{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T10:40:10Z","timestamp":1751193610608,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":42,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819683116","type":"print"},{"value":"9789819683123","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-8312-3_17","type":"book-chapter","created":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T10:15:07Z","timestamp":1751192107000},"page":"222-237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["TBDS: Transaction-Based Data Sharing"],"prefix":"10.1007","author":[{"given":"Wu","family":"Xin","sequence":"first","affiliation":[]},{"given":"Hongyin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaoqi","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Jichen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaotie","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Zhonghai","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,30]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Agarwal, A., Dahleh, M., Sarkar, T.: A marketplace for data: an algorithmic solution. In: Proceedings of the 2019 ACM Conference on Economics and Computation, pp. 701\u2013726 (2019)","DOI":"10.1145\/3328526.3329589"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"287","DOI":"10.21552\/EDPL\/2016\/3\/4","volume":"2","author":"JP Albrecht","year":"2016","unstructured":"Albrecht, J.P.: How the GDPR will change the world. Eur. Data Prot. L. Rev. 2, 287 (2016)","journal-title":"Eur. Data Prot. L. Rev."},{"issue":"2","key":"17_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2478\/popets-2020-0014","volume":"2020","author":"M Altman","year":"2020","unstructured":"Altman, M., Chong, S., Wood, A.: Formalizing privacy laws for license generation and data repository decision automation. Proc. Priv. Enhancing Technol. 2020(2), 1\u201319 (2020)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"17_CR5","unstructured":"Analytics, M.: The age of analytics: competing in a data-driven world. McKinsey Global Institute Research (2016)"},{"issue":"1","key":"17_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/15427951.2013.830164","volume":"11","author":"J Augustine","year":"2015","unstructured":"Augustine, J., Chen, N., Elkind, E., Fanelli, A., Gravin, N., Shiryaev, D.: Dynamics of profit-sharing games. Internet Math. 11(1), 1\u201322 (2015)","journal-title":"Internet Math."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: Medrec: using blockchain for medical data access and permission management. In: 2016 2nd International Conference on Open and Big Data (OBD), pp. 25\u201330. IEEE (2016)","DOI":"10.1109\/OBD.2016.11"},{"key":"17_CR8","unstructured":"Bonawitz, K.: Towards federated learning at scale: Syste m design. arXiv preprint arXiv:1902.01046 (2019)"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Chen, L., Koutris, P., Kumar, A.: Model-based pricing: do not pay for more than what you learn! In: Proceedings of the 1st Workshop on Data Management for End-to-end Machine Learning, pp.\u00a01\u20134 (2017)","DOI":"10.1145\/3076246.3076250"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"102710","DOI":"10.1016\/j.jnca.2020.102710","volume":"167","author":"J Chi","year":"2020","unstructured":"Chi, J., et al.: A secure and efficient data sharing scheme based on blockchain in industrial internet of things. J. Netw. Comput. Appl. 167, 102710 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TIFS.2019.2928256","volume":"15","author":"W Dai","year":"2019","unstructured":"Dai, W., Dai, C., Choo, K., Cui, C., Zou, D., Jin, H.: SDTE: a secure blockchain-based data trading ecosystem. IEEE Trans. Inf. Forensics Secur. 15, 725\u2013737 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"De\u00a0Gregorio, G., Ranchord\u00e1s, S.: Breaking down information silos with big data: a legal analysis of data sharing. In: Legal Challenges of Big Data, pp. 204\u2013231. Edward Elgar Publishing (2020)","DOI":"10.4337\/9781788976220.00014"},{"issue":"1","key":"17_CR13","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. Commun. ACM 51(1), 107\u2013113 (2008)","journal-title":"Commun. ACM"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: International Colloquium on Automata, Languages, and Programming, pp. 1\u201312. Springer (2006)","DOI":"10.1007\/11787006_1"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: International Conference on Theory and Applications of Models of Computation, pp. 1\u201319. Springer (2008)","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"17_CR16","unstructured":"Ghorbani, A., Zou, J.: Data shapley: equitable valuation of data for machine learning. In: International Conference on Machine Learning, pp. 2242\u20132251. PMLR (2019)"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Ghosh, A., Roth, A.: Selling privacy at auction. In: Proceedings of the 12th ACM Conference on Electronic Commerce, pp. 199\u2013208 (2011)","DOI":"10.1145\/1993574.1993605"},{"key":"17_CR18","unstructured":"Gollapudi, S., Kollias, K., Panigrahi, D., Pliatsika, V.: Profit sharing and efficiency in utility games. In: 25th Annual European Symposium on Algorithms (ESA 2017). Schloss-Dagstuhl-Leibniz Zentrum f\u00fcr Informatik (2017)"},{"key":"17_CR19","unstructured":"Hard, A., et al.: Federated learning for mobile keyboard prediction. arXiv preprint arXiv:1811.03604 (2018)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"He, Y., Zhu, H., Wang, C., Xiao, K., Zhou, Y., Xin, Y.: An accountable data trading platform based on blockchain. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.\u00a01\u20136. IEEE (2019)","DOI":"10.1109\/INFOCOMWKSHPS47286.2019.9093785"},{"key":"17_CR21","unstructured":"Jia, R., et al.: Towards efficient data valuation based on the shapley value. In: The 22nd International Conference on Artificial Intelligence and Statistics, pp. 1167\u20131176. PMLR (2019)"},{"key":"17_CR22","doi-asserted-by":"publisher","first-page":"102274","DOI":"10.1016\/j.lindif.2023.102274","volume":"103","author":"E Kasneci","year":"2023","unstructured":"Kasneci, E., et al.: ChatGPT for good? on opportunities and challenges of large language models for education. Learn. Individ. Differ. 