{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:21:47Z","timestamp":1766578907074,"version":"3.48.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J BANK FINANC TECHNOL"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s42786-025-00055-4","type":"journal-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T06:23:30Z","timestamp":1745907810000},"page":"31-50","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Fine-grained data sharing in open banking"],"prefix":"10.1007","volume":"9","author":[{"given":"Kevin A.","family":"Gao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9607-376X","authenticated-orcid":false,"given":"Muhammad Rizwan","family":"Asghar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,29]]},"reference":[{"key":"55_CR1","doi-asserted-by":"crossref","unstructured":"Premchand A, Choudhry A (2018) Open banking & APIs for transformation in banking. In: 2018 International Conference on Communication, Computing and Internet of Things (IC3IoT), IEEE, pp 25\u201329","DOI":"10.1109\/IC3IoT.2018.8668107"},{"key":"55_CR2","unstructured":"Brodsky L, Oakes L (2017) Data sharing and open banking. McKinsey & Company"},{"key":"55_CR3","unstructured":"Gozman D, Hedman J, Olsen KS (2018) Open banking: emergent roles, risks & opportunities. ECIS2018"},{"key":"55_CR4","unstructured":"Botta A, Digiacomo N, H\u00f6ll R, Oakes L (2018) PSD2: Taking advantage of open-banking disruption. Mc Kinsey & Company (Global Banking Practice), 12(9)"},{"key":"55_CR5","unstructured":"Botta A, Digiacomo N, H\u00f6ll R, Oakes L (2018) PSD2: taking advantage of open-banking disruption. Mc Kinsey & Company (Global Banking Practice), vol 12"},{"key":"55_CR6","doi-asserted-by":"crossref","unstructured":"Mazurek ML, Arsenault J, Bresee J, Gupta N, Ion I, Johns C, Lee D, Liang Y, Olsen J, Salmon B, et al (2010) Access control for home data sharing: Attitudes, needs and practices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp 645\u2013654","DOI":"10.1145\/1753326.1753421"},{"key":"55_CR7","unstructured":"Martinelli SA (2017) Query rewriting and stored queries for XACML policy enforcement. Eindhoven University of Technology"},{"issue":"10","key":"55_CR8","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1361-3723(16)30080-X","volume":"2016","author":"S Mansfield-Devine","year":"2016","unstructured":"Mansfield-Devine S (2016) Open banking: opportunity and danger. Comput Fraud Secur 2016(10):8\u201313","journal-title":"Comput Fraud Secur"},{"key":"55_CR9","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1016\/j.future.2019.09.010","volume":"110","author":"H Wang","year":"2020","unstructured":"Wang H, Ma S, Dai H-N, Imran M, Wang T (2020) Blockchain-based data privacy management with nudge theory in open banking. Futur Gener Comput Syst 110:812\u2013823","journal-title":"Futur Gener Comput Syst"},{"key":"55_CR10","doi-asserted-by":"crossref","unstructured":"Mukhopadhyay I, Ghosh A (2021) In: Chakraborty M, Singh M, Balas VE, Mukhopadhyay I (eds) Blockchain-Based Framework for Managing Customer Consent in Open Banking, Springer, Singapore, pp 77\u201390","DOI":"10.1007\/978-981-15-9317-8_3"},{"key":"55_CR11","unstructured":"European Union: Directive (EU) 2015\/2366 of the European Parliament and of the Council. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32015L2366&from=EN. Last accessed: December 2, 2021 (2015)"},{"key":"55_CR12","volume-title":"How to flourish in an uncertain future: Open banking","author":"M Doyle","year":"2017","unstructured":"Doyle M, Sharma R, Ross C, Sonnad V (2017) How to flourish in an uncertain future: Open banking. Deloitte UK, London"},{"issue":"05","key":"55_CR13","first-page":"2050033","volume":"17","author":"B Ramdani","year":"2020","unstructured":"Ramdani B, Rothwell B, Boukrami E (2020) Open banking: The emergence of new digital business models. Int J Innov Technol Manag 17(05):2050033","journal-title":"Int J Innov Technol Manag"},{"key":"55_CR14","unstructured":"Sullivan C (1458) The new Australian Consumer Data Right: An exemplary model for Open Banking. Wiley Interdisciplinary Reviews: Forensic Science"},{"key":"55_CR15","unstructured":"Lopes T, Rothwell G, Choudhury BP (2019) Unlocking value with customer data rights rules. Accenture Consulting"},{"key":"55_CR16","unstructured":"Payments NZ (2021) Standards. https:\/\/www.apicentre.paymentsnz.co.nz\/standards. Last accessed: 3 Dec 2021"},{"key":"55_CR17","doi-asserted-by":"crossref","unstructured":"Long