{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:05:13Z","timestamp":1730325913582,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","funder":[{"name":"Horizon 2020","award":["871473"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,9]]},"DOI":"10.1145\/3565011.3569057","type":"proceedings-article","created":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T12:08:50Z","timestamp":1669896530000},"page":"15-20","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["KRAKEN"],"prefix":"10.1145","author":[{"given":"Karl","family":"Koch","sequence":"first","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Stephan","family":"Krenn","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Tilen","family":"Marc","sequence":"additional","affiliation":[{"name":"XLAB d.o.o., Ljubljana, Slovenia and University of Ljubljana, Ljubljana, Slovenia"}]},{"given":"Stefan","family":"More","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Sebastian","family":"Ramacher","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2022,12,6]]},"reference":[{"volume-title":"Open Identity Summit (LNI","author":"Alber Lukas","key":"e_1_3_2_1_1_1","unstructured":"Lukas Alber , Stefan More , Sebastian M\u00f6dersheim , and Anders Schlichtkrull . 2021. Adapting the TPL Trust Policy Language for a Self-Sovereign Identity World . In Open Identity Summit (LNI , Vol. P-312). Gesellschaft f\u00fcr Informatik e.V., 107-- 118 . Lukas Alber, Stefan More, Sebastian M\u00f6dersheim, and Anders Schlichtkrull. 2021. Adapting the TPL Trust Policy Language for a Self-Sovereign Identity World. In Open Identity Summit (LNI, Vol. P-312). Gesellschaft f\u00fcr Informatik e.V., 107--118."},{"key":"e_1_3_2_1_2_1","unstructured":"Alexandra Institute. 2022. FRESCO - A FRamework for Efficient Secure COmputation. https:\/\/github.com\/aicis\/fresco. Alexandra Institute. 2022. FRESCO - A FRamework for Efficient Secure COmputation. https:\/\/github.com\/aicis\/fresco."},{"key":"e_1_3_2_1_3_1","unstructured":"Abdelrahaman Aly Karl Cong Daniele Cozzo Marcel Keller Emmanuela Orsini Dragos Rotaru Oliver Scherer Peter Scholl Nigel P. Smart Titouan Tanguy and Tim Wood. 2021. SCALE-MAMBA v1.14: Documentation. https:\/\/homes.esat.kuleuven.be\/~nsmart\/SCALE\/Documentation-SCALE.pdf Abdelrahaman Aly Karl Cong Daniele Cozzo Marcel Keller Emmanuela Orsini Dragos Rotaru Oliver Scherer Peter Scholl Nigel P. Smart Titouan Tanguy and Tim Wood. 2021. SCALE-MAMBA v1.14: Documentation. https:\/\/homes.esat.kuleuven.be\/~nsmart\/SCALE\/Documentation-SCALE.pdf"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14778\/3055330.3055334"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0177-2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_22"},{"key":"e_1_3_2_1_7_1","volume-title":"Rosetta: A Privacy-Preserving Framework Based on TensorFlow. https:\/\/github.com\/LatticeX-Foundation\/Rosetta.","author":"Chen Yuanfeng","year":"2020","unstructured":"Yuanfeng Chen , Gaofeng Huang , Junjie Shi , Xiang Xie , and Yilin Yan . 2020 . Rosetta: A Privacy-Preserving Framework Based on TensorFlow. https:\/\/github.com\/LatticeX-Foundation\/Rosetta. Yuanfeng Chen, Gaofeng Huang, Junjie Shi, Xiang Xie, and Yilin Yan. 2020. Rosetta: A Privacy-Preserving Framework Based on TensorFlow. https:\/\/github.com\/LatticeX-Foundation\/Rosetta."},{"key":"e_1_3_2_1_8_1","unstructured":"Cloudflare. 2022. bn256. https:\/\/github.com\/cloudflare\/bn256. Cloudflare. 2022. bn256. https:\/\/github.com\/cloudflare\/bn256."},{"key":"e_1_3_2_1_9_1","unstructured":"Cybernetica. 2020. Sharemind MPC. https:\/\/sharemind.cyber.ee\/sharemind-mpc\/. Cybernetica. 2020. Sharemind MPC. https:\/\/sharemind.cyber.ee\/sharemind-mpc\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0115-7"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_7"},{"key":"e_1_3_2_1_12_1","unstructured":"Duality Technologies Inc. 2020. Duality. https:\/\/dualitytech.com\/. Duality Technologies Inc. 2020. Duality. https:\/\/dualitytech.com\/."