103, 102274 (2023)","journal-title":"Learn. Individ. Differ."},{"issue":"12","key":"17_CR23","doi-asserted-by":"publisher","first-page":"1962","DOI":"10.14778\/2367502.2367548","volume":"5","author":"P Koutris","year":"2012","unstructured":"Koutris, P., Upadhyaya, P., Balazinska, M., Howe, B., Suciu, D.: Querymarket demonstration: pricing for online data markets. Proc. VLDB Endowment 5(12), 1962\u20131965 (2012)","journal-title":"Proc. VLDB Endowment"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Koutris, P., Upadhyaya, P., Balazinska, M., Howe, B., Suciu, D.: Toward practical query pricing with querymarket. In: Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, pp. 613\u2013624 (2013)","DOI":"10.1145\/2463676.2465335"},{"issue":"5","key":"17_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2770870","volume":"62","author":"P Koutris","year":"2015","unstructured":"Koutris, P., Upadhyaya, P., Balazinska, M., Howe, B., Suciu, D.: Query-based data pricing. J. ACM (JACM) 62(5), 1\u201344 (2015)","journal-title":"J. ACM (JACM)"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Liang, X., Zhao, J., Shetty, S., Liu, J., Li, D.: Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp.\u00a01\u20135. IEEE (2017)","DOI":"10.1109\/PIMRC.2017.8292361"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Liu, J., Lou, J., Liu, J., Xiong, L., Pei, J., Sun, J.: Dealer: an end-to-end model marketplace with differential privacy. Proc. VLDB Endowment 14(6) (2021)","DOI":"10.14778\/3447689.3447700"},{"key":"17_CR28","unstructured":"Liu, Q., Safavi-Naini, R., Sheppard, N.P.: Digital rights management for content distribution. In: Conferences in Research and Practice in Information Technology Series, vol.\u00a034, pp. 49\u201358. Citeseer (2003)"},{"issue":"4","key":"17_CR29","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MIS.2020.2988525","volume":"35","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Kang, Y., Xing, C., Chen, T., Yang, Q.: A secure federated transfer learning framework. IEEE Intell. Syst. 35(4), 70\u201382 (2020)","journal-title":"IEEE Intell. Syst."},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Luo, Y., Fan, J., Deng, C., Li, Y., Zheng, Y., Ding, J.: Accountable data sharing scheme based on blockchain and SGX. In: 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 9\u201316. IEEE (2019)","DOI":"10.1109\/CyberC.2019.00012"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254\u2013269 (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"17_CR32","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y\u00a0Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics, pp. 1273\u20131282. PMLR (2017)"},{"issue":"3","key":"17_CR33","doi-asserted-by":"publisher","first-page":"01","DOI":"10.5121\/ijdms.2019.11301","volume":"11","author":"J Patel","year":"2019","unstructured":"Patel, J.: Bridging data silos using big data integration. Int. J. Database Manage. Syst. 11(3), 01\u201306 (2019)","journal-title":"Int. J. Database Manage. Syst."},{"key":"17_CR34","first-page":"4","volume":"50","author":"H Richter","year":"2019","unstructured":"Richter, H., Slowinski, P.R.: The data sharing economy: on the emergence of new intermediaries. IIC Int. Rev. Intellect. Property Competition Law 50, 4\u201329 (2019)","journal-title":"IIC Int. Rev. Intellect. Property Competition Law"},{"key":"17_CR35","unstructured":"Vaswani, A.: Attention is all you need. In: Advances in Neural Information Processing Systems (2017)"},{"issue":"11","key":"17_CR36","doi-asserted-by":"publisher","first-page":"7688","DOI":"10.1109\/TII.2020.3040171","volume":"17","author":"Y Wang","year":"2020","unstructured":"Wang, Y., et al.: SPDS: a secure and auditable private data sharing scheme for smart grid based on blockchain. IEEE Trans. Industr. Inf. 17(11), 7688\u20137699 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"17_CR37","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.future.2022.10.016","volume":"140","author":"H Xie","year":"2023","unstructured":"Xie, H., Zheng, J., He, T., Wei, S., Hu, C.: TEBDS: a trusted execution environment-and-blockchain-supported IoT data sharing system. Futur. Gener. Comput. Syst. 140, 321\u2013330 (2023)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"2","key":"17_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. (TIST) 10(2), 1\u201319 (2019)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"issue":"4","key":"17_CR39","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1109\/JSAC.2017.2676898","volume":"35","author":"S Yang","year":"2017","unstructured":"Yang, S., Wu, F., Tang, S., Gao, X., Yang, B., Chen, G.: On designing data quality-aware truth estimation and surplus sharing method for mobile crowdsensing. IEEE J. Sel. Areas Commun. 35(4), 832\u2013847 (2017)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"17_CR40","unstructured":"Yang, T., et al.: Applied federated learning: improving google keyboard query suggestions. arXiv preprint arXiv:1812.02903 (2018)"},{"key":"17_CR41","doi-asserted-by":"crossref","unstructured":"Yu, H., et al.: A fairness-aware incentive scheme for federated learning. In: Proceedings of the AAAI\/ACM Conference on AI, Ethics, and Society, pp. 393\u2013399 (2020)","DOI":"10.1145\/3375627.3375840"},{"key":"17_CR42","unstructured":"Zhao, W.X., et al.: A survey of large language models. arXiv preprint arXiv:2303.18223 (2023)"}],"container-title":["Lecture Notes in Computer Science","Frontiers of Algorithmics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-8312-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T10:15:14Z","timestamp":1751192114000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-8312-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819683116","9789819683123"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-8312-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"30 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IJTCS-FAW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Frontiers in Algorithmics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"faw2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ijtcs-faw.github.io\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}