{"id":"https://openalex.org/W2150356196","doi":"https://doi.org/10.1145/2557547.2557586","title":"Privacy-preserving publication of provenance workflows","display_name":"Privacy-preserving publication of provenance workflows","publication_year":2014,"publication_date":"2014-02-25","ids":{"openalex":"https://openalex.org/W2150356196","doi":"https://doi.org/10.1145/2557547.2557586","mag":"2150356196"},"language":"en","primary_location":{"id":"doi:10.1145/2557547.2557586","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557586","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022161718","display_name":"Mihai Maruseac","orcid":"https://orcid.org/0000-0002-6225-1206"},"institutions":[{"id":"https://openalex.org/I33434090","display_name":"University of Massachusetts Boston","ror":"https://ror.org/04ydmy275","country_code":"US","type":"education","lineage":["https://openalex.org/I33434090"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mihai Maruseac","raw_affiliation_strings":["University of Massachusetts Boston, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Boston, Boston, MA, USA","institution_ids":["https://openalex.org/I33434090"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069236544","display_name":"Gabriel Ghinita","orcid":"https://orcid.org/0000-0002-8372-3006"},"institutions":[{"id":"https://openalex.org/I33434090","display_name":"University of Massachusetts Boston","ror":"https://ror.org/04ydmy275","country_code":"US","type":"education","lineage":["https://openalex.org/I33434090"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gabriel Ghinita","raw_affiliation_strings":["University of Massachusetts Boston, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Boston, Boston, MA, USA","institution_ids":["https://openalex.org/I33434090"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071318126","display_name":"R\u0103zvan Rughini\u015f","orcid":"https://orcid.org/0000-0003-2794-280X"},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Razvan Rughinis","raw_affiliation_strings":["Politehnica University Bucharest, Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"Politehnica University Bucharest, Bucharest, Romania","institution_ids":["https://openalex.org/I61641377"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022161718"],"corresponding_institution_ids":["https://openalex.org/I33434090"],"apc_list":null,"apc_paid":null,"fwci":1.636,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.87825314,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"159","last_page":"162"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11937","display_name":"Research Data Management Practices","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.9222726821899414},{"id":"https://openalex.org/keywords/provenance","display_name":"Provenance","score":0.8199900984764099},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.7832397222518921},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7653384208679199},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.5312544703483582},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.47180119156837463},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3373889923095703},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.23692670464515686},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.21545422077178955},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21321648359298706}],"concepts":[{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.9222726821899414},{"id":"https://openalex.org/C2780049196","wikidata":"https://www.wikidata.org/wiki/Q23582628","display_name":"Provenance","level":2,"score":0.8199900984764099},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.7832397222518921},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7653384208679199},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5312544703483582},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.47180119156837463},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3373889923095703},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.23692670464515686},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.21545422077178955},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21321648359298706},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C5900021","wikidata":"https://www.wikidata.org/wiki/Q163082","display_name":"Petrology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2557547.2557586","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557586","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1873763122","https://openalex.org/W1994326726","https://openalex.org/W2108215372","https://openalex.org/W2122290076"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2354627941"],"abstract_inverted_index":{"Provenance":[0,30],"workflows":[1],"capture":[2],"the":[3,7,10,35,107,127],"data":[4,11,40,105],"movement":[5],"and":[6,37,42,50,76,144],"operations":[8,38],"changing":[9],"in":[12,21,26],"complex":[13],"applications":[14],"such":[15,65,116],"as":[16,66],"scientific":[17],"computations,":[18],"document":[19],"management":[20],"large":[22],"organizations,":[23],"content":[24],"generation":[25],"social":[27,80],"media,":[28],"etc.":[29],"is":[31,119],"essential":[32],"to":[33,106,121],"understand":[34],"processes":[36,68],"that":[39,115,146],"undergo,":[41],"many":[43],"research":[44],"efforts":[45],"focused":[46],"on":[47],"modeling,":[48],"capturing":[49],"analyzing":[51],"provenance":[52,55,90,110,123,150],"information.":[53],"Sharing":[54],"brings":[56],"numerous":[57],"benefits,":[58],"but":[59],"may":[60],"also":[61],"disclose":[62],"sensitive":[63],"information,":[64],"secret":[67],"of":[69,102,109,134],"synthesizing":[70],"chemical":[71],"substances,":[72],"confidential":[73],"business":[74],"practices":[75],"private":[77],"details":[78],"about":[79],"media":[81],"participants'":[82],"lives.":[83],"In":[84,138],"this":[85],"paper,":[86],"we":[87,140],"study":[88],"privacy-preserving":[89],"workflow":[91],"publication":[92],"using":[93],"differential":[94],"privacy.":[95],"We":[96],"adapt":[97],"techniques":[98],"designed":[99],"for":[100,136],"sanitization":[101],"multi-dimensional":[103],"spatial":[104],"problem":[108],"workflows.":[111,151],"Experimental":[112],"results":[113],"show":[114],"an":[117],"approach":[118],"feasible":[120],"protect":[122],"workflows,":[124],"while":[125],"at":[126],"same":[128],"time":[129],"retaining":[130],"a":[131],"significant":[132],"amount":[133],"utility":[135],"queries.":[137],"addition,":[139],"identify":[141],"influential":[142],"factors":[143],"trade-offs":[145],"emerge":[147],"when":[148],"sanitizing":[149]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
