{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:10:13Z","timestamp":1746159013051,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545672"},{"type":"electronic","value":"9783642545689"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54568-9_26","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:35Z","timestamp":1395325895000},"page":"390-398","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes"],"prefix":"10.1007","author":[{"given":"Oriol","family":"Farr\u00e0s","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Josep","family":"Domingo-Ferrer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alberto","family":"Blanco-Justicia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"issue":"2","key":"26_CR1","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s00145-009-9040-7","volume":"23","author":"Y Aumann","year":"2010","unstructured":"Aumann, Y., Lindell, Y.: Security against covert adversaries: efficient protocols for realistic adversaries. J. Cryptology 23(2), 281\u2013343 (2010)","journal-title":"J. Cryptology"},{"key":"26_CR2","unstructured":"Autrel, F., Cuppens, F., Cuppens-Boulahia, N., Coma, C.: MotOrBAC 2: a security policy tool. In: Third Joint Conference on Security in Networks Architectures and Security of Information Systems (SARSSI), pp. 273\u2013287 (2008)"},{"key":"26_CR3","series-title":"LNCS","first-page":"114","volume-title":"WELCOM 2001","author":"L Butty\u00e1n","year":"2001","unstructured":"Butty\u00e1n, L., Hubaux, J.-P.: Rational exchange - a formal model based on game theory. In: Fiege, L., M\u00fchl, G., Wilhelm, U.G. (eds.) WELCOM 2001. LNCS, vol. 2232, pp. 114\u2013126. Springer, Heidelberg (2001)"},{"key":"26_CR4","series-title":"LNCS","first-page":"125","volume-title":"ACNS 2009","author":"D Dachman-Soled","year":"2009","unstructured":"Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient robust private set intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 125\u2013142. Springer, Heidelberg (2009)"},{"key":"26_CR5","series-title":"LNCS","first-page":"255","volume-title":"MDAI 2010","author":"J Domingo-Ferrer","year":"2010","unstructured":"Domingo-Ferrer, J.: Rational privacy disclosure in social networks. In: Torra, V., Narukawa, Y., Daumas, M. (eds.) MDAI 2010. LNCS, vol. 6408, pp. 255\u2013265. Springer, Heidelberg (2010)"},{"key":"26_CR6","unstructured":"Domingo-Ferrer, J.: Coprivacy: an introduction to the theory and applications of co-operative privacy. SORT-Statistics and Operations Research Transactions, special issue, pp. 25\u201340 (2011)"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Dong, C., Dulay, N.: Privacy preserving trust negotiation for pervasive healthcare. In: Pervasive Health Conference and Workshops, pp. 1\u20139 (2006)","DOI":"10.1109\/PCTHEALTH.2006.361626"},{"key":"26_CR8","unstructured":"Farr\u00e0s, O., Domingo-Ferrer, J., Blanco-Justicia, A.: Privacy-preserving trust management mechanisms from private matching schemes. http:\/\/arxiv.org\/abs\/1308.2435"},{"key":"26_CR9","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-24676-3_1","volume-title":"EUROCRYPT 2004","author":"MJ Freedman","year":"2004","unstructured":"Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, Ch., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1\u201319. Springer, Heidelberg (2004)"},{"key":"26_CR10","unstructured":"Frikken, K.B., Li, J., Atallah, M.J.: Trust negotiation with hidden credentials, hidden policies, and policy cycles. In: NDSS (2006)"},{"key":"26_CR11","series-title":"LNCS","first-page":"155","volume-title":"TCC 2008","author":"C Hazay","year":"2008","unstructured":"Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155\u2013175. Springer, Heidelberg (2008)"},{"key":"26_CR12","unstructured":"Interoperable Trust Assurance Infrastructure (Inter-Trust). EU Project FP7-ICT 317731, 2012\u20132014. http:\/\/www.inter-trust.eu"},{"key":"26_CR13","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/11535218_15","volume-title":"CRYPTO 2005","author":"L Kissner","year":"2005","unstructured":"Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241\u2013257. Springer, Heidelberg (2005)"},{"key":"26_CR14","series-title":"LNCS","first-page":"458","volume-title":"iTrust 2006","author":"AJ Lee","year":"2006","unstructured":"Lee, A.J., Winslett, M., Basney, J., Welch, V.: Traust: a trust negotiation based authorization service. In: St\u00f8len, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 458\u2013462. Springer, Heidelberg (2006)"},{"key":"26_CR15","series-title":"IFIP AICT","first-page":"176","volume-title":"IFIPTM 2009","author":"AJ Lee","year":"2009","unstructured":"Lee, A.J., Winslett, M., Perano, K.J.: TrustBuilder2: a reconfigurable framework for trust negotiation. In: Bertino, E., Ferrari, E., Karabulut, Y., Li, N. (eds.) IFIPTM 2009. IFIP AICT, vol. 300, pp. 176\u2013195. Springer, Heidelberg (2009)"},{"issue":"1","key":"26_CR16","first-page":"2","volume":"13","author":"J. Li","year":"2009","unstructured":"Li, J., Li, N., Winsborough, W.H.: Automated trust negotiation using cryptographic credentials. ACM Trans. Inf. Syst. Secur. 13(1), art. no. 2 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"26_CR17","unstructured":"MEF Global Privacy Report 2013"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Meyer, U., Wetzel, S., Ioannidis, S.: Distributed privacy-preserving policy reconciliation. In: ICC, pp. 1342\u20131349 (2007)","DOI":"10.1109\/ICC.2007.226"},{"issue":"2","key":"26_CR19","first-page":"277","volume":"36","author":"A Miyaji","year":"2012","unstructured":"Miyaji, A., Rahman, M.S.: Privacy-preserving two-party rational set intersection protocol. Informatica 36(2), 277\u2013286 (2012)","journal-title":"Informatica"},{"key":"26_CR20","series-title":"LNCS","first-page":"118","volume-title":"SDM 2004","author":"W Nejdl","year":"2004","unstructured":"Nejdl, W., Olmedilla, D., Winslett, M.: PeerTrust: automated trust negotiation for peers on the semantic web. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 118\u2013132. Springer, Heidelberg (2004)"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Neugebauer, G., Brutschy, L., Meyer, U., Wetzel, S.: Design and implementation of privacy-preserving reconciliation protocols. In: EDBT\/ICDT Workshops, pp. 121\u2013130 (2013)","DOI":"10.1145\/2457317.2457339"},{"key":"26_CR22","series-title":"LNCS","first-page":"223","volume-title":"EUROCRYPT 1999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"26_CR23","unstructured":"Special Eurobarometer 359: Attitudes on Data Protection and Electronic Identity in the European Union, June 2011"},{"issue":"3","key":"26_CR24","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/1266977.1266981","volume":"10","author":"A. Squicciarini","year":"2007","unstructured":"Squicciarini, A., Bertino, E., Ferrari, E., Paci, F., Thuraisingham, B.: PP-trust-X: a system for privacy preserving trust negotiation. ACM Trans. Inf. Syst. Secur. 10(3), art. no. 12 (2007)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Voris, J., Ioannidis, S., Wetzel, S., Meyer, U.: Performance evaluation of privacy-preserving policy reconciliation protocols. In: POLICY, pp. 221\u2013228 (2007)","DOI":"10.1109\/POLICY.2007.32"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DISCEX, vol. 1, pp. 88\u2013102 (2000)","DOI":"10.1109\/DISCEX.2000.824965"},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"Yao, A.C.-C.: How to generate and exchange secrets. In: FOCS, pp. 162\u2013167 (1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"26_CR28","series-title":"LNCS","first-page":"190","volume-title":"ICICS 2006","author":"D Yao","year":"2006","unstructured":"Yao, D., Frikken, K.B., Atallah, M.J., Tamassia, R.: Point-based trust: define how much privacy is worth. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 190\u2013209. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54568-9_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T03:30:28Z","timestamp":1746156628000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54568-9_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545672","9783642545689"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54568-9_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}