{"id":"https://openalex.org/W1597888167","doi":"https://doi.org/10.3233/jcs-2012-0453","title":"A trust-augmented voting scheme for collaborative privacy management","display_name":"A trust-augmented voting scheme for collaborative privacy management","publication_year":2012,"publication_date":"2012-09-28","ids":{"openalex":"https://openalex.org/W1597888167","doi":"https://doi.org/10.3233/jcs-2012-0453","mag":"1597888167"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-2012-0453","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2012-0453","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://orbilu.uni.lu/handle/10993/203","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100580376","display_name":"Yanjie Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Yanjie Sun","raw_affiliation_strings":["Faculty of Science, Technology and Communication, University of Luxembourg, Luxembourg","[Faculty of Science Technology and Communication, University of Luxembourg, Luxembourg]"],"affiliations":[{"raw_affiliation_string":"Faculty of Science, Technology and Communication, University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"[Faculty of Science Technology and Communication, University of Luxembourg, Luxembourg]","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054109702","display_name":"Chenyi Zhang","orcid":"https://orcid.org/0000-0002-3054-5883"},"institutions":[{"id":"https://openalex.org/I165143802","display_name":"University of Queensland","ror":"https://ror.org/00rqy9422","country_code":"AU","type":"education","lineage":["https://openalex.org/I165143802"]},{"id":"https://openalex.org/I160993911","display_name":"Queensland University of Technology","ror":"https://ror.org/03pnv4752","country_code":"AU","type":"education","lineage":["https://openalex.org/I160993911"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chenyi Zhang","raw_affiliation_strings":["School of Information Technology and Electrical Engineering, University of Queensland, Brisbane, Australia","School of Information Technology and Electrical Engineering , University of Queensland , Brisbane , Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Electrical Engineering, University of Queensland, Brisbane, Australia","institution_ids":["https://openalex.org/I160993911","https://openalex.org/I165143802"]},{"raw_affiliation_string":"School of Information Technology and Electrical Engineering , University of Queensland , Brisbane , Australia","institution_ids":["https://openalex.org/I165143802"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073684178","display_name":"Jun Pang","orcid":"https://orcid.org/0000-0002-4521-4112"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Jun Pang","raw_affiliation_strings":["Faculty of Science, Technology and Communication, University of Luxembourg, Luxembourg","[Faculty of Science Technology and Communication, University of Luxembourg, Luxembourg]"],"affiliations":[{"raw_affiliation_string":"Faculty of Science, Technology and Communication, University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"[Faculty of Science Technology and Communication, University of Luxembourg, Luxembourg]","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043978804","display_name":"Baptiste Alcalde","orcid":null},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Baptiste Alcalde","raw_affiliation_strings":["Faculty of Science, Technology and Communication, University of Luxembourg, Luxembourg","[Faculty of Science Technology and Communication, University of Luxembourg, Luxembourg]"],"affiliations":[{"raw_affiliation_string":"Faculty of Science, Technology and Communication, University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"[Faculty of Science Technology and Communication, University of Luxembourg, Luxembourg]","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024602195","display_name":"Sjouke Mauw","orcid":"https://orcid.org/0000-0002-2818-4433"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Sjouke Mauw","raw_affiliation_strings":["Faculty of Science, Technology and Communication, University of Luxembourg, Luxembourg","Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg","Faculty of Science, Technology and Communication, University of Luxembourg, Luxembourg and Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg#TAB#"],"affiliations":[{"raw_affiliation_string":"Faculty of Science, Technology and Communication, University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Faculty of Science, Technology and Communication, University of Luxembourg, Luxembourg and Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg#TAB#","institution_ids":["https://openalex.org/I186903577"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5073684178"],"corresponding_institution_ids":["https://openalex.org/I186903577"],"apc_list":null,"apc_paid":null,"fwci":4.8619,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.94742759,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"20","issue":"4","first_page":"437","last_page":"459"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/voting","display_name":"Voting","score":0.7721236944198608},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.746372640132904},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.742498517036438},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7139698266983032},{"id":"https://openalex.org/keywords/condorcet-method","display_name":"Condorcet method","score":0.5974551439285278},{"id":"https://openalex.org/keywords/electronic-voting","display_name":"Electronic