{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:35Z","timestamp":1750307615713,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,31]],"date-time":"2008-10-31T00:00:00Z","timestamp":1225411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,31]]},"DOI":"10.1145\/1456492.1456493","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Security against the business partner"],"prefix":"10.1145","author":[{"given":"Florian","family":"Kerschbaum","sequence":"first","affiliation":[{"name":"SAP Research, Karlsruhe, Germany"}]},{"given":"Rafael J.","family":"Deitos","sequence":"additional","affiliation":[{"name":"SAP Research, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2008,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Baker W. Hylender D. and Valentine A. 2008 Data Breach Investigations Report. Available at http:\/\/www.verizonbusiness.com\/resources\/security\/databreachreport.pdf 2008.  Baker W. Hylender D. and Valentine A. 2008 Data Breach Investigations Report. Available at http:\/\/www.verizonbusiness.com\/resources\/security\/databreachreport.pdf 2008."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Bogetoft P. Christensen D. Damgard I. Geisler M. Jakobsen T. Kroigaard M. Nielsen J. Nielsen J. Nielsen K. Pagter J. Schwartzbach M. and Toft. T. Multiparty Computation Goes Live. Available at http:\/\/eprint.iacr.org\/2008\/068 2008.  Bogetoft P. Christensen D. Damgard I. Geisler M. Jakobsen T. Kroigaard M. Nielsen J. Nielsen J. Nielsen K. Pagter J. Schwartzbach M. and Toft. T. Multiparty Computation Goes Live. Available at http:\/\/eprint.iacr.org\/2008\/068 2008.","DOI":"10.1007\/978-3-642-03549-4_20"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/993861"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586114"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Clark A. and Scarf H. Optimal policies for a multi-echelon inventory problem. Management Science 6(4) 1960.  Clark A. and Scarf H. Optimal policies for a multi-echelon inventory problem. Management Science 6(4) 1960.","DOI":"10.1287\/mnsc.6.4.475"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647086.715687"},{"volume-title":"Proceedings of 4th International Workshop on Practice and Theory in Public Key Cryptography","year":"2001","author":"Damgard I.","key":"e_1_3_2_1_8_1"},{"volume-title":"Princeton University Press","year":"1963","author":"Dantzig G. B.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180367.1180386"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_13_1","unstructured":"IBM. IBM Anonymous Resolution Version 4.1 Technical Information. See http:\/\/ibm.com\/db2\/eas\/ 2006.  IBM. IBM Anonymous Resolution Version 4.1 Technical Information. See http:\/\/ibm.com\/db2\/eas\/ 2006."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2005.08.006"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Kerschbaum F. Building A Privacy-Preserving Benchmarking Enterprise System. em In Proceedings of the 11th IEEE International EDOC Conference 2007.   Kerschbaum F. Building A Privacy-Preserving Benchmarking Enterprise System. em In Proceedings of the 11th IEEE International EDOC Conference 2007.","DOI":"10.1109\/EDOC.2007.13"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314346"},{"volume-title":"F. Practical Privacy-Preserving Benchmarking. In Proceedings of the 23rd IFIP International Information Security Conference","year":"2008","author":"Kerschbaum","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11755593_15"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456406"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2007.4447773"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456492.1456506"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/COLCOM.2006.361848"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Padmanabhan H. and Whang S. Information distortion in a supply chain. Management Science 43(4) 1997.  Padmanabhan H. and Whang S. Information distortion in a supply chain. Management Science 43(4) 1997.","DOI":"10.1287\/mnsc.43.4.546"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJISM.2006.008336"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"volume-title":"PhD. Thesis of the University of Aarhus","year":"2007","author":"Toft T.","key":"e_1_3_2_1_28_1"},{"volume-title":"A. Protocols for Secure Computations. In Proceedings of the annual IEEE Symposium on Foundations of Computer Science","year":"1982","author":"Yao","key":"e_1_3_2_1_29_1"}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 2008 ACM workshop on Secure web services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456492.1456493","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456492.1456493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:44Z","timestamp":1750250744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456492.1456493"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,31]]},"references-count":28,"alternative-id":["10.1145\/1456492.1456493","10.1145\/1456492"],"URL":"https:\/\/doi.org\/10.1145\/1456492.1456493","relation":{},"subject":[],"published":{"date-parts":[[2008,10,31]]},"assertion":[{"value":"2008-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}