{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:49:57Z","timestamp":1742914197370,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":46,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494966"},{"type":"electronic","value":"9783540494973"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_14","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T11:26:42Z","timestamp":1163590002000},"page":"190-209","source":"Crossref","is-referenced-by-count":14,"title":["Point-Based Trust: Define How Much Privacy Is Worth"],"prefix":"10.1007","author":[{"given":"Danfeng","family":"Yao","sequence":"first","affiliation":[]},{"given":"Keith B.","family":"Frikken","sequence":"additional","affiliation":[]},{"given":"Mikhail J.","family":"Atallah","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Tamassia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/3-540-44634-6_16","volume-title":"Algorithms and Data Structures","author":"M.J. Atallah","year":"2001","unstructured":"Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol.\u00a02125, pp. 165\u2013179. Springer, Heidelberg (2001)"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/11423409_5","volume-title":"Privacy Enhancing Technologies","author":"M.J. Atallah","year":"2005","unstructured":"Atallah, M.J., Li, J.: Secure outsourcing of sequence comparisons. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol.\u00a03424, pp. 63\u201378. Springer, Heidelberg (2005)"},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/62212.62213","volume-title":"The Twentieth Annual ACM Symposium on Theory of Computing (STOC)","author":"M. Ben-Or","year":"1988","unstructured":"Ben-Or, M., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: The Twentieth Annual ACM Symposium on Theory of Computing (STOC), pp. 1\u201310. ACM Press, New York (1988)"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","first-page":"3","volume-title":"Computer Security - ESORICS 94","author":"T. Beth","year":"1994","unstructured":"Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol.\u00a0875, pp. 3\u201318. Springer, Heidelberg (1994)"},{"issue":"3","key":"14_CR5","doi-asserted-by":"crossref","first-page":"241","DOI":"10.3233\/JCS-2002-10303","volume":"10","author":"P.A. Bonatti","year":"2002","unstructured":"Bonatti, P.A., Samarati, P.: A uniform framework for regulating service access and information release on the web. Journal of Computer Security\u00a010(3), 241\u2013272 (2002)","journal-title":"Journal of Computer Security"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Bradshaw, R., Holt, J., Seamons, K.: Concealing complex policies with hidden credentials. In: Proceedings of 11th ACM Conference on Computer and Communications Security (CCS) (October 2004)","DOI":"10.1145\/1030083.1030104"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS), pp. 21\u201330 (2002)","DOI":"10.1145\/586110.586114"},{"issue":"1","key":"14_CR9","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s001459910006","volume":"13","author":"R. Canetti","year":"2000","unstructured":"Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology\u00a013(1), 143\u2013202 (2000)","journal-title":"Journal of Cryptology"},{"issue":"10","key":"14_CR10","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Communications of the ACM\u00a028(10), 1030\u20131044 (1985)","journal-title":"Communications of the ACM"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/62212.62214","volume-title":"The twentieth annual ACM Symposium on Theory of Computing (STOC)","author":"D. Chaum","year":"1988","unstructured":"Chaum, D., Cr\u00e9peau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: The twentieth annual ACM Symposium on Theory of Computing (STOC), pp. 11\u201319. ACM Press, New York (1988)"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","first-page":"118","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"D. Chaum","year":"1987","unstructured":"Chaum, D., Evertse, J.-H.: A secure and privacy-protecting protocol for transmitting personal information between organizations. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 118\u2013167. Springer, Heidelberg (1987)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Chen, W., Clarke, L., Kurose, J., Towsley, D.: Optimizing cost-sensitive trust-negotiation protocols. In: Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), vol.\u00a02, pp. 1431\u20131442 (2005)","DOI":"10.1109\/INFCOM.2005.1498369"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"Cryptography and Coding","author":"C. Cocks","year":"2001","unstructured":"Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol.\u00a02260, pp. 360\u2013363. Springer, Heidelberg (2001)"},{"key":"14_CR15","volume-title":"Introduction to algorithms","author":"T.H. Cormen","year":"2001","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to algorithms. MIT Press, Cambridge (2001)"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/3-540-44586-2_9","volume-title":"Public Key Cryptography","author":"I. Damg\u00e5rd","year":"2001","unstructured":"Damg\u00e5rd, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier\u2019s probabilistic public-key system. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol.\u00a01992, pp. 119\u2013136. Springer, Heidelberg (2001)"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P., Violante, F.: A reputation-based approach for choosing reliable resources in peer-to-peer networks. In: ACM Conference on Computer and Communications Security (CCS 2002), pp. 207\u2013216 (2002)","DOI":"10.1145\/586135.586138"},{"key":"14_CR18","unstructured":"Du., W.: A study of several specific secure two-party computation problems, PhD thesis, Purdue University, West Lafayette, Indiana (2001)"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-24676-3_1","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M. Freedman","year":"2004","unstructured":"Freedman, M., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 1\u201319. Springer, Heidelberg (2004)"},{"key":"14_CR20","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/1029179.1029182","volume-title":"Proceedings of the 2004 ACM workshop on Privacy in the Electronic Society (WPES)","author":"K.B. Frikken","year":"2004","unstructured":"Frikken, K.B., Atallah, M.J.: Privacy preserving route planning. In: Proceedings of the 2004 ACM workshop on Privacy in the Electronic Society (WPES), pp. 8\u201315. ACM Press, New York (2004)"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Frikken, K.B., Atallah, M.J., Li, J.: Hidden access control policies with hidden credentials. In: Proceedings of the 3nd ACM Workshop on Privacy in the Electronic Society (WPES) (October 2004)","DOI":"10.1145\/1029179.1029186"},{"key":"14_CR22","unstructured":"Frikken, K.B., Li, J., Atallah, M.J.: Trust negotiation with hidden credentials, hidden policies, and policy cycles. In: Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS) (2006)"},{"key":"14_CR23","unstructured":"Goldreich, O.: Secure multi-party computation (October 2002) (unpublished manuscript)"},{"key":"14_CR24","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656","volume-title":"The Foundations of Cryptography","author":"O. Goldreich","year":"2004","unstructured":"Goldreich, O.: The Foundations of Cryptography, vol.