{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T08:40:19Z","timestamp":1739436019996,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642048197"},{"type":"electronic","value":"9783642048203"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04820-3_9","type":"book-chapter","created":{"date-parts":[[2009,11,17]],"date-time":"2009-11-17T11:48:07Z","timestamp":1258458487000},"page":"92-101","source":"Crossref","is-referenced-by-count":3,"title":["The Functionality-Security-Privacy Game"],"prefix":"10.1007","author":[{"given":"Josep","family":"Domingo-Ferrer","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy preserving data mining. In: Proceedings of the ACM SIGMOD, pp. 439\u2013450 (2000)","DOI":"10.1145\/335191.335438"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Barnes, S.B.: A privacy paradox: social networking in the United States. First Monday\u00a011(9) (2006)","DOI":"10.5210\/fm.v11i9.1394"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Blau, J.: Car talk. IEEE Spectrum\u00a045(10), 16","DOI":"10.1109\/MSPEC.2008.4635041"},{"key":"9_CR4","volume-title":"Private Data Management PDM 2007","author":"B. Carminati","year":"2007","unstructured":"Carminati, B., Ferrari, E.: Private relationships in social networks. In: Private Data Management PDM 2007. IEEE Press, Los Alamitos (2007)"},{"key":"9_CR5","unstructured":"Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: IEEE Symposium on Foundations of Computer Science (FOCS), pp. 41\u201350 (1995)"},{"issue":"4","key":"9_CR6","doi-asserted-by":"publisher","first-page":"1876","DOI":"10.1109\/TVT.2008.2002581","volume":"58","author":"V. Daza","year":"2009","unstructured":"Daza, V., Domingo-Ferrer, J., Seb\u00e9, F., Viejo, A.: Trustworthy privacy-preserving car-generated announcements in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology\u00a058(4), 1876\u20131886 (2009)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Rabin, T.: Cryptography and game theory. In: [19], pp. 181\u2013205","DOI":"10.1017\/CBO9780511800481.010"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-540-75248-6_14","volume-title":"Secure Data Management","author":"J. Domingo-Ferrer","year":"2007","unstructured":"Domingo-Ferrer, J.: A three-dimensional conceptual framework for database privacy. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2007. LNCS, vol.\u00a04721, pp. 193\u2013202. Springer, Heidelberg (2007)"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"3007","DOI":"10.1016\/j.comnet.2008.06.017","volume":"52","author":"J. Domingo-Ferrer","year":"2008","unstructured":"Domingo-Ferrer, J., Viejo, A., Seb\u00e9, F., Gonz\u00e1lez-Nicol\u00e1s, \u00da.: Privacy homomorphisms for social networks with private relationships. Computer Networks\u00a052, 3007\u20133016 (2008)","journal-title":"Computer Networks"},{"key":"9_CR10","series-title":"Advances in Database Systems","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-0-387-70992-5_3","volume-title":"Privacy-Preserving Data Mining: Models and Algorithms","author":"J. Domingo-Ferrer","year":"2008","unstructured":"Domingo-Ferrer, J.: A survey of inference control methods for privacy-preserving data mining. In: Aggarwal, C., Yu, P. (eds.) Privacy-Preserving Data Mining: Models and Algorithms. Advances in Database Systems, vol.\u00a034, pp. 53\u201380. Springer, Heidelberg (2008)"},{"issue":"4","key":"9_CR11","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1108\/14684520910985693","volume":"33","author":"J. Domingo-Ferrer","year":"2009","unstructured":"Domingo-Ferrer, J., Solanas, A., Castell\u00e0-Roca, J.: h(k)-Private information retrieval from privacy-uncooperative queryable databases. Online Information Review\u00a033(4), 720\u2013744 (2009)","journal-title":"Online Information Review"},{"key":"9_CR12","unstructured":"Domingo-Ferrer, J., Bras-Amor\u00f3s, M., Wu, Q., Manj\u00f3n, J.: User-private information retrieval based on a peer-to-peer community. Data and Knowledge Engineering (in press, available online doi:10.1016\/j.datak.2009.06.004)"},{"key":"9_CR13","first-page":"409","volume-title":"Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society","author":"D.C. Howe","year":"2009","unstructured":"Howe, D.C., Nissenbaum, H.: TrackMeNot: Resisting surveillance in web search. In: Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society, pp. 409\u2013428. Oxford University Press, Oxford (2009)"},{"key":"9_CR14","unstructured":"Hundepool, A., Domingo-Ferrer, J., Franconi, L., Giessing, S., Lenz, R., Longhurst, J., Schulte-Nordholt, E., Seri, G., DeWolf, P.-P.: Handbook on Statistical Disclosure Control (version 1.0), Eurostat (CENEX SDC Project Deliverable) (2006)"},{"key":"9_CR15","unstructured":"Hutt, R., Omand, D.: Anti-terror fight will need privacy sacrifice. In: The Independent, February 25 (2009)"},{"issue":"6","key":"9_CR16","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X. Lin","year":"2007","unstructured":"Lin, X., Sun, X., Ho, P.H., Shen, X.: GSIS: A secure and privacy preserving protocol for vehicular communications. IEEE Transactions on Vehicular Communications\u00a056(6), 3442\u20133456 (2007)","journal-title":"IEEE Transactions on Vehicular Communications"},{"issue":"3","key":"9_CR17","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s00145-001-0019-2","volume":"15","author":"Y. Lindell","year":"2002","unstructured":"Lindell, Y., Pinkas, B.: Privacy-preserving data mining. Journal of Cryptology\u00a015(3), 177\u2013206 (2002)","journal-title":"Journal of Cryptology"},{"key":"9_CR18","unstructured":"Mackey, E.: A Framework for Understanding Statistical Disclosure Processes, Ph. D. Thesis, University of Manchester (2009)"},{"key":"9_CR19","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511800481","volume-title":"Algorithmic Game Theory","author":"N. Nisan","year":"2007","unstructured":"Nisan, N., Roughgarden, T., Tardos, \u00c9., Vazirani, V.V.: Algorithmic Game Theory. Cambridge University Press, Cambridge (2007)"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Raya, M., Aziz, A., Hubaux, J.-P.: Efficient secure aggregation in VANETs. In: Proc. of 3rd Intl. Workshop on Vehicular Ad Hoc Networks-VANET, pp. 67\u201375.","DOI":"10.1145\/1161064.1161076"},{"key":"9_CR21","volume-title":"Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations","author":"Y. Shoham","year":"2009","unstructured":"Shoham, Y., Leyton-Brown, K.: Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations. Cambridge University Press, Cambridge (2009)"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Tardos, \u00c9., Vazirani, V.V.: Basic solution concepts and computational issues. In: [19], pp. 3\u201328","DOI":"10.1017\/CBO9780511800481.003"},{"key":"9_CR23","volume-title":"Theory of Games and Economic Behavior","author":"J. Neumann Von","year":"1944","unstructured":"Von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behavior. Princeton University Press, Princeton (1944)"},{"key":"9_CR24","unstructured":"The Wall Street Journal, 34 (December 1, 2005)"},{"key":"9_CR25","unstructured":"Wu, Q., Domingo-Ferrer, J., Gonz\u00e1lez-Nicol\u00e1s, \u00da.: Balanced trustworthiness, safety and privacy in vehicle-to-vehicle communications (manuscript, 2009)"}],"container-title":["Lecture Notes in Computer Science","Modeling Decisions for Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04820-3_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T08:22:43Z","timestamp":1739434963000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04820-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642048197","9783642048203"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04820-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}