},{"volume-title":"PerCom","author":"Duan Huayi","key":"e_1_3_2_1_13_1","unstructured":"Huayi Duan , Yifeng Zheng , Yuefeng Du , Anxin Zhou , Cong Wang , and Man Ho Au. 2019. Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization . In PerCom . IEEE , 1--10. Huayi Duan, Yifeng Zheng, Yuefeng Du, Anxin Zhou, Cong Wang, and Man Ho Au. 2019. Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization. In PerCom. IEEE, 1--10."},{"volume-title":"Security and Management","author":"Elzouka Hesham","key":"e_1_3_2_1_14_1","unstructured":"Hesham Elzouka and Fatma Zada . 2007. A Survey on Digital Watermarking Technologies . In Security and Management . CSREA Press , 342--349. Hesham Elzouka and Fatma Zada. 2007. A Survey on Digital Watermarking Technologies. In Security and Management. CSREA Press, 342--349."},{"key":"e_1_3_2_1_15_1","volume-title":"About the Framingham Heart Study. https:\/\/www.framinghamheartstudy.org\/fhs-about\/ Accessed September 24th","author":"Study Framingham Heart","year":"2022","unstructured":"Framingham Heart Study . 2022. About the Framingham Heart Study. https:\/\/www.framinghamheartstudy.org\/fhs-about\/ Accessed September 24th , 2022 . Framingham Heart Study. 2022. About the Framingham Heart Study. https:\/\/www.framinghamheartstudy.org\/fhs-about\/ Accessed September 24th, 2022."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_1_17_1","volume-title":"Sarvar Patel, Shobhit Saxena, Karn Seth, Mariana Raykova, David Shanahan, and Moti Yung.","author":"Ion Mihaela","year":"2020","unstructured":"Mihaela Ion , Ben Kreuter , Ahmet Erhan Nergiz , Sarvar Patel, Shobhit Saxena, Karn Seth, Mariana Raykova, David Shanahan, and Moti Yung. 2020 . On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality. In EuroS&P. IEEE , 370--389. Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, Mariana Raykova, David Shanahan, and Moti Yung. 2020. On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality. In EuroS&P. IEEE, 370--389."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08177-w"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_2_1_20_1","volume-title":"Privacy and Identity Management (IFIP Advances in Information and Communication Technology","volume":"246","author":"Koch Karl","year":"2020","unstructured":"Karl Koch , Stephan Krenn , Donato Pellegrino , and Sebastian Ramacher . 2020 . Privacy-Preserving Analytics for Data Markets Using MPC . In Privacy and Identity Management (IFIP Advances in Information and Communication Technology , Vol. 619). Springer, 226-- 246 . Karl Koch, Stephan Krenn, Donato Pellegrino, and Sebastian Ramacher. 2020. Privacy-Preserving Analytics for Data Markets Using MPC. In Privacy and Identity Management (IFIP Advances in Information and Communication Technology, Vol. 619). Springer, 226--246."},{"key":"e_1_3_2_1_21_1","volume-title":"Agora: A Privacy-aware Data Marketplace","author":"Koutsos Vlasis","year":"2020","unstructured":"Vlasis Koutsos , Dimitrios Papadopoulos , Dimitris Chatzopoulos , Sasu Tarkoma , and Pan Hui . 2020 . Agora: A Privacy-aware Data Marketplace . In ICDCS. IEEE , 1211--1212. Vlasis Koutsos, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Sasu Tarkoma, and Pan Hui. 2020. Agora: A Privacy-aware Data Marketplace. In ICDCS. IEEE, 1211--1212."},{"key":"e_1_3_2_1_22_1","volume-title":"Big Data and Tokenization. In ICICS (LNCS","volume":"261","author":"Shing Liu Paul Tak","year":"2016","unstructured":"Paul Tak Shing Liu . 2016 . Medical Record System Using Blockchain , Big Data and Tokenization. In ICICS (LNCS , Vol. 9977). Springer, 254-- 261 . Paul Tak Shing Liu. 2016. Medical Record System Using Blockchain, Big Data and Tokenization. In ICICS (LNCS, Vol. 9977). Springer, 254--261."