\u00a02. Cambridge University Press, Cambridge (2004)"},{"key":"14_CR25","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1145\/28395.28420","volume-title":"The nineteenth annual ACM conference on theory of computing","author":"O. Goldreich","year":"1987","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: The nineteenth annual ACM conference on theory of computing, pp. 218\u2013229. ACM Press, New York (1987)"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing (STOC), pp. 291\u2013304 (1985)","DOI":"10.1145\/22145.22178"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: ACM\/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys) (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Holt, J.E., Bradshaw, R.W., Seamons, K.E., Orman, H.: Hidden credentials. In: Proceedings of the 2nd ACM Workshop on Privacy in the Electronic Society (WPES) (October 2003)","DOI":"10.1145\/1005140.1005142"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Huang, Q., Jao, D., Wang, H.J.: Applications of secure electronic voting to automated privacy-preserving troubleshooting. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS) (November 2005)","DOI":"10.1145\/1102120.1102132"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Jagannathan, G., Wright, R.N.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: Proceeding of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 593\u2013599 (2005)","DOI":"10.1145\/1081870.1081942"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Kissner, L., Song, D.: Private and threshold set-intersection. In: CRYPTO 2005 (2005)","DOI":"10.21236\/ADA461119"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Li, J., Li, N., Winsborough, W.H.: Automated trust negotiation using cryptographic credentials. In: Proceedings of 12th ACM Conference on Computer and Communications Security (CCS), pp. 46\u201357 (2005)","DOI":"10.1145\/1102120.1102129"},{"key":"14_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-540-40061-5_27","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"H. Lipmaa","year":"2003","unstructured":"Lipmaa, H.: Verifiable homomorphic oblivious transfer and private equality test. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 416\u2013433. Springer, Heidelberg (2003)"},{"key":"14_CR34","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"14_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"14_CR36","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1109\/HICSS.2005.58","volume-title":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS 2005) - Track 9","author":"H. Tran","year":"2005","unstructured":"Tran, H., Hitchens, M., Varadharajan, V., Watters, P.: A trust based access control framework for P2P file-sharing systems. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS 2005) - Track 9, p. 302. IEEE Computer Society, Los Alamitos (2005)"},{"key":"14_CR37","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"W.H. Winsborough","year":"2004","unstructured":"Winsborough, W.H., Li, N.: Safety in automated trust negotiation. In: Proceedings of IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"14_CR38","first-page":"88","volume-title":"DARPA Information Survivability Conference and Exposition","author":"W.H. Winsborough","year":"2000","unstructured":"Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition, vol.\u00a0I, pp. 88\u2013102. IEEE Press, Los Alamitos (2000)"},{"key":"14_CR39","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1145\/1031607.1031678","volume-title":"Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (CSCW 2004)","author":"N. Yankelovich","year":"2004","unstructured":"Yankelovich, N., Walker, W., Roberts, P., Wessler, M., Kaplan, J., Provino, J.: Meeting central: making distributed meetings more effective. In: Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (CSCW 2004), pp. 419\u2013428. ACM Press, New York (2004)"},{"key":"14_CR40","first-page":"162","volume-title":"Proceedings of the 27th IEEE Symposium on Foundations of Computer Science","author":"A.C. Yao","year":"1986","unstructured":"Yao, A.C.: How to generate and exchange secrets. In: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pp. 162\u2013167. IEEE Computer Society Press, Los Alamitos (1986)"},{"key":"14_CR41","unstructured":"Yao, D., Frikken, K.B., Atallah, M.J., Tamassia, R.: Flexible, secure and private point-based trust management, Technical Report. Brown University (November 2005)"},{"key":"14_CR42","unstructured":"Yao, D., Tamassia, R., Proctor, S.: Privacy-preserving computation of trust with application to fuzzy location queries, Brown University Technical Report (March 2006)"},{"key":"14_CR43","doi-asserted-by":"crossref","unstructured":"Yu, T., Ma, X., Winslett, M.: PRUNES: An efficient and complete strategy for automated trust negotiation over the internet. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2000, pp. 210\u2013219 (2000)","DOI":"10.1145\/352600.352633"},{"key":"14_CR44","first-page":"110","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"T. Yu","year":"2003","unstructured":"Yu, T., Winslett, M.: A unified scheme for resource protection in automated trust negotiation. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 110\u2013122. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"14_CR45","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1145\/501983.502004","volume-title":"Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001)","author":"T. Yu","year":"2001","unstructured":"Yu, T., Winslett, M., Seamons, K.E.: Interoperable strategies in automated trust negotiation. In: Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001), pp. 146\u2013155. ACM Press, New York (2001)"},{"key":"14_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1102219.1102222","volume-title":"Proceedings of the Third ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN)","author":"C. Zouridaki","year":"2005","unstructured":"Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Atluri, V., Ning, P., Du, W. (eds.) Proceedings of the Third ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp. 1\u201310. ACM, New York (2005)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T23:14:38Z","timestamp":1736637278000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/11935308_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}