{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:22:23Z","timestamp":1743031343337,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031781155"},{"type":"electronic","value":"9783031781162"}],"license":[{"start":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T00:00:00Z","timestamp":1732838400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T00:00:00Z","timestamp":1732838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78116-2_11","type":"book-chapter","created":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T09:03:24Z","timestamp":1732784604000},"page":"171-193","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Formal Privacy Analyses for\u00a0Open Banking"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9579-8427","authenticated-orcid":false,"given":"Luigi D.","family":"C. Soares","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4196-7467","authenticated-orcid":false,"given":"M\u00e1rio S.","family":"Alvim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8714-6808","authenticated-orcid":false,"given":"Di","family":"Bu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9212-7839","authenticated-orcid":false,"given":"Natasha","family":"Fernandes","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5343-0579","authenticated-orcid":false,"given":"Yin","family":"Liao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,11,29]]},"reference":[{"issue":"4","key":"11_CR1","doi-asserted-by":"publisher","first-page":"427","DOI":"10.3233\/JCS-150528","volume":"23","author":"MS Alvim","year":"2015","unstructured":"Alvim, M.S., Andr\u00e9s, M.E., Chatzikokolakis, K., Degano, P., Palamidessi, C.: On the information leakage of differentially-private mechanisms. J. Comput. Secur. 23(4), 427\u2013469 (2015). https:\/\/doi.org\/10.3233\/JCS-150528","journal-title":"J. Comput. Secur."},{"key":"11_CR2","doi-asserted-by":"publisher","unstructured":"Alvim, M.S., Chatzikokolakis, K., McIver, A., Morgan, C., Palamidessi, C., Smith, G.: Additive and multiplicative notions of leakage, and their capacities. In: Proceedings of CSF, pp. 308\u2013322. IEEE (2014). https:\/\/doi.org\/10.1109\/CSF.2014.29","DOI":"10.1109\/CSF.2014.29"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Alvim, M.S., Chatzikokolakis, K., McIver, A., Morgan, C., Palamidessi, C., Smith, G.: The Science of Quantitative Information Flow. Springer (2020)","DOI":"10.1007\/978-3-319-96131-6"},{"key":"11_CR4","doi-asserted-by":"publisher","unstructured":"Alvim, M.S., Fernandes, N., McIver, A., Morgan, C., Nunes, G.H.: Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata. Proc. Priv. Enhancing Technol. 2022(4), 378\u2013399 (2022). https:\/\/doi.org\/10.56553\/popets-2022-0114","DOI":"10.56553\/popets-2022-0114"},{"key":"11_CR5","doi-asserted-by":"publisher","unstructured":"Alvim, M.S., Fernandes, N., McIver, A., Morgan, C., Nunes, G.H.: A novel analysis of utility in privacy pipelines, using Kronecker products and quantitative information flow. In: Proceedings of the SIGSAC (2023). https:\/\/doi.org\/10.1145\/3576915.362308","DOI":"10.1145\/3576915.362308"},{"key":"11_CR6","doi-asserted-by":"publisher","unstructured":"Alvim, M.S., Fernandes, N., Nogueira, B.D., Palamidessi, C., Silva, T.V.A.: On the duality of privacy and fairness (extended abstract). In: Proceedings of the CADE (2023). https:\/\/doi.org\/10.1049\/icp.2023.2563","DOI":"10.1049\/icp.2023.2563"},{"issue":"1","key":"11_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.5465\/ame.1998.254980","volume":"12","author":"O Behling","year":"1998","unstructured":"Behling, O.: Employee selection: will intelligence and conscientiousness do the job? Acad. Manag. Perspect. 12(1), 77\u201386 (1998)","journal-title":"Acad. Manag. Perspect."},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.entcs.2009.07.085","volume":"249","author":"C Braun","year":"2009","unstructured":"Braun, C., Chatzikokolakis, K., Palamidessi, C.: Quantitative notions of leakage for one-try attacks. Electron. Notes Theor. Comput. Sci. 249, 75\u201391 (2009)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"issue":"4","key":"11_CR9","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1504\/IJBE.2019.101645","volume":"10","author":"NT Butz","year":"2019","unstructured":"Butz, N.T., Stratton, R., Trzebiatowski, M.E., Hillery, T.P.: Inside the hiring process: how managers assess employability based on grit, the big five, and other factors. Int. J. Bus. Environ. 10(4), 306\u2013328 (2019)","journal-title":"Int. J. Bus. Environ."},{"key":"11_CR10","doi-asserted-by":"publisher","unstructured":"Chatzikokolakis, K., Fernandes, N., Palamidessi, C.: Comparing systems: max-case refinement orders and application to differential privacy. In: Proceedings of the CSF (2019). https:\/\/doi.org\/10.1109\/CSF.2019.00037","DOI":"10.1109\/CSF.2019.00037"},{"issue":"3","key":"11_CR11","first-page":"329","volume":"2","author":"T Dalenius","year":"1986","unstructured":"Dalenius, T.: Finding a needle in a haystack or identifying anonymous census records. J. Official Stat. 2(3), 329 (1986)","journal-title":"J. Official Stat."},{"issue":"1","key":"11_CR12","doi-asserted-by":"publisher","first-page":"3330","DOI":"10.1038\/s41467-018-05690-8","volume":"9","author":"R Di Clemente","year":"2018","unstructured":"Di Clemente, R., Luengo-Oroz, M., Travizano, M., Xu, S., Vaitla, B., Gonz\u00e1lez, M.C.: Sequences of purchases in credit card data reveal lifestyles in urban populations. Nat. Commun. 