G, Tan Y, Jiang J, Zhang C (2020) In: Yang Q, Fan L, Yu H (eds) Federated Learning for Open Banking, Springer, Cham, pp 240\u2013254","DOI":"10.1007\/978-3-030-63076-8_17"},{"key":"55_CR18","unstructured":"Almehrej A, Freitas L, Modesti P (2020) Security analysis of the open banking account and transaction API protocol. arXiv preprint arXiv:2003.12776"},{"key":"55_CR19","doi-asserted-by":"crossref","unstructured":"Wang J, Deng D (2021) Unauthorized transactions and unintended transactions in open banking: loss allocation based on predictably irrational customers","DOI":"10.2991\/assehr.k.210121.072"},{"key":"55_CR20","doi-asserted-by":"crossref","unstructured":"Zhang Q, Zhu J, Ding Q (2019) OBBC: A blockchain-based data sharing scheme for open banking. In: CCF China Blockchain Conference. Springer, pp 1\u201316","DOI":"10.1007\/978-981-15-3278-8_1"},{"key":"55_CR21","doi-asserted-by":"crossref","unstructured":"Wu M-Y, Lee T-H (2013) Design and implementation of cloud API access control based on OAuth. In: IEEE 2013 Tencon-Spring, IEEE, pp 485\u2013489","DOI":"10.1109\/TENCONSpring.2013.6584492"},{"issue":"5","key":"55_CR22","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.jbi.2010.08.001","volume":"43","author":"WV Sujansky","year":"2010","unstructured":"Sujansky WV, Faus SA, Stone E, Brennan PF (2010) A method to implement fine-grained access control for personal health records through standard relational database queries. J Biomed Inform 43(5):46\u201350","journal-title":"J Biomed Inform"},{"key":"55_CR23","doi-asserted-by":"crossref","unstructured":"Zhang J, Cao S (2015) Design and implementation of a third-party developers auditing system based on open API. In: 2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS), IEEE, pp 803\u2013806","DOI":"10.1109\/ICSESS.2015.7339178"},{"key":"55_CR24","doi-asserted-by":"crossref","unstructured":"Hardt D et al (2012) The OAuth 2.0 authorization framework. RFC 6749","DOI":"10.17487\/rfc6749"},{"issue":"4","key":"55_CR25","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/s11623-016-0582-1","volume":"40","author":"H Tschofenig","year":"2016","unstructured":"Tschofenig H (2016) Fixing user authentication for the internet of things (iot). Datenschutz und Datensicherheit-DuD 40(4):222\u2013224","journal-title":"Datenschutz und Datensicherheit-DuD"},{"key":"55_CR26","doi-asserted-by":"crossref","unstructured":"Belkhir A, Abdellatif M, Tighilt R, Moha N, Gu\u00e9h\u00e9neuc Y-G, Beaudry \u00c9 (2019) An observational study on the state of rest api uses in android mobile applications. In: 2019 IEEE\/ACM 6th International Conference on Mobile Software Engineering and Systems (MOBILESoft), IEEE, pp 66\u201375","DOI":"10.1109\/MOBILESoft.2019.00020"},{"issue":"12","key":"55_CR27","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1109\/TC.2010.274","volume":"60","author":"AX Liu","year":"2010","unstructured":"Liu AX, Chen F, Hwang J, Xie T (2010) Designing fast and scalable xacml policy evaluation engines. IEEE Trans Comput 60(12):1802\u20131817","journal-title":"IEEE Trans Comput"}],"container-title":["Journal of Banking and Financial Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42786-025-00055-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42786-025-00055-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42786-025-00055-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T13:11:53Z","timestamp":1765804313000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42786-025-00055-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["55"],"URL":"https:\/\/doi.org\/10.1007\/s42786-025-00055-4","relation":{},"ISSN":["2524-7956","2524-7964"],"issn-type":[{"type":"print","value":"2524-7956"},{"type":"electronic","value":"2524-7964"}],"subject":[],"published":{"date-parts":[[2025,4]]},"assertion":[{"value":"14 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2025","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The society logo has been updated.","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no financial and non-financial conflict of interest between all authors, and there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The manuscript does not contain any individual persons data and all authors agree to the article for publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The manuscripts reporting studies do not contain human participants, human data, or human tissue.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}