{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T21:10:28Z","timestamp":1737580228450,"version":"3.33.0"},"publisher-location":"Boston, MA","reference-count":36,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387736549"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73655-6_1","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T06:41:46Z","timestamp":1195800106000},"page":"1-16","source":"Crossref","is-referenced-by-count":13,"title":["Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust"],"prefix":"10.1007","author":[{"given":"Danfeng","family":"Yao","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Tamassia","sequence":"additional","affiliation":[]},{"given":"Seth","family":"Proctor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"M. J. Atallah and W. Du. Secure multi-party computational geometry. In Proceedings of 7th International Workshop on Algorithms and Data Structures (WADS 2001), volume 2125 of Lecture Notes in Computer Science, pages 165\u2013179. Springer Verlag, August 2001.","DOI":"10.1007\/3-540-44634-6_16"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"M. J. Atallah, H. G. Elmongui, V. Deshpande, and L. B. Schwarz. Secure supply-chain protocols. In 2003 IEEE International Conference on Electronic Commerce (CEC 2003), pages 293\u2013302. IEEE Computer Society, 2003.","DOI":"10.1109\/COEC.2003.1210264"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"M. J. Atallah and J. Li. Secure outsourcing of sequence comparisons. In 4th Workshop on Privacy Enhancing Technologies (PET), volume 3424 of Lecture Notes in Computer Science, pages 63\u201378, 2004.","DOI":"10.1007\/11423409_5"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"T. Aura. Distributed access-rights management with delegation certificates. In Secure Internet Programming \u2014 Security Issues for Distributed and Mobile Objects, volume 1603 of LNCS, pages 211\u2013235. Springer, 1999.","DOI":"10.1007\/3-540-48749-2_9"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"M. Ben-Or and A. Wigderson. Completeness theorems for non-cryptographic faulttolerant distributed computation. In The Twentieth Annual ACM Symposium on Theory of Computing (STOC), pages 1\u201310. ACM Press, 1988.","DOI":"10.1145\/62212.62213"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"T. Beth, M. Borcherding, and B. Klein. Valuation of trust in open networks. In Proceedings of the Third European Symposium on Research in Computer Security (ESORICS\u2019 94), pages 3\u201318, November 1994.","DOI":"10.1007\/3-540-58618-0_53"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"B. Carbunar and R. Sion. Uncheatable reputation for distributed computation markets. In Financial Cryptography and Data Security Conference (FC\u2019 06), 2006.","DOI":"10.1007\/11889663_7"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"D. Chaum, C. Cr\u00e9peau, and I. Damgard. Multiparty unconditionally secure protocols. In The twentieth annual ACM Symposium on Theory of Computing (STOC), pages 11\u201319. ACM Press, 1988.","DOI":"10.1145\/62212.62214"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"I. Damg\u00e5rd and M. Jurik. A generalisation, a simplification and some applications of Paillier\u2019s probabilistic public-key system. In 4th International Workshop on Practice and Theory in Public Key Cryptosystems (PKC\u2019 01), LNCS 1992, pages 119\u2013136, 2001.","DOI":"10.1007\/3-540-44586-2_9"},{"key":"1_CR10","unstructured":"W. Du. A study of several specific secure two-party computation problems, 2001. PhD thesis, Purdue University, West Lafayette, Indiana."},{"key":"1_CR11","unstructured":"L. Eschenauer, V. D. Gligor, and J. Baras. On trust establishment in mobile ad-hoc networks. In Proceedings of the Security Protocols Workshop, April 2002."},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"K. B. Frikken and M. J. Atallah. Privacy preserving route planning. In Proceedings of the 2004 ACM workshop on Privacy in the Electronic Society (WPES), pages 8\u201315. ACM Press, 2004.","DOI":"10.1145\/1029179.1029182"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"B. Goethals, S. Laur, H. Lipmaa, and T. Mielik\u00e4inen. On private scalar product computation for privacy-preserving data mining. In C. Park and S. Chee, editors, ICISC, volume 3506 of Lecture Notes in Computer Science, pages 104\u2013120. Springer, 2004.","DOI":"10.1007\/11496618_9"},{"key":"1_CR14","unstructured":"O. Goldreich. Secure multi-party computation, Oct. 2002. Unpublished Manuscript."},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In The nineteenth annual ACM conference on theory of computing, pages 218\u2013229. ACM Press, 1987.","DOI":"10.1145\/28395.28420"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In ACM\/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys), 2003.","DOI":"10.1145\/1066116.1189037"},{"key":"1_CR17","unstructured":"M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald. Privacy-aware location sensor networks. In 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS IX), 2003."