9(1), 3330 (2018)","journal-title":"Nat. Commun."},{"key":"11_CR13","doi-asserted-by":"publisher","unstructured":"Fernandes, N., Dras, M., McIver, A.: Processing text for privacy: an information flow perspective. In: Proceedings of the FM (2018). https:\/\/doi.org\/10.1007\/978-3-319-95582-7_1","DOI":"10.1007\/978-3-319-95582-7_1"},{"key":"11_CR14","unstructured":"Freebairn, P.: Response to the farrell report into open banking. Policy (2018)"},{"issue":"7","key":"11_CR15","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.1177\/0956797619849435","volume":"30","author":"JJ Gladstone","year":"2019","unstructured":"Gladstone, J.J., Matz, S.C., Lemaire, A.: Can psychological traits be inferred from spending? evidence from transaction data. Psychol. Sci. 30(7), 1087\u20131096 (2019). https:\/\/doi.org\/10.1177\/0956797619849435. pMID: 31166847","journal-title":"Psychol. Sci."},{"issue":"4","key":"11_CR16","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1037\/0021-9010.87.4.797","volume":"87","author":"TA Judge","year":"2002","unstructured":"Judge, T.A., Ilies, R.: Relationship of personality to performance motivation: a meta-analytic review. J. Appl. Psychol. 87(4), 797 (2002)","journal-title":"J. Appl. Psychol."},{"key":"11_CR17","doi-asserted-by":"publisher","unstructured":"Jurado, M., Palamidessi, C., Smith, G.: A formal information-theoretic leakage analysis of order-revealing encryption. In: Proceedings of the CSF (2021). https:\/\/doi.org\/10.1109\/CSF51468.2021.00046","DOI":"10.1109\/CSF51468.2021.00046"},{"issue":"6221","key":"11_CR18","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1126\/science.1256297","volume":"347","author":"YA de Montjoye","year":"2015","unstructured":"de Montjoye, Y.A., Radaelli, L., Singh, V.K., Pentland, A.S.: Unique in the shopping mall: on the reidentifiability of credit card metadata. Science 347(6221), 536\u2013539 (2015). https:\/\/doi.org\/10.1126\/science.1256297","journal-title":"Science"},{"issue":"5\u20136","key":"11_CR19","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1108\/00483480410550134","volume":"33","author":"J Moy","year":"2004","unstructured":"Moy, J., Lam, K.: Selection criteria and the impact of personality on getting hired. Pers. Rev. 33(5\u20136), 521\u2013535 (2004). https:\/\/doi.org\/10.1108\/00483480410550134","journal-title":"Pers. Rev."},{"key":"11_CR20","doi-asserted-by":"publisher","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the of S &P, pp. 111\u2013125 (2008). https:\/\/doi.org\/10.1109\/SP.2008.33","DOI":"10.1109\/SP.2008.33"},{"key":"11_CR21","unstructured":"R\u00e9nyi, A.: On measures of entropy and information. In: Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Contributions to the Theory of Statistics, vol.\u00a04, pp. 547\u2013562. University of California Press (1961)"},{"key":"11_CR22","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression (1998)"},{"key":"11_CR23","doi-asserted-by":"publisher","unstructured":"Silva, R.M., Gomes, G.C.M., Alvim, M.S., Gon\u00e7alves, M.A.: How to build high quality L2R training data: unsupervised compression-based selective sampling for learning to rank. Inf. Sci. 601, 90\u2013113 (2022). https:\/\/doi.org\/10.1016\/j.ins.2022.04.012","DOI":"10.1016\/j.ins.2022.04.012"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Smith, G.: On the foundations of quantitative information flow. In: FOSSACS. LNCS, vol.\u00a05504. Springer (2009)","DOI":"10.1007\/978-3-642-00596-1_21"},{"issue":"2000","key":"11_CR25","first-page":"1","volume":"671","author":"L Sweeney","year":"2000","unstructured":"Sweeney, L.: Simple demographics often identify people uniquely. Health (San Francisco) 671(2000), 1\u201334 (2000)","journal-title":"Health (San Francisco)"},{"key":"11_CR26","doi-asserted-by":"publisher","unstructured":"Tovanich, N., Centellegher, S., Bennacer Seghouani, N., Gladstone, J., Matz, S., Lepri, B.: Inferring psychological traits from spending categories and dynamic consumption patterns. EPJ Data Sci. 10(1), 24 (2021). https:\/\/doi.org\/10.1140\/epjds\/s13688-021-00281-y, https:\/\/epjdatascience.springeropen.com\/articles\/10.1140\/epjds\/s13688-021-00281-y","DOI":"10.1140\/epjds\/s13688-021-00281-y"},{"key":"11_CR27","doi-asserted-by":"publisher","unstructured":"Viegas, F., Alvim, M.S., Canuto, S.D., Rosa, T., Gon\u00e7alves, M.A., Rocha, L.: Exploiting semantic relationships for unsupervised expansion of sentiment lexicons. Inf. Syst. 94, 101606 (2020). https:\/\/doi.org\/10.1016\/j.is.2020.101606","DOI":"10.1016\/j.is.2020.101606"}],"container-title":["Lecture Notes in Computer Science","Formal Methods: Foundations and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78116-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T09:04:49Z","timestamp":1732784689000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78116-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,29]]},"ISBN":["9783031781155","9783031781162"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78116-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,29]]},"assertion":[{"value":"29 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SBMF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazilian Symposium on Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vit\u00f3ria","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazil","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sbmf2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}