{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T20:10:09Z","timestamp":1751659809533,"version":"3.41.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319924076"},{"type":"electronic","value":"9783319924083"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92408-3_8","type":"book-chapter","created":{"date-parts":[[2018,5,26]],"date-time":"2018-05-26T17:08:42Z","timestamp":1527354522000},"page":"181-199","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Aggregation Policies for Tuple Spaces"],"prefix":"10.1007","author":[{"given":"Linas","family":"Kaminskas","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alberto","family":"Lluch Lafuente","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"issue":"9","key":"8_CR1","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MC.2015.261","volume":"48","author":"J Beal","year":"2015","unstructured":"Beal, J., Pianini, D., Viroli, M.: Aggregate programming for the Internet of Things. Computer 48(9), 22\u201330 (2015)","journal-title":"Computer"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Beal, J., Viroli, M.: Building blocks for aggregate programming of self-organising applications. In: Eighth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, SASOW 2014, London, United Kingdom, 8\u201312 September 2014, pp. 8\u201313. IEEE Computer Society (2014)","DOI":"10.1109\/SASOW.2014.6"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Bruns, G., Huth, M.: Access-control policies via Belnap logic: effective and efficient composition and analysis. In: Proceedings of CSF 2008: 21st IEEE Computer Security Foundations Symposium, pp. 163\u2013176 (2008)","DOI":"10.1109\/CSF.2008.10"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/978-3-319-74781-1_34","volume-title":"Software Engineering and Formal Methods","author":"R Casadei","year":"2018","unstructured":"Casadei, R., Aldini, A., Viroli, M.: Combining trust and aggregate computing. In: Cerone, A., Roveri, M. (eds.) SEFM 2017. LNCS, vol. 10729, pp. 507\u2013522. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-74781-1_34"},{"issue":"3","key":"8_CR5","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s41019-016-0015-z","volume":"1","author":"P Colombo","year":"2016","unstructured":"Colombo, P., Ferrari, E.: Fine-grained access control within NoSQL document-oriented datastores. Data Sci. Eng. 1(3), 127\u2013138 (2016)","journal-title":"Data Sci. Eng."},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-16310-9_1","volume-title":"Software Engineering for Collective Autonomic Systems","author":"R De Nicola","year":"2015","unstructured":"De Nicola, R., et al.: The SCEL language: design, implementation, verification. In: Wirsing, M., H\u00f6lzl, M., Koch, N., Mayer, P. (eds.) Software Engineering for Collective Autonomic Systems. LNCS, vol. 8998, pp. 3\u201371. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16310-9_1"},{"issue":"3\u20134","key":"8_CR7","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1561\/0400000042","volume":"9","author":"C Dwork","year":"2013","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013487 (2013)","journal-title":"Found. Trends Theor. Comput. Sci."},{"issue":"6","key":"8_CR8","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TKDE.2009.125","volume":"22","author":"Mehmet Ercan Nergiz","year":"2010","unstructured":"Ercan Nergiz, M., Clifton, C.: $$\\delta $$-presence without complete world knowledge. IEEE Trans. Knowl. Data Eng. 22 (2010). https:\/\/ieeexplore.ieee.org\/document\/4912209\/","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"1","key":"8_CR9","doi-asserted-by":"publisher","first-page":"19:1","DOI":"10.1186\/s13174-017-0070-3","volume":"8","author":"E Floriano","year":"2017","unstructured":"Floriano, E., Alchieri, E., Aranha, D.F., Solis, P.: Providing privacy on the tuple space model. J. Internet Serv. Appl. 8(1), 19:1\u201319:16 (2017)","journal-title":"J. Internet Serv. Appl."},{"issue":"1","key":"8_CR10","first-page":"703","volume":"14","author":"R Hall","year":"2013","unstructured":"Hall, R., Rinaldo, A., Wasserman, L.: Differential privacy for functions and functional data. J. Mach. Learn. Res. 14(1), 703\u2013727 (2013)","journal-title":"J. Mach. Learn. Res."},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Hankin, C., Nielson, F., Nielson, H.R.: Advice from Belnap policies. In: Computer Security Foundations Symposium, pp. 234\u2013247. IEEE (2009)","DOI":"10.1109\/CSF.2009.8"},{"issue":"1","key":"8_CR12","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/s10618-011-0235-9","volume":"25","author":"B Kenig","year":"2012","unstructured":"Kenig, B., Tassa, T.: A practical approximation algorithm for optimal k-anonymity. Data Min. Knowl. Disc. 25(1), 134\u2013168 (2012)","journal-title":"Data Min. Knowl. Disc."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: International Conference on Data Engineering (ICDE), pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Lluch-Lafuente, A., Loreti, M., Montanari, U.: Asynchronous distributed execution of fixpoint-based computational fields. Log. Methods Comput. Sci. 13(1) (2017)","DOI":"10.23638\/LMCS-13(1:13)2017"},{"key":"8_CR15","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity (2014)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Margheri, A., Pugliese, R., Tiezzi, F.: Linguistic abstractions for programming and policing autonomic computing systems. In: 2013 IEEE 10th International Conference on and 10th International Conference on Autonomic and Trusted Computing (UIC\/ATC) Ubiquitous Intelligence and Computing, pp. 404\u2013409 (2013)","DOI":"10.1109\/UIC-ATC.2013.33"},{"issue":"9","key":"8_CR17","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1810891.1810916","volume":"53","author":"F McSherry","year":"2010","unstructured":"McSherry, F.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. Commun. ACM 53(9), 89\u201397 (2010)","journal-title":"Commun. ACM"},{"key":"8_CR18","unstructured":"Mehta, A., Elnikety, E., Harvey, K., Garg, D., Druschel, P.: QAPLA: policy compliance for database-backed systems. In: 26th USENIX Security Symposium (USENIX Security 2017), Vancouver, BC, pp. 1463\u20131479. USENIX Association (2017)"},{"key":"8_CR19","unstructured":"Official Journal of the European Union. Regulation (EU) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC (general data protection regulation), L119, pp. 11\u201388, May 2016"},{"key":"8_CR20","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, Harvard Data Privacy Lab (1998)"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Soria-Comas, J., Domingo-Ferrer, J., S\u00e1nchez, D., Mart\u00ednez, S.: t-closeness through microaggregation: strict privacy with enhanced utility preservation. CoRR, abs\/1512.02909 (2015)","DOI":"10.1109\/ICDE.2016.7498376"},{"issue":"5","key":"8_CR22","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"8_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-662-43376-8_11","volume-title":"Coordination Models and Languages","author":"M Viroli","year":"2014","unstructured":"Viroli, M., Damiani, F.: A calculus of self-stabilising computational fields. In: K\u00fchn, E., Pugliese, R. (eds.) COORDINATION 2014. LNCS, vol. 8459, pp. 163\u2013178. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43376-8_11"}],"container-title":["Lecture Notes in Computer Science","Coordination Models and Languages"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92408-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T19:53:12Z","timestamp":1751658792000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-92408-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319924076","9783319924083"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92408-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"27 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COORDINATION","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Coordination Languages and Models","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"coordination2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2018.discotec.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}