{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:35:33Z","timestamp":1743042933077,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642238215"},{"type":"electronic","value":"9783642238222"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23822-2_26","type":"book-chapter","created":{"date-parts":[[2011,9,7]],"date-time":"2011-09-07T14:38:34Z","timestamp":1315406314000},"page":"472-488","source":"Crossref","is-referenced-by-count":10,"title":["Towards a Mechanism for Incentivating Privacy"],"prefix":"10.1007","author":[{"given":"Piero A.","family":"Bonatti","sequence":"first","affiliation":[]},{"given":"Marco","family":"Faella","sequence":"additional","affiliation":[]},{"given":"Clemente","family":"Galdi","sequence":"additional","affiliation":[]},{"given":"Luigi","family":"Sauro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"26_CR1","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1109\/JSAC.2008.080916","volume":"26","author":"J. Bae","year":"2008","unstructured":"Bae, J., Beigman, E., Berry, R.A., Honig, M.L., Vohra, R.V.: Sequential bandwidth and power auctions for distributed spectrum sharing. IEEE Journal on Selected Areas in Communications\u00a026(7), 1193\u20131203 (2008)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"26_CR2","first-page":"39","volume-title":"IEEE POLICY 2007","author":"S. Baselice","year":"2007","unstructured":"Baselice, S., Bonatti, P., Faella, M.: On interoperable trust negotiation strategies. In: IEEE POLICY 2007, pp. 39\u201350. IEEE Computer Society, Los Alamitos (2007)"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/11889663_10","volume-title":"Financial Cryptography and Data Security","author":"P. Bogetoft","year":"2006","unstructured":"Bogetoft, P., Damg\u00e5rd, I., Jakobsen, T.P., Nielsen, K., Pagter, J., Toft, T.: A practical implementation of secure auctions based on multiparty integer computation. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol.\u00a04107, pp. 142\u2013147. Springer, Heidelberg (2006)"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1145\/1060745.1060823","volume-title":"Proc. of the 14th Int. Conf. on World Wide Web, WWW 2005","author":"P.A. Bonatti","year":"2005","unstructured":"Bonatti, P.A., Festa, P.: On optimal service selection. In: Ellis, A., Hagino, T. (eds.) Proc. of the 14th Int. Conf. on World Wide Web, WWW 2005, pp. 530\u2013538. ACM, New York (2005)"},{"key":"26_CR5","unstructured":"Broache, A.: Competition is good for search privacy, report says. CNET News (August 8, 2007), http:\/\/news.cnet.com\/Competition-is-good-for-search-privacy,-report-says\/2100-1029_3-6201468.html"},{"key":"26_CR6","first-page":"199","volume-title":"Advances in Cryptology - Crypto 1982","author":"D. Chaum","year":"1983","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology - Crypto 1982, pp. 199\u2013203. Springer, Heidelberg (1983)"},{"issue":"3","key":"26_CR7","first-page":"329","volume":"2","author":"T. Dalenius","year":"1986","unstructured":"Dalenius, T.: Finding a needle in a haystack - or identifying anonymous census records. Journal of Official Statistics\u00a02(3), 329\u2013336 (1986)","journal-title":"Journal of Official Statistics"},{"key":"26_CR8","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1145\/1807342.1807369","volume-title":"ACM Conference on Electronic Commerce","author":"J. Feigenbaum","year":"2010","unstructured":"Feigenbaum, J., Jaggard, A.D., Schapira, M.: Approximate privacy: foundations and quantification (extended abstract). In: Parkes, D.C., Dellarocas, C., Tennenholtz, M. (eds.) ACM Conference on Electronic Commerce, pp. 167\u2013178. ACM, New York (2010)"},{"key":"26_CR9","unstructured":"Gray, E.: FTC to boost competition in privacy protection. Global Competition Review (September 23, 2010)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"He, Y., Zhu, M., Zheng, C.: An efficient and minimum sensitivity cost negotiation strategy in automated trust negotiation. In: Int. Conf. Comp. Sci. and Soft. Eng.,, vol.