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk. Enhancing source-location privacy in sensor network routing. In Proceedings of 25th International Conference on Distributed Computing Systems (ICDCS), 2005.","DOI":"10.1109\/ICDCS.2005.31"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"R. Kohlas and U. M. Maurer. Confidence valuation in a public-key infrastructure based on uncertain evidence. In Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography (PKC\u2019 00), volume 1751 of Lecture Notes in Computer Science, pages 93\u2013112. Springer, 2000.","DOI":"10.1007\/978-3-540-46588-1_8"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"M. Langheinrich. A privacy awareness system for ubiquitous computing environments. In In 4th International Conference on Ubiquitous Computing, 2002.","DOI":"10.1007\/3-540-45809-3_19"},{"key":"1_CR21","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume":"1592","author":"P. Paillier","year":"1999","unstructured":"P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. Advances in Cryptology \u2014 EUROCRYPT 1999, LNCS 1592:223\u2013238, 1999.","journal-title":"Advances in Cryptology \u2014 EUROCRYPT 1999"},{"issue":"2","key":"1_CR22","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/772862.772865","volume":"4","author":"B. Pinkas","year":"2002","unstructured":"B. Pinkas. Cryptographic techniques for privacy-preserving data mining. KDD Explorations, 4(2): 12\u201319, 2002.","journal-title":"KDD Explorations"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"P. Ruth, D. Xu, B. K. Bhargava, and F. Regnier. E-notebook middleware for accountability and reputation based trust in distributed data sharing communities. In C. D. Jensen, S. Poslad, and T. Dimitrakos, editors, iTrust, volume 2995 of Lecture Notes in Computer Science, pages 161\u2013175. Springer, 2004.","DOI":"10.1007\/978-3-540-24747-0_13"},{"issue":"6","key":"1_CR24","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1023\/B:WINE.0000044030.65959.91","volume":"10","author":"B. Shand","year":"2004","unstructured":"B. Shand, N. Dimmock, and J. Bacon. Trust for ubiquitous, transparent collaboration. Wirel. Netw., 10(6):711\u2013721, 2004.","journal-title":"Wirel. Netw."},{"key":"1_CR25","unstructured":"Shibboleth, http:\/\/www.middleware.internet2.edu\/shibboleth\/ ."},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"E. Snekkenes. Concepts for personal location privacy policies. In In Proceedings of the 3rd ACM Conference on Electronic Commerce (CEC), pages 48\u201357. ACM Press, 2001.","DOI":"10.1145\/501158.501164"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"P. F. Syverson, D. M. Goldschlag, and M. G. Reed. Anonymous connections and onion routing. In Proceedings of the IEEE Symposium on Security and Privacy, pages 44\u201354, May 1997.","DOI":"10.1109\/SECPRI.1997.601314"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"R. Tamassia, D. Yao, and W. H. Winsborough. Role-based cascaded delegation. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT\u2019 04), pages 146\u2013155. ACM Press, June 2004.","DOI":"10.1145\/990036.990061"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"G. Theodorakopoulos and J. S. Baras. Trust evaluation in ad-hoc networks. In WiSe\u2019 04: Proceedings of the 2004 ACM workshop on Wireless security, pages 1\u201310. ACM Press, 2004.","DOI":"10.1145\/1023646.1023648"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"H. Tran, M. Hitchens, V. Varadharajan, and P. Watters. A trust based access control framework for P2P file-sharing systems. In Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS\u201905) \u2014 Track 9, page 302c. IEEE Computer Society, 2005.","DOI":"10.1109\/HICSS.2005.58"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"J. Vaidya and C. Clifton. Privacy preserving association rule mining in vertically partitioned data. In Proceedings of The 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 639\u2013644. ACM Press, July 2002.","DOI":"10.1145\/775047.775142"},{"issue":"1","key":"1_CR32","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/21.87068","volume":"18","author":"R. Yager","year":"1988","unstructured":"R. Yager. On ordered weighted averaging aggregation operators in multi-criteria decision making. IEEE Transactions on Systems, Man and Cybernetics, 18(1):183\u2013190, 1988.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"N. Yankelovich, W. Walker, P. Roberts, M. Wessler, J. Kaplan, and J. Provino. Meeting central: making distributed meetings more effective. In Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (CSCW\u2019 04), pages 419\u2013428, New York, NY, USA, 2004. ACM Press.","DOI":"10.1145\/1031607.1031678"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"A. C. Yao. How to generate and exchange secrets. In Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pages 162\u2013167. IEEE Computer Society Press, 1986.","DOI":"10.1109\/SFCS.1986.25"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"D. Yao, K. B. Frikken, M. J. Atallah, and R. Tamassia. Point-based trust: Define how much privacy is worth. In Proceedings of the Eighth International Conference on Information and Communications Security (ICICS\u2019 06), December 2006.","DOI":"10.1007\/11935308_14"},{"key":"1_CR36","unstructured":"D. Yao, R. Tamassia, and S. Proctor. On improving the performance of role-based cascaded delegation in ubiquitous computing. In Proceedings of IEEE\/CreateNet Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm\u2019 05), pages 157\u2013168. IEEE Press, September 2005."}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T20:38:59Z","timestamp":1737578339000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387736549"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_1","relation":{},"subject":[]}}