{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T01:20:35Z","timestamp":1773796835658,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T00:00:00Z","timestamp":1222041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,22]]},"DOI":"10.1145\/1595676.1595694","type":"proceedings-article","created":{"date-parts":[[2009,8,24]],"date-time":"2009-08-24T14:08:35Z","timestamp":1251122915000},"page":"107-125","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Trading in risk"],"prefix":"10.1145","author":[{"given":"Ian","family":"Molloy","sequence":"first","affiliation":[{"name":"IBM T.J. Watson Research Center, Hawthorne, NY and Purdue University, West Lafayette, IN"}]},{"given":"Pau-Chen","family":"Cheng","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Hawthorne, NY"}]},{"given":"Pankaj","family":"Rohatgi","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Hawthorne, NY"}]}],"member":"320","published-online":{"date-parts":[[2008,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"FCC\n\n  \n  : Wireless telecommunications bureau October 2007. http:\/\/wireless.fcc.gov  FCC: Wireless telecommunications bureau October 2007. http:\/\/wireless.fcc.gov"},{"key":"e_1_3_2_1_2_1","volume-title":"Using Specification. Based Intrusion Detection for Automated Response. In Sixth International Symposium on Recent Advances in Intrusion Detection (RAID)","author":"Balepin I.","year":"2003"},{"key":"e_1_3_2_1_3_1","volume-title":"Bank for Internaional Settlements","author":"Basel Committee on Banking Supervision.","year":"2006"},{"key":"e_1_3_2_1_4_1","volume-title":"United States Congress","author":"Bingaman J.","year":"2007"},{"key":"e_1_3_2_1_5_1","volume-title":"The Fifth Workshop on the Economics of Information Security (WEIS 2006)","author":"B\u00f6hme R.","year":"2006"},{"key":"e_1_3_2_1_6_1","volume-title":"Advances in Cryptology--CRYPTO'93","author":"Brands S.","year":"1993"},{"key":"e_1_3_2_1_7_1","first-page":"188","article-title":"The Vickrey-Clarke-Groves versus the simultaneous ascending auction: An experimental approach","volume":"133","author":"Brenner D.","year":"1997","journal-title":"A1."},{"key":"e_1_3_2_1_8_1","volume-title":"Hewlett-Packard","author":"Byde A.","year":"2003"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1228527"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/551984.852234"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"CRYPTO'88: Proceedings on Advances in cryptology","author":"Chaum D.","year":"1990"},{"key":"e_1_3_2_1_12_1","article-title":"Risk Modulating Factors in Risk-Based Access Control for Information in a MANET","author":"Cheng P.-C.","year":"2008","journal-title":"IBM T.J. Watson Research Center"},{"key":"e_1_3_2_1_13_1","article-title":"IT Security as Risk Management","author":"Cheng P.-C.","year":"2008","journal-title":"A Research Perspective. IBMT.J. Watson Research Center"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.21"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"G.\n       \n      Christodoulou E.\n       \n      Koutsoupias and \n      \n      \n      A.\n       \n      Kov\u00e1cs\n      \n  \n  . \n  Mechanism design for fractional scheduling on unrelated machines. In L. Arge C. Cachin T. Jurdzinski and A. Tarlecki editors ICALP volume \n  4596\n   of \n  Lecture Notes in Computer Science pages \n  40\n  --\n  52\n  . \n  Springer 2007\n  .   G. Christodoulou E. Koutsoupias and A. Kov\u00e1cs. Mechanism design for fractional scheduling on unrelated machines. In L. Arge C. Cachin T. Jurdzinski and A. Tarlecki editors ICALP volume 4596 of Lecture Notes in Computer Science pages 40--52. Springer 2007.","DOI":"10.1007\/978-3-540-73420-8_6"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"E.H. Clarke. Multipart pricing of public goods. Public Choice 11(1) September 1971.  E.H. Clarke. Multipart pricing of public goods. Public Choice 11(1) September 1971.","DOI":"10.1007\/BF01726210"},{"key":"e_1_3_2_1_17_1","unstructured":"B. Cohen. Incentives build robustness in bittorrent. NA 2003.  B. Cohen. Incentives build robustness in bittorrent. NA 2003."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.30"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990062"},{"key":"e_1_3_2_1_20_1","volume-title":"Bantam Books","author":"Earley P.","year":"1988"},{"key":"e_1_3_2_1_21_1","volume-title":"Food and Rural Affairs","author":"Erwin P.","year":"2007"},{"key":"e_1_3_2_1_22_1","first-page":"53","volume-title":"ACSW Frontiers","volume":"32","author":"Evered M.","year":"2004"},{"key":"e_1_3_2_1_23_1","volume-title":"UCSB","author":"Garratt R.","year":"2004"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1373290.1373306"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1086\/261868"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.2307\/1914085"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.162.3859.1243"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/53146.53147"},{"key":"e_1_3_2_1_31_1","volume-title":"Fourth Nordic Workshop on Secure Computer Systems (NORDSEC'99)","author":"Josang A.","year":"1999"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000831"},{"key":"e_1_3_2_1_33_1","volume-title":"Maryland University Department of Computer Science and Electrical Engineering","author":"Kagal L.","year":"2005"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.2307\/2234706"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"e_1_3_2_1_36_1","unstructured":"Knowledge@Wharton. How we got into the subprime lending mess September 19 2007. http:\/\/knowledge.wharton.upenn.edu\/article.cfm?articleid=1812#.  