\u00a03, pp. 182\u2013185 (2008)","DOI":"10.1109\/CSSE.2008.867"},{"key":"26_CR11","first-page":"249","volume-title":"TARK 2001: Proceedings of the 8th Conference on Theoretical Aspects of Rationality and Knowledge","author":"J. Kleinberg","year":"2001","unstructured":"Kleinberg, J., Papadimitriou, C.H., Raghavan, P.: On the value of private information. In: TARK 2001: Proceedings of the 8th Conference on Theoretical Aspects of Rationality and Knowledge, pp. 249\u2013257. Morgan Kaufmann, San Francisco (2001)"},{"issue":"2","key":"26_CR12","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/0047-2727(86)90017-4","volume":"31","author":"R. Luton","year":"1986","unstructured":"Luton, R., McAfee, P.R.: Sequential procurement auctions. Journal of Public Economics\u00a031(2), 181\u2013195 (1986)","journal-title":"Journal of Public Economics"},{"key":"26_CR13","volume-title":"A Course in Game Theory","author":"M. Osborne","year":"1994","unstructured":"Osborne, M., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)"},{"key":"26_CR14","first-page":"89","volume-title":"Digital Identity Management","author":"F. Paci","year":"2008","unstructured":"Paci, F., Bauer, D., Bertino, E., Blough, D.M., Squicciarini, A.C.: Minimal credential disclosure in trust negotiations. In: Bertino, E., Takahashi, K. (eds.) Digital Identity Management, pp. 89\u201396. ACM, New York (2008)"},{"issue":"6","key":"26_CR15","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s00779-008-0214-3","volume":"13","author":"N.M. Sadeh","year":"2009","unstructured":"Sadeh, N.M., Hong, J.I., Cranor, L.F., Fette, I., Kelley, P.G., Prabaker, M.K., Rao, J.: Understanding and capturing people\u2019s privacy policies in a mobile social networking application. Personal and Ubiquitous Computing\u00a013(6), 401\u2013412 (2009)","journal-title":"Personal and Ubiquitous Computing"},{"issue":"6","key":"26_CR16","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Transactions on Knowledge and Data Engineering\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"26_CR17","unstructured":"Schwartz, A., Cooper, A.: Search privacy practices: A work in progress. Center for Democracy and Technology report (August 2007)"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Squicciarini, A.C., Bertino, E., Ferrari, E., Paci, F., Thuraisingham, B.M.: PP-trust-X: A system for privacy preserving trust negotiations. ACM Trans. Inf. Syst. Secur.\u00a010(3) (2007)","DOI":"10.1145\/1266977.1266981"},{"key":"26_CR19","unstructured":"Sweeney, L.: Guaranteeing anonymity when sharing medical data, the Datafly system. Journal of the American Medical Informatics Association (1997)"},{"key":"26_CR20","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1111\/j.1540-6261.1961.tb02789.x","volume":"16","author":"W. Vickrey","year":"1961","unstructured":"Vickrey, W.: Counterspeculation, auctions, and competitive sealed tenders. Journal of Finance\u00a016, 8\u201337 (1961)","journal-title":"Journal of Finance"},{"key":"26_CR21","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/644527.644532","volume-title":"WPES","author":"W.H. Winsborough","year":"2002","unstructured":"Winsborough, W.H., Li, N.: Protecting sensitive attributes in automated trust negotiation. In: WPES, pp. 41\u201351. ACM, New York (2002)"},{"issue":"1","key":"26_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/605434.605435","volume":"6","author":"T. Yu","year":"2003","unstructured":"Yu, T., Winslett, M., Seamons, K.E.: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur.\u00a06(1), 1\u201342 (2003)","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2011"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23822-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T18:56:12Z","timestamp":1638557772000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23822-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642238215","9783642238222"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23822-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}