{"id":"https://openalex.org/W2905301851","doi":"https://doi.org/10.5334/dsj-2018-031","title":"Computing Statistics from Private Data","display_name":"Computing Statistics from Private Data","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2905301851","doi":"https://doi.org/10.5334/dsj-2018-031","mag":"2905301851"},"language":"en","primary_location":{"id":"doi:10.5334/dsj-2018-031","is_oa":true,"landing_page_url":"https://doi.org/10.5334/dsj-2018-031","pdf_url":null,"source":{"id":"https://openalex.org/S62969111","display_name":"Data Science Journal","issn_l":"1683-1470","issn":["1683-1470"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320511","host_organization_name":"Ubiquity Press","host_organization_lineage":["https://openalex.org/P4310320511"],"host_organization_lineage_names":["Ubiquity Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Data Science Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5334/dsj-2018-031","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034875117","display_name":"George Alter","orcid":"https://orcid.org/0000-0003-3823-4972"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"George Alter","raw_affiliation_strings":["Inter-University Consortium for Political Science Research (ICPSR), University of Michigan"],"affiliations":[{"raw_affiliation_string":"Inter-University Consortium for Political Science Research (ICPSR), University of Michigan","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044782086","display_name":"Brett Hemenway","orcid":"https://orcid.org/0000-0002-4344-7406"},"institutions":[{"id":"https://openalex.org/I79576946","display_name":"University of Pennsylvania","ror":"https://ror.org/00b30xv10","country_code":"US","type":"education","lineage":["https://openalex.org/I79576946"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Brett Hemenway Falk","raw_affiliation_strings":["Computer and Information Science Department, University of Pennsylvania"],"affiliations":[{"raw_affiliation_string":"Computer and Information Science Department, University of Pennsylvania","institution_ids":["https://openalex.org/I79576946"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054130528","display_name":"Steve Lu","orcid":"https://orcid.org/0000-0003-1837-8864"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Steve Lu","raw_affiliation_strings":["Stealth Software Technologies Inc"],"affiliations":[{"raw_affiliation_string":"Stealth Software Technologies Inc","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020375635","display_name":"Rafail Ostrovsky","orcid":"https://orcid.org/0000-0002-1501-1330"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rafail Ostrovsky","raw_affiliation_strings":["UCLA, work partially done while consulting for Stealth Software Technologies Inc"],"affiliations":[{"raw_affiliation_string":"UCLA, work partially done while consulting for Stealth Software Technologies Inc","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5044782086"],"corresponding_institution_ids":["https://openalex.org/I79576946"],"apc_list":{"value":350,"currency":"GBP","value_usd":429},"apc_paid":{"value":350,"currency":"GBP","value_usd":429},"fwci":0.6752,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.78557245,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"17","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7420818209648132},{"id":"https://openalex.org/keywords/competitor-analysis","display_name":"Competitor analysis","score":0.6900530457496643},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.6083125472068787},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5906302332878113},{"id":"https://openalex.org/keywords/obstacle","display_name":"Obstacle","score":0.5303875803947449},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4786314070224762},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4562174081802368},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.45157355070114136},{"id":"https://openalex.org/keywords/intellectual-property","display_name":"Intellectual property","score":0.4459725022315979},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.43918752670288086},{"id":"https://openalex.org/keywords/aggregate-data","display_name":"Aggregate data","score":0.43360552191734314},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.42763224244117737},{"id":"https://openalex.org/keywords/aggregate","display_name":"Aggregate (composite)","score":0.41899800300598145},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26325541734695435},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.21725594997406006},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.17919552326202393},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.14413988590240479},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.09544473886489868}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7420818209648132},{"id":"https://openalex.org/C127576917","wikidata":"https://www.wikidata.org/wiki/Q624630","display_name":"Competitor analysis","level":2,"score":0.6900530457496643},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.6083125472068787},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5906302332878113},{"id":"https://openalex.org/C2776650193","wikidata":"https://www.wikidata.org/wiki/Q264661","display_name":"Obstacle","level":2,"score":0.5303875803947449},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4786314070224762},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4562174081802368},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.45157355070114136},{"id":"https://openalex.org/C34974158","wikidata":"https://www.wikidata.org/wiki/Q131257","display_name":"Intellectual property","level":2,"score":0.4459725022315979},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.43918752670288086},{"id":"https://openalex.org/C2778058735","wikidata":"https://www.wikidata.org/wiki/Q4692253","display_name":"Aggregate data","level":2,"score":0.43360552191734314},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.42763224244117737},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.41899800300598145},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26325541734695435},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.21725594997406006},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.17919552326202393},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.14413988590240479},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.09544473886489868},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.5334/dsj-2018-031","is_oa":true,"landing_page_url":"https://doi.org/10.5334/dsj-2018-031","pdf_url":null,"source":{"id":"https://openalex.org/S62969111","display_name":"Data