{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T12:46:22Z","timestamp":1702471582372},"reference-count":25,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[2013,12,1]],"date-time":"2013-12-01T00:00:00Z","timestamp":1385856000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T00:00:00Z","timestamp":1513814400000},"content-version":"vor","delay-in-days":1481,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer and System Sciences"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1016\/j.jcss.2013.06.004","type":"journal-article","created":{"date-parts":[[2013,6,28]],"date-time":"2013-06-28T02:16:27Z","timestamp":1372385787000},"page":"1322-1340","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"title":["Denials leak information: Simulatable auditing"],"prefix":"10.1016","volume":"79","author":[{"given":"Krishnaram","family":"Kenthapadi","sequence":"first","affiliation":[]},{"given":"Nina","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Kobbi","family":"Nissim","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.jcss.2013.06.004_br0010","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1145\/76894.76895","article-title":"Security control methods for statistical databases: A comparative study","volume":"21","author":"Adam","year":"1989","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/j.jcss.2013.06.004_br0020","series-title":"Log-concave probability distributions: Theory and statistical testing","author":"An","year":"1996"},{"issue":"3","key":"10.1016\/j.jcss.2013.06.004_br0030","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1145\/320613.320617","article-title":"A security mechanism for statistical database","volume":"5","author":"Beck","year":"1980","journal-title":"ACM Transactions on Database Systems"},{"issue":"3","key":"10.1016\/j.jcss.2013.06.004_br0040","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1145\/5925.5928","article-title":"Security problems on inference control for SUM, MAX, and MIN queries","volume":"33","author":"Chin","year":"1986","journal-title":"Journal of the ACM"},{"key":"10.1016\/j.jcss.2013.06.004_br0050","series-title":"Proceedings of the ACM \u02bc81 Conference","first-page":"53","article-title":"Auditing for secure statistical databases","author":"Chin","year":"1981"},{"issue":"1","key":"10.1016\/j.jcss.2013.06.004_br0060","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1145\/319540.319558","article-title":"Statistical database design","volume":"6","author":"Chin","year":"1981","journal-title":"ACM Transactions on Database Systems"},{"key":"10.1016\/j.jcss.2013.06.004_br0070","first-page":"429","article-title":"Towards a methodology for statistical disclosure control","volume":"15","author":"Dalenius","year":"1977","journal-title":"Statistisk Tidskrift"},{"key":"10.1016\/j.jcss.2013.06.004_br0080","series-title":"Proceedings of the 22nd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems","first-page":"202","article-title":"Revealing information while preserving privacy","author":"Dinur","year":"2003"},{"issue":"1","key":"10.1016\/j.jcss.2013.06.004_br0090","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/320064.320068","article-title":"Secure databases: protection against user influence","volume":"4","author":"Dobkin","year":"1979","journal-title":"ACM Transactions on Database Systems"},{"key":"10.1016\/j.jcss.2013.06.004_br0100","series-title":"ICALP","first-page":"1","article-title":"Differential privacy","author":"Dwork","year":"2006"},{"key":"10.1016\/j.jcss.2013.06.004_br0110","series-title":"Proceedings of the 3rd Theory of Cryptography Conference","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"Dwork","year":"2006"},{"key":"10.1016\/j.jcss.2013.06.004_br0120","series-title":"Advances in Cryptology: Proceedings of Crypto","first-page":"528","article-title":"Privacy-preserving datamining on vertically partitioned databases","author":"Dwork","year":"2004"},{"key":"10.1016\/j.jcss.2013.06.004_br0130","series-title":"PODS","first-page":"171","article-title":"Epistemic privacy","author":"Evfimievski","year":"2008"},{"key":"10.1016\/j.jcss.2013.06.004_br0140","series-title":"Proceedings of the 22nd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems","first-page":"211","article-title":"Limiting privacy breaches in privacy preserving data mining","author":"Evfimievski","year":"2003"},{"key":"10.1016\/j.jcss.2013.06.004_br0150","series-title":"Proceedings of the 14th Annual ACM Symposium on Theory of Computing","first-page":"365","article-title":"Probabilistic encryption & how to play mental poker keeping secret all partial information","author":"Goldwasser","year":"1982"},{"issue":"1","key":"10.1016\/j.jcss.2013.06.004_br0160","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/320521.320525","article-title":"A model of statistical databases and their security","volume":"2","author":"Kam","year":"1977","journal-title":"ACM Transactions on Database Systems"},{"key":"10.1016\/j.jcss.2013.06.004_br0170","series-title":"Proceedings of the 24th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems","first-page":"118","article-title":"Simulatable auditing","author":"Kenthapadi","year":"2005"},{"issue":"1","key":"10.1016\/j.jcss.2013.06.004_br0180","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/S0022-0000(02)00036-3","article-title":"Auditing boolean attributes","volume":"66","author":"Kleinberg","year":"2003","journal-title":"Journal of Computer and System Sciences"},{"key":"10.1016\/j.jcss.2013.06.004_br0190","series-title":"Proceedings of the 14th International Conference on Advanced Information Systems Engineering","first-page":"553","article-title":"Auditing interval-based inference","author":"Li","year":"2002"},{"key":"10.1016\/j.jcss.2013.06.004_br0200","series-title":"Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science","first-page":"640","article-title":"Logconcave functions: Geometry and efficient sampling algorithms","author":"Lovasz","year":"2003"},{"issue":"3","key":"10.1016\/j.jcss.2013.06.004_br0210","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1016\/j.jcss.2006.10.004","article-title":"A formal analysis of information disclosure in data exchange","volume":"73","author":"Miklau","year":"2007","journal-title":"Journal of Computer and System Sciences"},{"key":"10.1016\/j.jcss.2013.06.004_br0220","series-title":"Proceedings of the 32nd International Conference on Very Large Databases","article-title":"Towards robustness in query auditing","author":"Nabar","year":"2006"},{"issue":"1","key":"10.1016\/j.jcss.2013.06.004_br0230","first-page":"109","article-title":"Releasing private contingency tables","volume":"2","author":"Nabar","year":"2011","journal-title":"Journal of Privacy and Confidentiality"},{"key":"10.1016\/j.jcss.2013.06.004_br0240","series-title":"Stochastic Programming","author":"Prekova","year":"1995"},{"issue":"1","key":"10.1016\/j.jcss.2013.06.004_br0250","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/322108.322113","article-title":"Security in databases: A combinatorial study","volume":"26","author":"Reiss","year":"1979","journal-title":"Journal of the ACM"}],"container-title":["Journal of Computer and System Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002200001300113X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002200001300113X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,10,14]],"date-time":"2018-10-14T19:56:24Z","timestamp":1539546984000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S002200001300113X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":25,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["S002200001300113X"],"URL":"https:\/\/doi.org\/10.1016\/j.jcss.2013.06.004","relation":{},"ISSN":["0022-0000"],"issn-type":[{"value":"0022-0000","type":"print"}],"subject":[],"published":{"date-parts":[[2013,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Denials leak information: Simulatable auditing","name":"articletitle","label":"Article Title"},{"value":"Journal of Computer and System Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jcss.2013.06.004","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2013 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}