{"id":"https://openalex.org/W3102994281","doi":"https://doi.org/10.1145/2588555.2588581","title":"Blowfish privacy","display_name":"Blowfish privacy","publication_year":2014,"publication_date":"2014-06-18","ids":{"openalex":"https://openalex.org/W3102994281","doi":"https://doi.org/10.1145/2588555.2588581","mag":"3102994281"},"language":"en","primary_location":{"id":"doi:10.1145/2588555.2588581","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2588555.2588581","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084765224","display_name":"Xi He","orcid":"https://orcid.org/0000-0001-8680-9967"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xi He","raw_affiliation_strings":["Duke University, Durham, NC, USA"],"affiliations":[{"raw_affiliation_string":"Duke University, Durham, NC, USA","institution_ids":["https://openalex.org/I170897317"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018314576","display_name":"Ashwin Machanavajjhala","orcid":"https://orcid.org/0000-0003-1555-7330"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ashwin Machanavajjhala","raw_affiliation_strings":["Duke University, Durham, NC, USA"],"affiliations":[{"raw_affiliation_string":"Duke University, Durham, NC, USA","institution_ids":["https://openalex.org/I170897317"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040297543","display_name":"Bolin Ding","orcid":"https://orcid.org/0000-0003-1535-9692"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bolin Ding","raw_affiliation_strings":["Microsoft Research, Redmond, WA, USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Redmond, WA, USA","institution_ids":["https://openalex.org/I1290206253"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084765224"],"corresponding_institution_ids":["https://openalex.org/I170897317"],"apc_list":null,"apc_paid":null,"fwci":11.8811,"has_fulltext":false,"cited_by_count":119,"citation_normalized_percentile":{"value":0.98608937,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1447","last_page":"1458"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9793999791145325,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8931996822357178},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8314136266708374},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6424567699432373},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5975225567817688},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.5954790115356445},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.571444571018219},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.503945529460907},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5008406639099121},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.486205518245697},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.4825931787490845},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.43300697207450867},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43294772505760193},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.42748260498046875},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3677615523338318},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32399117946624756},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10313612222671509},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07935228943824768}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8931996822357178},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8314136266708374},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6424567699432373},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5975225567817688},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.5954790115356445},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.571444571018219},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.503945529460907},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5008406639099121},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.486205518245697},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.4825931787490845},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.43300697207450867},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43294772505760193},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.42748260498046875},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3677615523338318},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32399117946624756},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10313612222671509},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07935228943824768},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2588555.2588581","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2588555.2588581","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.49000000953674316,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W144420922","https://openalex.org/W1658920975","https://openalex.org/W1873763122","https://openalex.org/W1981932091","https://openalex.org/W1992697866","https://openalex.org/W2010523825","https://openalex.org/W2030559796","https://openalex.org/W2033092546","https://openalex.org/W2052747341","https://openalex.org/W2054922243","https://openalex.org/W2057576485","https://openalex.org/W2080900058","https://openalex.org/W2099259603","https://openalex.org/W2103686189","https://openalex.org/W2122290076","https://openalex.org/W2122997783","https://openalex.org/W2123779242","https://openalex.org/W2129157759","https://openalex.org/W2141859565","https://openalex.org/W2142406320","https://openalex.org/W2149545836","https://openalex.org/W2151242030","https://openalex.org/W2911978475","https://openalex.org/W2951363012","https://openalex.org/W3102994281","https://openalex.org/W4210542476","https://openalex.org/W4231394667"],"related_works":["https://openalex.org/W2019704260","https://openalex.org/W4315488958","https://openalex.org/W3176515490","https://openalex.org/W4304208041","https://openalex.org/W2900631219","https://openalex.org/W2795052735","https://openalex.org/W2596305496","https://openalex.org/W2083944649","https://openalex.org/W1982505993","https://openalex.org/W2577220285"],"abstract_inverted_index":{"Privacy":[0],"definitions":[1,33],"provide":[2],"ways":[3],"for":[4,14,44,91,144,165],"trading-off":[5],"the":[6,15,21,36,79,82,95,108,162],"privacy":[7,32,56,142],"of":[8,17,20,31,125],"individuals":[9],"in":[10,107],"a":[11,29,41,58],"statistical":[12],"database":[13],"utility":[16,87],"downstream":[18],"analysis":[19],"data.":[22,80],"In":[23,47],"this":[24,45],"paper,":[25],"we":[26,49],"present":[27,117],"Blowfish,":[28],"class":[30],"inspired":[34],"by":[35,88],"Pufferfish":[37],"framework,":[38],"that":[39,66,74,120,134],"provides":[40,98],"rich":[42],"interface":[43],"trade-off.":[46],"particular,":[48],"allow":[50],"data":[51,109],"publishers":[52],"to":[53],"extend":[54],"differential":[55],"using":[57],"policy,":[59],"which":[60,140],"specifies":[61],"(a)":[62],"secrets,":[63],"or":[64],"information":[65,127],"must":[67],"be":[68,76],"kept":[69],"secret,":[70],"and":[71,116,128,148,169],"(b)":[72],"constraints":[73],"may":[75],"known":[77],"about":[78],"While":[81],"secret":[83],"specification":[84,97],"allows":[85],"increased":[86],"lessening":[89],"protection":[90,100],"certain":[92,129],"individual":[93],"properties,":[94],"constraint":[96],"added":[99],"against":[101],"an":[102],"adversary":[103],"who":[104],"knows":[105],"correlations":[106],"(arising":[110],"from":[111],"constraints).":[112],"We":[113,132,160],"formalize":[114],"policies":[115,138,167],"novel":[118],"algorithms":[119],"can":[121],"handle":[122],"general":[123],"specifications":[124],"sensitive":[126],"count":[130],"constraints.":[131],"show":[133],"there":[135],"are":[136],"reasonable":[137],"under":[139],"our":[141],"mechanisms":[143],"k-means":[145],"clustering,":[146],"histograms":[147],"range":[149],"queries":[150],"introduce":[151],"significantly":[152],"lesser":[153],"noise":[154],"than":[155],"their":[156],"differentially":[157],"private":[158],"counterparts.":[159],"quantify":[161],"privacy-utility":[163],"trade-offs":[164],"various":[166],"analytically":[168],"empirically":[170],"on":[171],"real":[172],"datasets.":[173]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":17},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":11},{"year":2017,"cited_by_count":14},{"year":2016,"cited_by_count":9},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2020-11-23T00:00:00"}
