{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:26Z","timestamp":1725558986368},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540262039"},{"type":"electronic","value":"9783540319603"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11423409_17","type":"book-chapter","created":{"date-parts":[[2010,7,7]],"date-time":"2010-07-07T18:30:11Z","timestamp":1278527411000},"page":"256-282","source":"Crossref","is-referenced-by-count":21,"title":["A Formal Privacy System and Its Application to Location Based Services"],"prefix":"10.1007","author":[{"given":"Carl A.","family":"Gunter","sequence":"first","affiliation":[]},{"given":"Michael J.","family":"May","sequence":"additional","affiliation":[]},{"given":"Stuart G.","family":"Stubblebine","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"HR\u00a0122. Wireless telephone spam protection act","key":"17_CR1"},{"unstructured":"HR\u00a071. The wireless privacy protection act","key":"17_CR2"},{"doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings on IEEE Symposium on Security and Privacy (1996)","key":"17_CR3","DOI":"10.1109\/SECPRI.1996.502679"},{"unstructured":"Electronic Privacy\u00a0Information Center and Junkbusters. Pretty poor privacy: An assessment of P3P and internet privacy (2000), http:\/\/www.epic.org\/reports\/prettypoorprivacy.html","key":"17_CR4"},{"unstructured":"Clarke, R.: Platform for Privacy Preferences: A critique (1998), http:\/\/www.anu.edu.au\/people\/Roger.Clarke\/DV\/P3PCrit.html","key":"17_CR5"},{"unstructured":"US\u00a0Dept\u00a0of Health and Human Services. Standards for privacy of individually identiable health information (2002), www.hhs.gov\/ocr\/hipaa\/nalreg.html","key":"17_CR6"},{"issue":"4","key":"17_CR7","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1147\/sj.414.0759","volume":"41","author":"S.E. Fahlman","year":"2002","unstructured":"Fahlman, S.E.: Selling interrupt rights: a way to control unwanted e-mail and telephone calls. IBM Systems Journal\u00a041(4), 759\u2013766 (2002)","journal-title":"IBM Systems Journal"},{"unstructured":"Graham, G.S., Denning, P.J.: Protection: Principles and Practices. In: Proceedings of the AFIPS Spring Joint Computer Conference, pp. 417\u2013429 (1972)","key":"17_CR8"},{"issue":"8","key":"17_CR9","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.H. Harrison","year":"1976","unstructured":"Harrison, M.H., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Communications of the ACM\u00a019(8), 461\u2013471 (1976)","journal-title":"Communications of the ACM"},{"unstructured":"Lampson, B.W.: Protection. In: 5th Princeton Symposium on Information Science and Systems (1971);","key":"#cr-split#-17_CR10.1"},{"doi-asserted-by":"crossref","unstructured":"Reprinted in ACM Operating Systems Review 8(1), 18-24 (1974)","key":"#cr-split#-17_CR10.2","DOI":"10.1145\/775265.775268"},{"unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust management framework. In: Proc. IEEE Symposium on Security and Privacy, Oakland (May 2002)","key":"17_CR11"},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/507711.507722","volume-title":"Proceedings of the seventh ACM symposium on Access control models and technologies","author":"J. Park","year":"2002","unstructured":"Park, J., Sandhu, R.: Towards usage control models: beyond traditional access control. In: Proceedings of the seventh ACM symposium on Access control models and technologies, pp. 57\u201364. ACM Press, New York (2002)"},{"unstructured":"Schulzrinne, H., Morris, J., Tschofenig, H., Cuellar, J., Polk, J.: Policy rules for disclosure and modification of geographic information - draft-ietf-geopriv-policy-00.txt. Work in progress (2003)","key":"17_CR13"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/501158.501164","volume-title":"Proceedings of the 3rd ACM conference on Electronic Commerce","author":"E. Snekkenes","year":"2001","unstructured":"Snekkenes, E.: Concepts for personal location privacy policies. In: Proceedings of the 3rd ACM conference on Electronic Commerce, pp. 48\u201357. ACM Press, New York (2001)"},{"unstructured":"Thibadeau, R.: A critique of P3P: Privacy on the Web (2000), http:\/\/dollar.ecom.cmu.edu\/p3pcritique\/","key":"17_CR15"},{"unstructured":"Titkov, L., Poslad, S., Tan, J.J.: Enforcing privacy via brokering within nomadic environment. In: AT2AI-4 (2004)","key":"17_CR16"},{"unstructured":"W3C. The Platform for Privacy Preferences 1.0 (P3P1.0) (2001), http:\/\/www.w3c.org\/P3P","key":"17_CR17"},{"doi-asserted-by":"crossref","unstructured":"Warren, S.D., Brandeis, L.D.: The right to privacy. IV(5) (December 1890)","key":"17_CR18","DOI":"10.2307\/1321160"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11423409_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:53:00Z","timestamp":1605642780000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11423409_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540262039","9783540319603"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11423409_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}