{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:46:58Z","timestamp":1725623218047},"publisher-location":"New York, NY, USA","reference-count":0,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,3,22]]},"DOI":"10.1145\/1754239.1754273","type":"proceedings-article","created":{"date-parts":[[2010,4,2]],"date-time":"2010-04-02T14:50:55Z","timestamp":1270219855000},"page":"1-1","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Protecting data privacy in outsourcing scenarios"],"prefix":"10.1145","author":[{"given":"Pierangela","family":"Samarati","sequence":"first","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2010,3,22]]},"event":{"name":"EDBT\/ICDT '10: EDBT\/ICDT '10 joint conference","acronym":"EDBT\/ICDT '10","location":"Lausanne Switzerland"},"container-title":["Proceedings of the 2010 EDBT\/ICDT Workshops"],"original-title":[],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T14:52:45Z","timestamp":1673707965000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1754239.1754273"}},"subtitle":["invited talk"],"short-title":[],"issued":{"date-parts":[[2010,3,22]]},"references-count":0,"alternative-id":["10.1145\/1754239.1754273","10.1145\/1754239"],"URL":"https:\/\/doi.org\/10.1145\/1754239.1754273","relation":{},"subject":[],"published":{"date-parts":[[2010,3,22]]},"assertion":[{"value":"2010-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}