{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:22Z","timestamp":1750306282208,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[1998,10,28]],"date-time":"1998-10-28T00:00:00Z","timestamp":909532800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[1998,10,28]]},"DOI":"10.1145\/288994.289032","type":"proceedings-article","created":{"date-parts":[[2004,2,5]],"date-time":"2004-02-05T15:55:35Z","timestamp":1075996535000},"page":"181-190","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["MarketNet"],"prefix":"10.1145","author":[{"given":"Y.","family":"Yemini","sequence":"first","affiliation":[{"name":"Columbia Univ., New York, NY"}]},{"given":"A.","family":"Dailianas","sequence":"additional","affiliation":[{"name":"Columbia Univ., New York, NY"}]},{"given":"D.","family":"Florissi","sequence":"additional","affiliation":[{"name":"Columbia Univ., New York, NY"}]},{"given":"G.","family":"Huberman","sequence":"additional","affiliation":[{"name":"Columbia Univ., New York, NY"}]}],"member":"320","published-online":{"date-parts":[[1998,10,28]]},"reference":[{"key":"e_1_3_2_1_1_2","volume-title":"Market-based Control of Distributed Systems,\" World Scientific Press","author":"Clearwater S.","year":"1996","unstructured":"Clearwater , S. , editor. \" Market-based Control of Distributed Systems,\" World Scientific Press , 1996 . Clearwater, S., editor. \"Market-based Control of Distributed Systems,\" World Scientific Press, 1996."},{"key":"e_1_3_2_1_2_2","unstructured":"Dailianas A. and Y. Yemini \"A Protocol for Secure Financial Transactions \" Paper in Preparation.  Dailianas A. and Y. Yemini \"A Protocol for Secure Financial Transactions \" Paper in Preparation."},{"volume-title":"Hull, .l.C. \"Options, Futures, and Other Derivatives,\"","key":"e_1_3_2_1_3_2","unstructured":"Hull, .l.C. \"Options, Futures, and Other Derivatives,\" third edition, Prentice Hail . Hull, .l.C. \"Options, Futures, and Other Derivatives,\" third edition, Prentice Hail."},{"key":"e_1_3_2_1_4_2","volume-title":"Of the 5th International Conference on Distributed Computer Systems","author":"Kurose J.","year":"1995","unstructured":"Kurose , J. , M. Schwartz , and Y. Yemini \". 4 Microeconomic Approach to Optimization of Channel Access Policies in Multiaccess Networks,\" Proe . Of the 5th International Conference on Distributed Computer Systems , Denver, Colorado , 1995 . Kurose, J., M. Schwartz, and Y. Yemini \".4 Microeconomic Approach to Optimization of Channel Access Policies in Multiaccess Networks,\" Proe. Of the 5th International Conference on Distributed Computer Systems, Denver, Colorado, 1995."},{"key":"e_1_3_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.5555\/267962.267966"},{"key":"e_1_3_2_1_6_2","volume-title":"ACM","author":"MacKie-Mason J.","year":"1993","unstructured":"MacKie-Mason , J. , and H. Varian \"Pricing the Internet,\" in B. Kahin and J. Keller , editors, Public Access to the rnternet , ACM , Boston, Massachusetts , May 1993 . MacKie-Mason, J., and H. Varian \"Pricing the Internet,\" in B. Kahin and J. Keller, editors, Public Access to the rnternet, ACM, Boston, Massachusetts, May 1993."},{"key":"e_1_3_2_1_7_2","volume-title":"Proc. of the Conference on Computer Communications","author":"Saimmesh J.","year":"1995","unstructured":"Saimmesh , J. , D. Ferguson , and Y. Yemini \"An Approach to Pricing, Optimal Allocation and Quality of Sen#ce Provisioning in High-speed Packet 2Vetworks,\"in Proc. of the Conference on Computer Communications , Boston, Massachusetts , April 1995 . Saimmesh, J., D. Ferguson, and Y. Yemini \"An Approach to Pricing, Optimal Allocation and Quality of Sen#ce Provisioning in High-speed Packet 2Vetworks,\"in Proc. of the Conference on Computer Communications, Boston, Massachusetts, April 1995."},{"first-page":"139","volume-title":"Schneier, B. \"Applied Cryptography,\"","key":"e_1_3_2_1_8_2","unstructured":"Schneier, B. \"Applied Cryptography,\" second edition, John Wiley & amp; Sons, pp. 139 - 147 . Schneier, B. \"Applied Cryptography,\" second edition, John Wiley &amp; Sons, pp. 139-147."},{"key":"e_1_3_2_1_9_2","volume-title":"Department of Computer Sciences","author":"Spafford E.","year":"1991","unstructured":"Spafford , E. \"'The lnternet Worm IncidenC\" Technical Report CSD-TR-933 , Department of Computer Sciences , Purdue University , Sept. 19, 1991 . Spafford, E. \"'The lnternet Worm IncidenC\" Technical Report CSD-TR-933, Department of Computer Sciences, Purdue University, Sept. 19, 1991."},{"key":"e_1_3_2_1_10_2","volume-title":"of the 8th I.utemational Conference on Distributed Computing Systems (ICDCS-98)","author":"Walsh W.","year":"1998","unstructured":"Walsh , W. , M. Wellman , P. Wmanan , and J. MacKie - Mason \"Some Economics of Market-Based Distributed Scheduling,\" In Proe. of the 8th I.utemational Conference on Distributed Computing Systems (ICDCS-98) , Amsterdam , the Netherlands , May 1998 . Walsh, W., M. Wellman, P. Wmanan, and J. MacKie- Mason \"Some Economics of Market-Based Distributed Scheduling,\" In Proe. of the 8th I.utemational Conference on Distributed Computing Systems (ICDCS-98), Amsterdam, the Netherlands, May 1998."},{"key":"e_1_3_2_1_11_2","first-page":"281","volume-title":"Proc. of the 20# IEEE Conference on Decision and Control","author":"Yemini Y.","year":"1981","unstructured":"Yemini , Y. \"Selfish Optimization in Computer Networks,\" Proc. of the 20# IEEE Conference on Decision and Control , pp. 281 - 285 , San Diego, CA., Dee. 1981 . Yemini, Y. \"Selfish Optimization in Computer Networks,\" Proc. of the 20# IEEE Conference on Decision and Control, pp. 281-285, San Diego, CA., Dee. 1981."}],"event":{"name":"ICE98: First International Conference on Information and Computation Economies","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","IBM (IAC) IBM Institute for Advanced Commerce","SIGIR ACM Special Interest Group on Information Retrieval","SIGLINK Hypertext, Hypermedia, and Web"],"location":"Charleston South Carolina USA","acronym":"ICE98"},"container-title":["Proceedings of the first international conference on Information and computation economies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/288994.289032","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/288994.289032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:55Z","timestamp":1750221535000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/288994.289032"}},"subtitle":["market-based protection of information systems"],"short-title":[],"issued":{"date-parts":[[1998,10,28]]},"references-count":11,"alternative-id":["10.1145\/288994.289032","10.1145\/288994"],"URL":"https:\/\/doi.org\/10.1145\/288994.289032","relation":{},"subject":[],"published":{"date-parts":[[1998,10,28]]},"assertion":[{"value":"1998-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}