{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:33:07Z","timestamp":1767339187987,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030916305"},{"type":"electronic","value":"9783030916312"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-91631-2_13","type":"book-chapter","created":{"date-parts":[[2021,11,18]],"date-time":"2021-11-18T21:02:24Z","timestamp":1637269344000},"page":"232-250","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Establishing the Price of Privacy in Federated Data Trading"],"prefix":"10.1007","author":[{"given":"Kangsoo","family":"Jung","sequence":"first","affiliation":[]},{"given":"Sayan","family":"Biswas","sequence":"additional","affiliation":[]},{"given":"Catuscia","family":"Palamidessi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,19]]},"reference":[{"key":"13_CR1","unstructured":"Datacoup - reclaim your personal data. https:\/\/datacoup.com\/, Accessed 26 May 2021"},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.knosys.2014.11.011","volume":"74","author":"J Domingo-Ferrer","year":"2015","unstructured":"Domingo-Ferrer, J., Soria-Comas, J.: From t-closeness to differential privacy and vice versa in data anonymization. Knowl.-Based Syst. 74, 151\u2013158 (2015)","journal-title":"Knowl.-Based Syst."},{"issue":"3\u20134","key":"13_CR3","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"13_CR4","unstructured":"Elsalamouny, E., Palamidessi, C.: resconstruction of sensitive distributions under free-will privacy, draft paper"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Erlingsson, \u00da., Pihur, V., Korolova, A.: Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1054\u20131067 (2014)","DOI":"10.1145\/2660267.2660348"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Fleischer, L.K., Lyu, Y.H.: Approximately optimal auctions for selling privacy when costs are correlated with data. In: Proceedings of the 13th ACM Conference on Electronic Commerce, pp. 568\u2013585 (2012)","DOI":"10.1145\/2229012.2229054"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Ghosh, A., Roth, A.: Selling privacy at auction. In: Proceedings of the 12th ACM Conference on Electronic Commerce, pp. 199\u2013208 (2011)","DOI":"10.1145\/1993574.1993605"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"102498","DOI":"10.1016\/j.ijhcs.2020.102498","volume":"143","author":"J Hinds","year":"2020","unstructured":"Hinds, J., Williams, E.J., Joinson, A.N.: \u201cit wouldn\u2019t happen to me\u2019\u2019: privacy concerns and perspectives following the Cambridge analytica scandal. Int. J. Hum.-Comput. Stud. 143, 102498 (2020)","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"13_CR9","unstructured":"Holohan, N., Antonatos, S., Braghin, S., Mac Aonghusa, P.: ($$ k, \\epsilon $$)-anonymity: $$k$$ -anonymity with $$\\epsilon $$-differential privacy (2017). arXiv preprint arXiv:1710.01615"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Hsu, J., et al.: Differential privacy: an economic method for choosing epsilon. In: 2014 IEEE 27th Computer Security Foundations Symposium, pp. 398\u2013410. IEEE (2014)","DOI":"10.1109\/CSF.2014.35"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Jung, K., Park, S.: Privacy bargaining with fairness: privacy-price negotiation system for applying differential privacy in data market environments. In: 2019 IEEE International Conference on Big Data (Big Data), pp. 1389\u20131394. IEEE (2019)","DOI":"10.1109\/BigData47090.2019.9006101"},{"key":"13_CR12","unstructured":"Kairouz, P., Bonawitz, K., Ramage, D.: Discrete distribution estimation under local privacy. In: International Conference on Machine Learning, pp. 2436\u20132444. PMLR (2016)"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-24861-0_22","volume-title":"Information Security","author":"J Lee","year":"2011","unstructured":"Lee, J., Clifton, C.: How much is enough? choosing $$\\varepsilon $$ for differential privacy. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 325\u2013340. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24861-0_22"},{"issue":"4","key":"13_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2691190.2691191","volume":"39","author":"C Li","year":"2014","unstructured":"Li, C., Li, D.Y., Miklau, G., Suciu, D.: A theory of pricing private data. ACM Trans. Database Syst. (TODS) 39(4), 1\u201328 (2014)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"key":"13_CR15","unstructured":"Liveen - blockchain-based social network platform that provides fair rewards for the users\u2019 contents. https:\/\/www.liveen.com\/, Accessed 26 May 2021"},{"key":"13_CR16","unstructured":"Nget, R., Cao, Y., Yoshikawa, M.: How to balance privacy and money through pricing mechanism in personal data market (2017). arXiv preprint arXiv:1705.02982"},{"issue":"1","key":"13_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2325713.2325714","volume":"11","author":"A Roth","year":"2012","unstructured":"Roth, A.: Buying private data at auction: the sensitive surveyor\u2019s problem. ACM SIGecom Exchang. 11(1), 1\u20138 (2012)","journal-title":"ACM SIGecom Exchang."},{"key":"13_CR18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511528446","volume-title":"The Shapley Value: Essays in Honor of Lloyd S","author":"AE Roth","year":"1988","unstructured":"Roth, A.E.: The Shapley Value: Essays in Honor of Lloyd S. Cambridge University Press, Shapley (1988)"},{"key":"13_CR19","unstructured":"Tang, J., Korolova, A., Bai, X., Wang, X., Wang, X.: Privacy loss in Apple\u2019s implementation of differential privacy on MacOS 10.12 (2017). arXiv preprint arXiv:1709.02753"},{"key":"13_CR20","first-page":"2025","volume":"3","author":"E Winter","year":"2002","unstructured":"Winter, E.: The shapley value. Handb. Game Theory Econ. Appl 3, 2025\u20132054 (2002)","journal-title":"Handb. Game Theory Econ. Appl"},{"key":"13_CR21","unstructured":"Zhang, T., Zhu, Q.: On the differential private data market: endogenous evolution, dynamic pricing, and incentive compatibility (2021). arXiv preprint arXiv:2101.04357"}],"container-title":["Lecture Notes in Computer Science","Protocols, Strands, and Logic"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-91631-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,9]],"date-time":"2022-05-09T13:06:09Z","timestamp":1652101569000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-91631-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030916305","9783030916312"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-91631-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"19 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}