axiomatization of statistical privacy and utility. In: Proceedings of the Twenty-Ninth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2010, pp. 147\u2013158. ACM, New York (2010)"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-642-39185-9_10","volume-title":"E-Voting and Identify","author":"D. Demirel","year":"2013","unstructured":"Demirel, D., Henning, M., van de Graaf, J., Ryan, P.Y.A., Buchmann, J.: Pr\u00eat \u00e0 voter providing everlasting privacy. In: Heather, J., Schneider, S., Teague, V. (eds.) Vote-ID 2013. LNCS, vol.\u00a07985, pp. 156\u2013175. Springer, Heidelberg (2013)"},{"key":"15_CR4","unstructured":"Langer, L., Schmidt, A., Volkamer, M., Buchmann, J.: Classifying privacy and verifiability requirements for electronic voting. In: Fischer, S., Maehle, E., Reischuk, R. (eds.) GI Jahrestagung. LNI, vol.\u00a0154, pp. 1837\u20131846. GI (2009)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-39884-1_16","volume-title":"Financial Cryptography and Data Security","author":"J. Buchmann","year":"2013","unstructured":"Buchmann, J., Demirel, D., van de Graaf, J.: Towards a publicly-verifiable mix-net providing everlasting privacy. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol.\u00a07859, pp. 197\u2013204. Springer, Heidelberg (2013)"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. -Based Syst.\u00a010, 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. -Based Syst."},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1145\/564691.564717","volume-title":"SIGMOD 2002: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data","author":"H. Hacig\u00fcm\u00fc\u015f","year":"2002","unstructured":"Hacig\u00fcm\u00fc\u015f, H., Iyer, B., Li, C., Mehrotra, S.: Executing sql over encrypted data in the database-service-provider model. In: SIGMOD 2002: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, pp. 216\u2013227. ACM, New York (2002)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Redfield, C., Zeldovich, N., Balakrishnan, H.: CryptDB: Protecting Confidentiality with Encrypted Query Processing. In: Symposium on Operating Systems Principles (SOSP), Cascais, Portugal (October 2011)","DOI":"10.1145\/2043556.2043566"},{"key":"15_CR10","unstructured":"Lin, B.R., Kifer, D.: A framework for extracting semantic guarantees from privacy. CoRR abs\/1208.5443 (2012)"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/11761679_29","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 486\u2013503. Springer, Heidelberg (2006)"},{"key":"15_CR12","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, CMU SRI (1998)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: ICDE, vol.\u00a024 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: ICDE, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient full-domain k-anonymity. In: SIGMOD Conference, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: PODS, pp. 223\u2013228 (2004)","DOI":"10.1145\/1055558.1055591"},{"key":"15_CR17","unstructured":"Bayardo Jr., R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE, pp. 217\u2013228 (2005)"},{"issue":"1","key":"15_CR18","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.datak.2010.09.001","volume":"70","author":"H. Tian","year":"2011","unstructured":"Tian, H., Zhang, W.: Extending l-diversity to generalize sensitive data. Data Knowl. Eng.\u00a070(1), 101\u2013126 (2011)","journal-title":"Data Knowl. Eng."},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. In: KDD, pp. 265\u2013273 (2008)","DOI":"10.1145\/1401890.1401926"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-642-15464-5_17","volume-title":"Research and Advanced Technology for Digital Libraries","author":"C. Heidinger","year":"2010","unstructured":"Heidinger, C., Buchmann, E., Huber, M., B\u00f6hm, K., M\u00fcller-Quade, J.: Privacy-aware folksonomies. In: Lalmas, M., Jose, J., Rauber, A., Sebastiani, F., Frommholz, I. (eds.) ECDL 2010. LNCS, vol.\u00a06273, pp. 156\u2013167. Springer, Heidelberg (2010)"},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/11761679_29","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: Privacy via distributed noise generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 486\u2013503. Springer, Heidelberg (2006)"},{"key":"15_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.\u00a03876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"key":"15_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/978-3-642-19571-6_26","volume-title":"Theory of Cryptography","author":"J. Gehrke","year":"2011","unstructured":"Gehrke, J., Lui, E., Pass, R.: Towards privacy for social networks: A zero-knowledge based definition of privacy. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol.\u00a06597, pp. 432\u2013449. Springer, Heidelberg (2011)"},{"key":"15_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/978-3-642-32009-5_28","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"J. Gehrke","year":"2012","unstructured":"Gehrke, J., Hay, M., Lui, E., Pass, R.: Crowd-blending privacy. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol.\u00a07417, pp. 479\u2013496. Springer, Heidelberg (2012)"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Kifer, D., Machanavajjhala, A.: No free lunch in data privacy. In: Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, SIGMOD 2011, pp. 193\u2013204 (2011)","DOI":"10.1145\/1989323.1989345"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Duan, Y.: Privacy without noise. In: CIKM, pp. 1517\u20131520 (2009)","DOI":"10.1145\/1645953.1646160"},{"key":"15_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-642-25385-0_12","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"R. Bhaskar","year":"2011","unstructured":"Bhaskar, R., Bhowmick, A., Goyal, V., Laxman, S., Thakurta, A.: Noiseless database privacy. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol.\u00a07073, pp. 215\u2013232. Springer, Heidelberg (2011)"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the sulq framework. In: Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2005, pp. 128\u2013138 (2005)","DOI":"10.1145\/1065167.1065184"},{"key":"15_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/11818175_12","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"K. Chaudhuri","year":"2006","unstructured":"Chaudhuri, K., Mishra, N.: When random sampling preserves privacy. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 198\u2013213. Springer, Heidelberg (2006)"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Fagin, R., Woodruff, D.P.: Epistemic privacy. In: Proceedings of the Twenty-Seventh ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2008, pp. 171\u2013180 (2008)","DOI":"10.1145\/1376916.1376941"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Blum, A., Ligett, K., Roth, A.: A learning theory approach to non-interactive database privacy. In: STOC, pp. 609\u2013618 (2008)","DOI":"10.1145\/1374376.1374464"},{"issue":"2","key":"15_CR32","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/2450142.2450148","volume":"60","author":"A. Blum","year":"2013","unstructured":"Blum, A., Ligett, K., Roth, A.: A learning theory approach to noninteractive database privacy. J. ACM\u00a060(2), 12 (2013)","journal-title":"J. ACM"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Kifer, D., Machanavajjhala, A.: A rigorous and customizable framework for privacy. In: Proceedings of the 31st Symposium on Principles of Database Systems, PODS 2012, pp. 77\u201388 (2012)","DOI":"10.1145\/2213556.2213571"},{"issue":"309","key":"15_CR34","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","volume":"60","author":"S.L. Warner","year":"1965","unstructured":"Warner, S.L.: Randomized response: A survey technique for eliminating evasive answer bias. Journal of the American Statistical Association\u00a060(309), 63\u201369 (1965)","journal-title":"Journal of the American Statistical Association"}],"container-title":["Lecture Notes in Computer Science","\u2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-42001-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T09:02:52Z","timestamp":1558688572000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-42001-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642420009","9783642420016"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-42001-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}