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Thomas Lor\u00fcnser Florian Wohner and Stephan Krenn. 2022. A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing. In ICISSP. SCITEPRESS 637--647. Thomas Lor\u00fcnser Florian Wohner and Stephan Krenn. 2022. A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing. In ICISSP. SCITEPRESS 637--647.","DOI":"10.5220\/0011006700003120"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560810.3564263"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.062"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33716-2_16"},{"key":"e_1_3_2_1_27_1","first-page":"1","article-title":"YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC","volume":"137","author":"More Stefan","year":"2022","unstructured":"Stefan More and Lukas Alber . 2022 . YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC . In ARES. ACM , 137 : 1 -- 137 :8. Stefan More and Lukas Alber. 2022. YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC. In ARES. ACM, 137:1--137:8.","journal-title":"ARES. ACM"},{"key":"e_1_3_2_1_28_1","volume-title":"TrustCom","author":"More Stefan","year":"2022","unstructured":"Stefan More , Sebastian Ramacher , Lukas Alber , and Marco Herzl . 2022. Extending Expressive Access Policies with Privacy Features . In TrustCom 2022 . to appear. Stefan More, Sebastian Ramacher, Lukas Alber, and Marco Herzl. 2022. Extending Expressive Access Policies with Privacy Features. In TrustCom 2022. to appear."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2822727"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220013"},{"volume-title":"IDMoB: IoT Data Marketplace on Blockchain","author":"Ozyilmaz Kazim Rifat","key":"e_1_3_2_1_31_1","unstructured":"Kazim Rifat Ozyilmaz , Mehmet Dogan , and Arda Yurdakul . 2018. IDMoB: IoT Data Marketplace on Blockchain . In CVCBT. IEEE , 11--19. Kazim Rifat Ozyilmaz, Mehmet Dogan, and Arda Yurdakul. 2018. IDMoB: IoT Data Marketplace on Blockchain. In CVCBT. IEEE, 11--19."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1504\/ijcse.2020.111432"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1108\/LHT-06-2017-0131"},{"key":"e_1_3_2_1_36_1","unstructured":"TF Encrypted. 2022. Moose. https:\/\/github.com\/tf-encrypted\/moose. TF Encrypted. 2022. Moose. https:\/\/github.com\/tf-encrypted\/moose."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"e_1_3_2_1_38_1","volume-title":"Aurojit Panda, and Ion Stoica.","author":"Zheng Wenting","year":"2021","unstructured":"Wenting Zheng , Ryan Deng , Weikeng Chen , Raluca Ada Popa , Aurojit Panda, and Ion Stoica. 2021 . Cerebro : A Platform for Multi-Party Cryptographic Collaborative Learning. In USENIX Security 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association , 2723--2740. Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, and Ion Stoica. 2021. Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning. In USENIX Security 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 2723--2740."}],"event":{"name":"CoNEXT '22: The 18th International Conference on emerging Networking EXperiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Rome Italy","acronym":"CoNEXT '22"},"container-title":["Proceedings of the 1st International Workshop on Data Economy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3565011.3569057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T16:16:28Z","timestamp":1673453788000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3565011.3569057"}},"subtitle":["a privacy-preserving data market for authentic data"],"short-title":[],"issued":{"date-parts":[[2022,12,6]]},"references-count":38,"alternative-id":["10.1145\/3565011.3569057","10.1145\/3565011"],"URL":"https:\/\/doi.org\/10.1145\/3565011.3569057","relation":{},"subject":[],"published":{"date-parts":[[2022,12,6]]},"assertion":[{"value":"2022-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}