Knowledge@Wharton. How we got into the subprime lending mess September 19 2007. http:\/\/knowledge.wharton.upenn.edu\/article.cfm?articleid=1812#."},{"key":"e_1_3_2_1_37_1","unstructured":"Knowledge@Wharton. Victimizing the borrowers: Predatory lending's role in the subprime mortgage crisis February 20 2008. http:\/\/knowledge.wharton.upenn.edu\/article.cfm?articleid=1901&CFID=66192274&CFTOKEN=98696674&jsessionid=a83075bc94e55b3352f5  Knowledge@Wharton. Victimizing the borrowers: Predatory lending's role in the subprime mortgage crisis February 20 2008. http:\/\/knowledge.wharton.upenn.edu\/article.cfm?articleid=1901&CFID=66192274&CFTOKEN=98696674&jsessionid=a83075bc94e55b3352f5"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/775265.775268"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250910.1250947"},{"key":"e_1_3_2_1_40_1","unstructured":"N. Li and J. Mitchell. Rt: A role-based trust-management framework 2003.  N. Li and J. Mitchell. Rt: A role-based trust-management framework 2003."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005686.1005711"},{"key":"e_1_3_2_1_42_1","volume-title":"UCLA Department of Economics","author":"Makowski L.","year":"1984"},{"key":"e_1_3_2_1_43_1","first-page":"106","volume-title":"Harvard Business Review","author":"Malone T.W.","year":"2004"},{"key":"e_1_3_2_1_44_1","unstructured":"D. McAdams. Storage in internal markets. http:\/\/www.mit.edu\/~mcadams\/papers\/im\/storage.pdf 2005.  D. McAdams. Storage in internal markets. http:\/\/www.mit.edu\/~mcadams\/papers\/im\/storage.pdf 2005."},{"key":"e_1_3_2_1_46_1","unstructured":"R.P. McAfee. Introduction to Economic Analysis. 2006.  R.P. McAfee. Introduction to Economic Analysis. 2006."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.104"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.41"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344300"},{"key":"e_1_3_2_1_50_1","first-page":"332","volume-title":"Proceedings of the 2nd International Workshop on Security In Information Systems (WOSIS)","author":"Nissanke N.","year":"2004"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/1139711.1648682"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1070.0384"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","unstructured":"A. Smith. An Inquiry into the Nature and Causes of the Wealth of Nations. 1776.  A. Smith. An Inquiry into the Nature and Causes of the Wealth of Nations. 1776.","DOI":"10.1093\/oseo\/instance.00043218"},{"key":"e_1_3_2_1_54_1","volume-title":"Computing Research Association","author":"Spafford E.H.","year":"2003"},{"key":"e_1_3_2_1_55_1","volume-title":"Princeton University Press","author":"Sunder S.","year":"1995"},{"key":"e_1_3_2_1_56_1","volume-title":"GlassHouse Technologies","author":"Tallon P.P.","year":"2003"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"C. Thorpe and D.C. Parkes. Cryptographic securities exchanges. Financial Cryptography and Data Security (FC07) February 2007.  C. Thorpe and D.C. Parkes. Cryptographic securities exchanges. Financial Cryptography and Data Security (FC07) February 2007.","DOI":"10.1007\/978-3-540-77366-5_16"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6261.1961.tb02789.x"},{"key":"e_1_3_2_1_59_1","volume-title":"Atlantic Monthly Press","author":"Vise D.A.","year":"2002"},{"key":"e_1_3_2_1_60_1","unstructured":"G. Wearden. The biggest rogue traders in history. January 24 2008. http:\/\/www.guardian.co.uk\/business\/2008\/jan\/24\/europeanbanks.banking  G. Wearden. The biggest rogue traders in history. January 24 2008. http:\/\/www.guardian.co.uk\/business\/2008\/jan\/24\/europeanbanks.banking"},{"key":"e_1_3_2_1_61_1","unstructured":"R.J. Woolsey. The Aldrich H. Ames case: An assessment of CIA's role in identifying Ames as an intelligence penetration of the agency October 21 1994. http:\/\/www.loyola.edu\/dept\/politics\/intel\/hitzrept.html  R.J. Woolsey. The Aldrich H. Ames case: An assessment of CIA's role in identifying Ames as an intelligence penetration of the agency October 21 1994. http:\/\/www.loyola.edu\/dept\/politics\/intel\/hitzrept.html"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/646631.699459"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/288994.289032"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373289"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507731"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2006.36"}],"event":{"name":"NSPW '08: 2008 New Security Paradigms Workshop","location":"Lake Tahoe California USA","acronym":"NSPW '08","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2008 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1595676.1595694","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1595676.1595694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:04Z","timestamp":1750249084000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1595676.1595694"}},"subtitle":["using markets to improve access control"],"short-title":[],"issued":{"date-parts":[[2008,9,22]]},"references-count":64,"alternative-id":["10.1145\/1595676.1595694","10.1145\/1595676"],"URL":"https:\/\/doi.org\/10.1145\/1595676.1595694","relation":{},"subject":[],"published":{"date-parts":[[2008,9,22]]},"assertion":[{"value":"2008-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}