{"id":"https://openalex.org/W2164416011","doi":"https://doi.org/10.1109/icect.2004.1319741","title":"Algorithms for automated negotiations and their applications in information privacy","display_name":"Algorithms for automated negotiations and their applications in information privacy","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2164416011","doi":"https://doi.org/10.1109/icect.2004.1319741","mag":"2164416011"},"language":"en","primary_location":{"id":"doi:10.1109/icect.2004.1319741","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icect.2004.1319741","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027666710","display_name":"Haifei Li","orcid":"https://orcid.org/0000-0002-3630-4618"},"institutions":[{"id":"https://openalex.org/I20350369","display_name":"Nyack College","ror":"https://ror.org/04gbjf340","country_code":"US","type":"education","lineage":["https://openalex.org/I20350369"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Haifei Li","raw_affiliation_strings":["Department of Computer Science, Nyack College, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Nyack College, USA","institution_ids":["https://openalex.org/I20350369"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066067215","display_name":"David Ahn","orcid":"https://orcid.org/0000-0002-8941-8459"},"institutions":[{"id":"https://openalex.org/I20350369","display_name":"Nyack College","ror":"https://ror.org/04gbjf340","country_code":"US","type":"education","lineage":["https://openalex.org/I20350369"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"D. Ahn","raw_affiliation_strings":["Department of Computer Science, Nyack College, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Nyack College, USA","institution_ids":["https://openalex.org/I20350369"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065705195","display_name":"Patrick C. K. Hung","orcid":"https://orcid.org/0000-0002-9903-4862"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"P.C.K. Hung","raw_affiliation_strings":["Department of Computer Science, Hong Kong University of Science and Technology, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Hong Kong University of Science and Technology, Hong Kong, China","institution_ids":["https://openalex.org/I200769079"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027666710"],"corresponding_institution_ids":["https://openalex.org/I20350369"],"apc_list":null,"apc_paid":null,"fwci":0.9251,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.82537403,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"13","issue":null,"first_page":"255","last_page":"262"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10456","display_name":"Multi-Agent Systems and Negotiation","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10456","display_name":"Multi-Agent Systems and Negotiation","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11010","display_name":"Logic, Reasoning, and Knowledge","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8094837665557861},{"id":"https://openalex.org/keywords/negotiation","display_name":"Negotiation","score":0.7592833042144775},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5592775940895081},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.5542536973953247},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5085748434066772},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.5082473158836365},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4778701663017273},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4532528817653656},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.418010950088501},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39709994196891785},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.07646656036376953}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8094837665557861},{"id":"https://openalex.org/C199776023","wikidata":"https://www.wikidata.org/wiki/Q202875","display_name":"Negotiation","level":2,"score":0.7592833042144775},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5592775940895081},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.5542536973953247},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5085748434066772},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.5082473158836365},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4778701663017273},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4532528817653656},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.418010950088501},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39709994196891785},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.07646656036376953},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icect.2004.1319741","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icect.2004.1319741","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.44999998807907104,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W123427299","https://openalex.org/W198043383","https://openalex.org/W576982666","https://openalex.org/W1505817364","https://openalex.org/W1517353944","https://openalex.org/W1522524128","https://openalex.org/W1534289676","https://openalex.org/W1537351552","https://openalex.org/W1539468430","https://openalex.org/W1552593222","https://openalex.org/W1554291173","https://openalex.org/W1557659156","https://openalex.org/W1570748508","https://openalex.org/W1674363625","https://openalex.org/W2057094203","https://openalex.org/W2064152189","https://openalex.org/W2121353282","https://openalex.org/W2121467820","https://openalex.org/W2148075939","https://openalex.org/W2153927757","https://openalex.org/W2491045064","https://openalex.org/W4238317525","https://openalex.org/W6630614573","https://openalex.org/W6631304281","https://openalex.org/W6633214509","https://openalex.org/W6637236396","https://openalex.org/W6682959570"],"related_works":["https://openalex.org/W2596305496","https://openalex.org/W2172222246","https://openalex.org/W118448456","https://openalex.org/W2083944649","https://openalex.org/W2260680879","https://openalex.org/W2997789329","https://openalex.org/W2050283318","https://openalex.org/W2290534421","https://openalex.org/W4309503015","https://openalex.org/W1548444773"],"abstract_inverted_index":{"Automated":[0],"negotiations":[1],"have":[2,54,61,119,159,184],"been":[3,55,62,120,216],"an":[4,80],"active":[5],"research":[6,14],"topic":[7],"for":[8,32,46,103,128,134],"many":[9],"years.":[10],"Most":[11],"of":[12,90,207,222],"the":[13,22,29,100,104,123,140,146,171,180,197,205,220],"work":[15,39],"on":[16,21,28,40],"this":[17,50,193],"area":[18],"focuses":[19],"either":[20],"abstract":[23],"and":[24,42,57],"theoretical":[25],"models":[26],"or":[27],"system":[30],"architectures":[31],"standalone":[33],"negotiation":[34,69,106,118,199,208],"applications.":[35],"There":[36],"is":[37,132,165],"little":[38],"identifying":[41],"studying":[43],"practical":[44],"algorithms":[45,53,95],"automated":[47,105],"negotiations.":[48],"In":[49,108,122,201],"paper,":[51],"two":[52,94],"proposed":[56],"their":[58,113],"innovative":[59],"applications":[60,114],"discussed.":[63],"The":[64,75,162],"first":[65],"algorithm":[66,77],"guarantees":[67,78],"that":[68,79,166],"results":[70],"are":[71],"Pareto":[72],"optimal":[73],"solutions.":[74],"second":[76],"agreement":[81],"can":[82,96,195],"be":[83,97],"agreed":[84],"upon":[85],"after":[86],"a":[87],"certain":[88],"number":[89],"proposal/counterproposal":[91],"exchanges.":[92],"These":[93],"used":[98,217],"in":[99,115,192,209],"two-phase":[101],"model":[102],"process.":[107,200],"addition":[109],"to":[110,137,145,187,203,218],"these":[111],"algorithms,":[112],"information":[116,124,144,156,173,210,214],"privacy":[117,125,198],"described.":[121],"management":[126],"domain":[127],"service":[129,135,147,150,157,167,176,181],"industries,":[130],"it":[131],"critical":[133],"requestors":[136,151],"only":[138],"reveal":[139,188],"absolute":[141],"necessary":[142],"private":[143,155,172],"providers.":[148],"Traditionally,":[149],"usually":[152],"give":[153],"whatever":[154],"providers":[158,168,182],"asked":[160],"for.":[161],"grave":[163],"consequence":[164],"may":[169,183],"misuse":[170],"provided":[174],"by":[175],"requestors,":[177],"even":[178],"though":[179],"promised":[185],"not":[186],"it.":[189],"Algorithms":[190],"described":[191],"paper":[194],"facilitate":[196],"order":[202],"show":[204],"concept":[206],"privacy,":[211],"credit":[212],"card":[213],"has":[215],"illustrate":[219],"application":[221],"algorithms.":[223]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