Science Journal","issn_l":"1683-1470","issn":["1683-1470"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320511","host_organization_name":"Ubiquity Press","host_organization_lineage":["https://openalex.org/P4310320511"],"host_organization_lineage_names":["Ubiquity Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Data Science Journal","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b7094420d6c24c32a378e440f9193e58","is_oa":true,"landing_page_url":"https://doaj.org/article/b7094420d6c24c32a378e440f9193e58","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Data Science Journal, Vol 17 (2018)","raw_type":"article"},{"id":"pmh:oai:ojs.datascience.codata.org:article/651","is_oa":true,"landing_page_url":"https://datascience.codata.org/jms/article/view/651","pdf_url":null,"source":{"id":"https://openalex.org/S62969111","display_name":"Data Science Journal","issn_l":"1683-1470","issn":["1683-1470"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320511","host_organization_name":"Ubiquity Press","host_organization_lineage":["https://openalex.org/P4310320511"],"host_organization_lineage_names":["Ubiquity Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Data Science Journal; Vol 17 (2018); 31","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.5334/dsj-2018-031","is_oa":true,"landing_page_url":"https://doi.org/10.5334/dsj-2018-031","pdf_url":null,"source":{"id":"https://openalex.org/S62969111","display_name":"Data Science Journal","issn_l":"1683-1470","issn":["1683-1470"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320511","host_organization_name":"Ubiquity Press","host_organization_lineage":["https://openalex.org/P4310320511"],"host_organization_lineage_names":["Ubiquity Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Data Science Journal","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W151752673","https://openalex.org/W1510952750","https://openalex.org/W1513656175","https://openalex.org/W1560201081","https://openalex.org/W1595357546","https://openalex.org/W1946622722","https://openalex.org/W1971991172","https://openalex.org/W2006453614","https://openalex.org/W2018746447","https://openalex.org/W2031533839","https://openalex.org/W2109426455","https://openalex.org/W2116025923","https://openalex.org/W2129548234","https://openalex.org/W2140585646","https://openalex.org/W2141389982","https://openalex.org/W2141420453","https://openalex.org/W2160502124","https://openalex.org/W2166106997","https://openalex.org/W2224585732","https://openalex.org/W2293339990","https://openalex.org/W2322704764","https://openalex.org/W2346967072","https://openalex.org/W2403789702","https://openalex.org/W2470666398","https://openalex.org/W2544267735","https://openalex.org/W2592573687","https://openalex.org/W2614081991","https://openalex.org/W2747433492","https://openalex.org/W2766831133","https://openalex.org/W2766917641","https://openalex.org/W2800679800","https://openalex.org/W2808845702","https://openalex.org/W2951395850","https://openalex.org/W3123665471","https://openalex.org/W3147894994"],"related_works":["https://openalex.org/W2358804928","https://openalex.org/W4225710828","https://openalex.org/W2794103424","https://openalex.org/W2083944649","https://openalex.org/W4309503015","https://openalex.org/W2596305496","https://openalex.org/W1548444773","https://openalex.org/W58529046","https://openalex.org/W2577220285","https://openalex.org/W2220417288"],"abstract_inverted_index":{"In":[0],"several":[1],"domains,":[2],"privacy":[3,36,96],"presents":[4],"a":[5,115,134,208,222],"significant":[6],"obstacle":[7],"to":[8,71,98,124,140,152,182,197,206],"scientific":[9],"and":[10,13,19,45,54,77,108,132,142,187,205,215,230],"analytic":[11],"research,":[12],"limits":[14],"the":[15,33,89,148,154,168,185,199],"economic,":[16],"social,":[17],"health":[18,188],"scholastic":[20],"benefits":[21],"that":[22,79,101,120,170,176,217],"could":[23,80],"be":[24,69,81,122,219],"derived":[25],"from":[26,32,88,105],"such":[27],"research.":[28],"These":[29],"concerns":[30],"stem":[31],"need":[34,149],"for":[35,150,211,225],"about":[37,62,74],"personally":[38],"identifiable":[39],"information":[40,61,73],"(PII),":[41],"commercial":[42],"intellectual":[43],"property,":[44],"other":[46,159],"types":[47],"of":[48,117,129,137,180,193,202],"information.":[49],"For":[50],"example,":[51],"businesses,":[52],"researchers,":[53],"policymakers":[55],"may":[56,67],"benefit":[57],"by":[58,83],"analyzing":[59],"aggregate":[60],"markets,":[63],"but":[64],"individual":[65],"companies":[66],"not":[68],"willing":[70],"reveal":[72],"risks,":[75],"strategies,":[76],"weaknesses":[78],"exploited":[82],"competitors.":[84],"Extracting":[85],"valuable":[86],"utility":[87],"new":[90,95,135],"\u201cbig":[91],"data\u201d":[92],"economy":[93],"demands":[94],"technologies":[97,119],"overcome":[99],"barriers":[100],"impede":[102],"sensitive":[103,144],"data":[104,145,156,183,231],"being":[106],"aggregated":[107],"analyzed.":[109],"Secure":[110],"multiparty":[111],"computation":[112],"(MPC)":[113],"is":[114],"collection":[116],"cryptographic":[118],"can":[121,218],"used":[123,220],"effectively":[125],"cope":[126],"with":[127,158,162],"some":[128],"these":[130,203],"obstacles,":[131],"provide":[133],"means":[136],"allowing":[138],"researchers":[139,160],"coordinate":[141],"analyze":[143],"collections,":[146],"obviating":[147],"data-owners":[151],"share":[153],"underlying":[155],"sets":[157],"or":[161],"each":[163],"other.":[164],"This":[165],"paper":[166],"outlines":[167],"findings":[169],"were":[171],"made":[172],"during":[173],"interdisciplinary":[174,226],"workshops":[175],"examined":[177],"potential":[178],"applications":[179],"MPC":[181],"in":[184],"social":[186],"sciences.":[189],"The":[190],"primary":[191],"goals":[192],"this":[194],"work":[195],"are":[196],"describe":[198],"computational":[200],"needs":[201],"disciplines":[204],"develop":[207],"specific":[209],"roadmap":[210],"selecting":[212],"efficient":[213],"algorithms":[214],"protocols":[216],"as":[221],"starting":[223],"point":[224],"projects":[227],"between":[228],"cryptographers":[229],"scientists.":[232]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
