{"id":"https://openalex.org/W2112340163","doi":"https://doi.org/10.1145/1559845.1559861","title":"Attacks on privacy and deFinetti's theorem","display_name":"Attacks on privacy and deFinetti's theorem","publication_year":2009,"publication_date":"2009-06-29","ids":{"openalex":"https://openalex.org/W2112340163","doi":"https://doi.org/10.1145/1559845.1559861","mag":"2112340163"},"language":"en","primary_location":{"id":"doi:10.1145/1559845.1559861","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1559845.1559861","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 ACM SIGMOD International Conference on Management of data","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005431144","display_name":"Daniel Kifer","orcid":"https://orcid.org/0000-0002-4611-7066"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Daniel Kifer","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA, USA","The Pennsylvania State University , University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"The Pennsylvania State University , University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5005431144"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":25.679,"has_fulltext":false,"cited_by_count":157,"citation_normalized_percentile":{"value":0.99654883,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"127","last_page":"138"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7570286393165588},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6815332174301147},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4942155182361603},{"id":"https://openalex.org/keywords/tuple","display_name":"Tuple","score":0.48008328676223755},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4571502208709717},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3596709370613098},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.27048569917678833},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.258359432220459}],"concepts":[{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7570286393165588},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6815332174301147},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4942155182361603},{"id":"https://openalex.org/C118930307","wikidata":"https://www.wikidata.org/wiki/Q600590","display_name":"Tuple","level":2,"score":0.48008328676223755},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4571502208709717},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3596709370613098},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.27048569917678833},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.258359432220459},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1559845.1559861","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1559845.1559861","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 ACM SIGMOD International Conference on Management of data","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.173.4501","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.173.4501","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cse.psu.edu/%7Edkifer/papers/definetti.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.330.9992","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.9992","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://delivery.acm.org/10.1145/1560000/1559861/p127-kifer.pdf?CFID%3D184811482%26CFTOKEN%3D26080404%26__acm__%3D1362002089_9c40c3fe4832bb09f13f39fdd98c6a9a%26acc%3DACTIVE+SERVICE%26ip%3D130.203.136.92","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6700000166893005}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W37937247","https://openalex.org/W130710483","https://openalex.org/W169775351","https://openalex.org/W1540483414","https://openalex.org/W1616788770","https://openalex.org/W1912123407","https://openalex.org/W1981663184","https://openalex.org/W1985093013","https://openalex.org/W2008191602","https://openalex.org/W2010995353","https://openalex.org/W2019420194","https://openalex.org/W2022079499","https://openalex.org/W2028201288","https://openalex.org/W2049633694","https://openalex.org/W2071776923","https://openalex.org/W2074673068","https://openalex.org/W2078686663","https://openalex.org/W2098331493","https://openalex.org/W2098986246","https://openalex.org/W2099907571","https://openalex.org/W2107927452","https://openalex.org/W2115209166","https://openalex.org/W2115826669","https://openalex.org/W2116416325","https://openalex.org/W2117426363","https://openalex.org/W2120263102","https://openalex.org/W2124849257","https://openalex.org/W2128082768","https://openalex.org/W2129157759","https://openalex.org/W2130099852","https://openalex.org/W2134167315","https://openalex.org/W2135581534","https://openalex.org/W2135930857","https://openalex.org/W2136114025","https://openalex.org/W2136661217","https://openalex.org/W2140096141","https://openalex.org/W2140336868","https://openalex.org/W2140785063","https://openalex.org/W2154259588","https://openalex.org/W2159024459","https://openalex.org/W2161030490","https://openalex.org/W2161229593","https://openalex.org/W2163263459","https://openalex.org/W2164341199","https://openalex.org/W2166065644","https://openalex.org/W2166270001","https://openalex.org/W2166886337","https://openalex.org/W2170258874","https://openalex.org/W2752853835","https://openalex.org/W2911978475","https://openalex.org/W2964324211","https://openalex.org/W3120740533","https://openalex.org/W4206202898","https://openalex.org/W4210896998","https://openalex.org/W4239726656","https://openalex.org/W6601567245","https://openalex.org/W6674367641","https://openalex.org/W6788247690"],"related_works":["https://openalex.org/W2143551613","https://openalex.org/W4245395944","https://openalex.org/W1979740464","https://openalex.org/W2138823233","https://openalex.org/W2143345456","https://openalex.org/W2060145807","https://openalex.org/W4248806346","https://openalex.org/W1806182398","https://openalex.org/W3093954335","https://openalex.org/W4205482204"],"abstract_inverted_index":{"In":[0,55],"this":[1,24,53],"paper":[2],"we":[3],"present":[4],"a":[5,31],"method":[6],"for":[7],"reasoning":[8],"about":[9],"privacy":[10],"using":[11,27],"the":[12,21,45,61],"concepts":[13],"of":[14,23],"exchangeability":[15],"and":[16],"deFinetti's":[17],"theorem.":[18],"We":[19,39],"illustrate":[20],"usefulness":[22],"technique":[25],"by":[26],"it":[28],"to":[29,52,71],"attack":[30],"popular":[32],"data":[33],"sanitization":[34,47],"scheme":[35,48,58],"known":[36],"as":[37],"Anatomy.":[38],"stress":[40],"that":[41,49,59],"Anatomy":[42],"is":[43,50],"not":[44],"only":[46],"vulnerable":[51],"attack.":[54],"fact,":[56],"any":[57],"uses":[60],"random":[62],"worlds":[63],"model,":[64,66],"i.i.d.":[65],"or":[67],"tuple-independent":[68],"model":[69],"needs":[70],"be":[72],"re-evaluated.":[73]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":15},{"year":2014,"cited_by_count":16},{"year":2013,"cited_by_count":17},{"year":2012,"cited_by_count":22}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
