{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T06:48:35Z","timestamp":1742798915402},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333760"},{"type":"electronic","value":"9783540333777"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11734666_12","type":"book-chapter","created":{"date-parts":[[2006,3,9]],"date-time":"2006-03-09T12:10:32Z","timestamp":1141906232000},"page":"149-164","source":"Crossref","is-referenced-by-count":9,"title":["Privacy Sensitive Location Information Systems in Smart Buildings"],"prefix":"10.1007","author":[{"given":"Jodie P.","family":"Boyer","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kaijun","family":"Tan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"The European Parliment and the Council of the European Union: Directive 95\/46\/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995)"},{"key":"12_CR2","unstructured":"108th Congress: HR 71: The wireless privacy protection act. In: United States House of Representatives (2003-2004)"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/6.272176","volume":"30","author":"I.A. Getting","year":"1993","unstructured":"Getting, I.A.: The global positioning system. IEEE Spectrum\u00a030, 36\u201347 (1993)","journal-title":"IEEE Spectrum"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/128756.128759","volume":"10","author":"R. Want","year":"1992","unstructured":"Want, R., Hopper, A., Falc\u00e3o, V., Gibbons, J.: The active badge location system. ACM Trans. Inf. Syst.\u00a010, 91\u2013102 (1992)","journal-title":"ACM Trans. Inf. Syst."},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/98.626982","volume":"4","author":"A. Ward","year":"1997","unstructured":"Ward, A., Jones, A., Hopper, A.: A new location technique for the active office. IEEE Personnel Communications\u00a04, 42\u201347 (1997)","journal-title":"IEEE Personnel Communications"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-45427-6_3","volume-title":"UbiComp 2001: Proceedings of the 3rd international conference on Ubiquitous Computing","author":"P. Castro","year":"2001","unstructured":"Castro, P., Chiu, P., Kremenek, T., Muntz, R.R.: A probabilistic room location service for wireless networked environments. In: UbiComp 2001: Proceedings of the 3rd international conference on Ubiquitous Computing, pp. 18\u201334. Springer, London (2001)"},{"key":"12_CR7","unstructured":"G\u00f6rlach, A., Heinemann, A., Terpstra, W.W.: Survey on location privacy in pervasive computing. In: Robinson, P., Vogt, H., Wagealla, W. (eds.) Privacy, Security and Trust within the Context of Pervasive Computing (2004)"},{"key":"12_CR8","unstructured":"Graubart, R.: On the need for a third form of access control. In: Proceedings of the 12th National Computing Security Conference, pp. 296\u2013303 (1989)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/11423409_17","volume-title":"Privacy Enhancing Technologies","author":"C.A. Gunter","year":"2005","unstructured":"Gunter, C.A., May, M.J., Stubblebine, S.: A formal privacy system and its application to location based services. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol.\u00a03424, pp. 256\u2013282. Springer, Heidelberg (2005)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Snekkenes, E.: Concepts for personal location privacy policies. In: ACM Conference on Electronic Commerce (2001)","DOI":"10.1145\/501158.501164"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11734666_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T17:59:24Z","timestamp":1539280764000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11734666_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333760","9783540333777"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11734666_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}