{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:43Z","timestamp":1725559003308},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540258964"},{"type":"electronic","value":"9783540320425"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11426646_26","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T16:30:58Z","timestamp":1279038658000},"page":"276-288","source":"Crossref","is-referenced-by-count":19,"title":["Context Obfuscation for Privacy via Ontological Descriptions"],"prefix":"10.1007","author":[{"given":"Ryan","family":"Wishart","sequence":"first","affiliation":[]},{"given":"Karen","family":"Henricksen","sequence":"additional","affiliation":[]},{"given":"Jadwiga","family":"Indulska","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1145\/775152.775241","volume-title":"Proceedings of the twelfth international conference on World Wide Web","author":"R. Agrawal","year":"2003","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: An XPath-based preference language for P3P. In: Proceedings of the twelfth international conference on World Wide Web, pp. 629\u2013639. ACM Press, New York (2003)"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Chen, H., Finin, T., Joshi, A.: A Pervasive Computing Ontology for User Privacy Protection in the Context Broker Architecture. Technical Report TR-CS-04-08, Baltimore County, Maryland, USA, University of Maryland (2004)","DOI":"10.1109\/PERCOM.2004.1276865"},{"key":"26_CR3","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M.: A P3P preference exchange language 1.0 (APPEL1.0) (April 2002), http:\/\/www.w3.org\/TR\/P3P-preferences (last accessed 4\/11\/2004)"},{"key":"26_CR4","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification (2001), http:\/\/www.w3.org\/TR\/P3P\/ (last accessed 4\/11\/2004)"},{"key":"26_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/978-3-540-39718-2_25","volume-title":"The Semantic Web - ISWC 2003","author":"F.L. Gandon","year":"2003","unstructured":"Gandon, F.L., Sadeh, N.M.: A Semantic e-Wallet to Reconcile Privacy and Context Awareness. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol.\u00a02870, pp. 385\u2013401. Springer, Heidelberg (2003)"},{"key":"26_CR6","volume-title":"Information Modeling and Relational Databases: From Conceptual Analysis to Logical Design","author":"T.A. Halpin","year":"2001","unstructured":"Halpin, T.A.: Information Modeling and Relational Databases: From Conceptual Analysis to Logical Design. Morgan Kaufman, San Francisco (2001)"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Henricksen, K., Indulska, J.: A software engineering framework for context-aware pervasive computing. In: 2nd IEEE Conference on Pervasive Computing and Communications, PerCom 2004, Orlando (March 2004)","DOI":"10.1109\/PERCOM.2004.1276847"},{"key":"26_CR8","unstructured":"Henricksen, K., Indulska, J., Rakatonirainy, A.: Generating Context Management Infrastructure from Context Models. In: Mobile Data Management 2003, MDM 2003 (2003)"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Henricksen, K., Wishart, R., McFadden, T., Indulska, J.: Extending context models for privacy in pervasive computing environments. In: Proceedings of CoMoRea 2005 (2005) (to appear)","DOI":"10.1109\/PERCOMW.2005.36"},{"key":"26_CR10","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1145\/990064.990087","volume-title":"Proceedings of the 2nd international conference on Mobile systems, applications, and services","author":"J.I. Hong","year":"2004","unstructured":"Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the 2nd international conference on Mobile systems, applications, and services, pp. 177\u2013189. ACM Press, New York (2004)"},{"key":"26_CR11","unstructured":"Johnson, C., Carmichael, D., Kay, J., Kummerfeld, B., Hexel, R.: Context Evidence and Location Authority: the disciplined management of sensor data into context models. In: Proceedings of the first International Workshop on Context Modelling, Reasoning and Management at UbiComp 2004, September 2004, pp. 74\u201379 (2004)"},{"key":"26_CR12","unstructured":"Lederer, S., Beckmann, C., Dey, A., Mankoff, J.: Managing Personal Information Disclosure in Ubiquitous Computing Environments. Technical Report IRB-TR-03-015, Intel Research Berkley (2003)"}],"container-title":["Lecture Notes in Computer Science","Location- and Context-Awareness"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11426646_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:55:40Z","timestamp":1605642940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11426646_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540258964","9783540320425"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11426646_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}