%PDF-1.4 % 1 0 obj << /S /GoTo /D (section.1) >> endobj 4 0 obj (INTRODUCTION) endobj 5 0 obj << /S /GoTo /D (section.2) >> endobj 8 0 obj (CLOUD AND PRACTICAL SCENARIOS) endobj 9 0 obj << /S /GoTo /D (section.3) >> endobj 12 0 obj (FORMALIZING THE PRIVACY PROBLEM: MEASURING PRIVACY) endobj 13 0 obj << /S /GoTo /D (section.4) >> endobj 16 0 obj (GETTING PRACTICAL: PRIVACY TOOLS FROM SPED) endobj 17 0 obj << /S /GoTo /D (subsection.4.1) >> endobj 20 0 obj (Practical limitations of privacy tools) endobj 21 0 obj << /S /GoTo /D (section.5) >> endobj 24 0 obj (MAPPING COMPLEX TO REAL SOLUTIONS) endobj 25 0 obj << /S /GoTo /D (section.6) >> endobj 28 0 obj (OTHER APPROACHES AND FUTURE LINES) endobj 29 0 obj << /S /GoTo /D (section*.12) >> endobj 32 0 obj (References) endobj 33 0 obj << /S /GoTo /D [34 0 R /Fit ] >> endobj 38 0 obj << /Length 2615 /Filter /FlateDecode >> stream xɒ" KiUil@Iv D3 @㙯lp0Sjj/hq\D~/eYy vQn ^rHܶ ImaqGbfa㓪4OV ?XSǺ? G6G$,vn7rC% >Vg<0Q/m9)2ZY8f\3r~5mm:zcSŘ & pW睲8{www7GB 빪(?j <}"LPV=ߚjEqZm,_23r/&EF∓MXOLDuuBHrM ޡDUsQU[q:V{}<́gY{kΗgE긳S9(qeerQU3A-EPٙ75x+Ēdg6Ɩ(OɶAM:jQ3N7,rW Z`V-WG:3X0.:C[Z&0~ޏHєX^;"arןY0oċGYz}c t/FܑєU_f#KԨ!:'PI%h S>xpHv3ҳV/G5$J,gO!q0nrsD!a^է4xE>BsUfxti4U00`vy˓1:Aj y ػr':^;6G!.6Fפт8xd0ݩżb: Pr )\pm7سھ5rhbUc5;t jF1px3'1(K.jՌјڹo#hC+٬f5ū6JEyJ<ؕϔŊГA(`}դT|92+ч[ B$k3cs|Hep_6>^Io̹If#x((uói.91lbx}8\>9~p7qWsya.F> ŽlW {O!Ǥc>%+37&tU9;qEƂeQļΜ9QYAex-U>b3^PᣣFek4a7Gg.ּq@|@[(ŭiu\{&ģ]{wUG(0u摧Nr5OLίx^wjTk;UFR{$lH + =`)mX<30g{WK) ΰރn>j%ȑU ?٪`㙀,Sr})#)~(MJ%{+@+s Xչc~Q@do}R4dikGCɮVʲH =Y,jM!/9Uj9J4~r G꿡ç~8,S*pҫ :OW?$Oۯ5s%(XRZG(?֭ੁĐp>8]`gă$z,&i"ӜCvMn#РР[o5蒍A;&9!N%q蒇X4["EAϙ+ҕԯ)&rV4:0ratiu:\atS:ćag,3D.-}k.)MB4V)&TJĕsg8XN=9[R}#:oOB\B*,2ByUa2`yUX YdJƮ*O/!ޝ/ByN2N҂c5rbqVm HiT{dˍႪKAqIs#{5AlOܱ?D yg CuGu-8"RVUnQZ?aD2j&1* ō|AδQ dU