{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1361418519360350464.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1145/1866739.1866758"}},{"identifier":{"@type":"URI","@value":"https://dl.acm.org/doi/10.1145/1866739.1866758"}},{"identifier":{"@type":"URI","@value":"https://dl.acm.org/doi/pdf/10.1145/1866739.1866758"}}],"dc:title":[{"@value":"A firm foundation for private data analysis"}],"description":[{"type":"abstract","notation":[{"@value":"<jats:p>What does it mean to preserve privacy?</jats:p>"}]}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1381418519360350464","@type":"Researcher","foaf:name":[{"@value":"Cynthia Dwork"}],"jpcoar:affiliationName":[{"@value":"Microsoft Research, Silicon Valley Campus, Mountain View, CA"}]}],"publication":{"publicationIdentifier":[{"@type":"PISSN","@value":"00010782"},{"@type":"EISSN","@value":"15577317"}],"prism:publicationName":[{"@value":"Communications of the ACM"}],"dc:publisher":[{"@value":"Association for Computing Machinery (ACM)"}],"prism:publicationDate":"2011-01","prism:volume":"54","prism:number":"1","prism:startingPage":"86","prism:endingPage":"95"},"reviewed":"false","dc:rights":["https://www.acm.org/publications/policies/copyright_policy#Background"],"url":[{"@id":"https://dl.acm.org/doi/10.1145/1866739.1866758"},{"@id":"https://dl.acm.org/doi/pdf/10.1145/1866739.1866758"}],"createdAt":"2010-12-22","modifiedAt":"2025-06-18","relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1360008373653342848","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"A firm foundation for statistical disclosure control"}]},{"@id":"https://cir.nii.ac.jp/crid/1360865815512086784","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Using Differential Privacy to Define Personal, Anonymous, and Pseudonymous Data"}]},{"@id":"https://cir.nii.ac.jp/crid/1390001204378532352","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Differentially Private Real-Time Data Publishing over Infinite Trajectory Streams"}]}],"dataSourceIdentifier":[{"@type":"CROSSREF","@value":"10.1145/1866739.1866758"},{"@type":"CROSSREF","@value":"10.1007/s42081-020-00086-9_references_DOI_EyLmOXIemckmi2BJUIin8yldAIg"},{"@type":"CROSSREF","@value":"10.1587/transinf.2015edp7096_references_DOI_EyLmOXIemckmi2BJUIin8yldAIg"},{"@type":"CROSSREF","@value":"10.1109/access.2023.3321578_references_DOI_EyLmOXIemckmi2BJUIin8yldAIg"}]}