voting","score":0.521644651889801},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5158880949020386},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4808152914047241},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.43947434425354004},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.43816107511520386},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.21690323948860168},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13374346494674683},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.0969725251197815},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09636086225509644},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.07219746708869934}],"concepts":[{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.7721236944198608},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.746372640132904},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.742498517036438},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7139698266983032},{"id":"https://openalex.org/C140940377","wikidata":"https://www.wikidata.org/wiki/Q868720","display_name":"Condorcet method","level":4,"score":0.5974551439285278},{"id":"https://openalex.org/C2780612046","wikidata":"https://www.wikidata.org/wiki/Q926161","display_name":"Electronic voting","level":4,"score":0.521644651889801},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5158880949020386},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4808152914047241},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.43947434425354004},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.43816107511520386},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.21690323948860168},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13374346494674683},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0969725251197815},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09636086225509644},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.07219746708869934},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3233/jcs-2012-0453","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2012-0453","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:espace.library.uq.edu.au:UQ:296943","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402388","display_name":"Queensland's institutional digital repository (The University of Queensland)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I165143802","host_organization_name":"The University of Queensland","host_organization_lineage":["https://openalex.org/I165143802"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"},{"id":"pmh:oai:orbilu.uni.lu:10993/203","is_oa":true,"landing_page_url":"http://orbilu.uni.lu/handle/10993/203","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proc. 6th International Workshop on Security and Trust Management, 132-146 (2011); 6th International Workshop on Security and Trust Management, Greece [GR], 2010","raw_type":"peer reviewed"},{"id":"pmh:oai:orbilu.uni.lu:10993/217","is_oa":true,"landing_page_url":"https://orbilu.uni.lu/handle/10993/217","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Computer Security, 20(4), 437-459. IOS Press (2012).","raw_type":null}],"best_oa_location":{"id":"pmh:oai:orbilu.uni.lu:10993/203","is_oa":true,"landing_page_url":"http://orbilu.uni.lu/handle/10993/203","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proc. 6th International Workshop on Security and Trust Management, 132-146 (2011); 6th International Workshop on Security and Trust Management, Greece [GR], 2010","raw_type":"peer reviewed"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W28259210","https://openalex.org/W1499405354","https://openalex.org/W1501876556","https://openalex.org/W1502787543","https://openalex.org/W1508524832","https://openalex.org/W1547033387","https://openalex.org/W1553259358","https://openalex.org/W1597888167","https://openalex.org/W1796177958","https://openalex.org/W1976126576","https://openalex.org/W1987710704","https://openalex.org/W2000851114","https://openalex.org/W2013372570","https://openalex.org/W2016563917","https://openalex.org/W2016963000","https://openalex.org/W2051834357","https://openalex.org/W2075302193","https://openalex.org/W2091858563","https://openalex.org/W2099556653","https://openalex.org/W2104661673","https://openalex.org/W2108710747","https://openalex.org/W2110522107","https://openalex.org/W2120100612","https://openalex.org/W2140897975","https://openalex.org/W2160005047","https://openalex.org/W2164414844","https://openalex.org/W2174778218","https://openalex.org/W2187227682","https://openalex.org/W2318031348","https://openalex.org/W2324341692","https://openalex.org/W2799121301","https://openalex.org/W4247276114"],"related_works":["https://openalex.org/W3122612858","https://openalex.org/W3142750683","https://openalex.org/W2980481925","https://openalex.org/W4311463983","https://openalex.org/W3108317354","https://openalex.org/W4297573717","https://openalex.org/W1596100069","https://openalex.org/W4283692793","https://openalex.org/W4321843854","https://openalex.org/W157440325"],"abstract_inverted_index":{"Social":[0],"networking":[1],"sites":[2,21],"have":[3],"sprung":[4],"up":[5],"and":[6,75,91,103],"become":[7],"a":[8,25],"hot":[9],"issue":[10],"of":[11,16,27,55,86,112],"current":[12],"society.":[13],"In":[14,43],"spite":[15],"the":[17,53,110],"fact":[18],"that":[19],"these":[20],"provide":[22],"users":[23],"with":[24,78],"variety":[26],"attractive":[28],"features,":[29],"much":[30],"to":[31,38,95],"users'":[32,40],"dismay,":[33],"however,":[34],"they":[35],"are":[36,101],"prone":[37],"expose":[39],"private":[41],"information.":[42],"this":[44],"paper,":[45],"we":[46],"propose":[47],"an":[48],"approach":[49,68],"whi":[50],"ch":[51],"addresses":[52],"problem":[54],"collaboratively":[56],"deciding":[57],"privacy":[58],"policies":[59],"for,":[60],"but":[61],"not":[62],"limited":[63],"to,":[64],"shared":[65],"photos.":[66],"Our":[67,99],"utilizes":[69],"trust":[70],"relations":[71],"in":[72],"social":[73],"networks":[74],"combines":[76],"them":[77],"Condorcet's":[79],"preferential":[80],"voting":[81,89,115],"scheme.":[82,116],"We":[83],"study":[84],"properties":[85],"our":[87,113],"trust-augmented":[88,114],"scheme":[90],"develop":[92],"two":[93],"approximations":[94],"improve":[96],"its":[97],"efficiency.":[98],"algorithms":[100],"compared":[102],"justified":[104],"by":[105],"experimental":[106],"results,":[107],"which":[108],"support":[109],"usability":[111]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
