{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:45:57Z","timestamp":1725471957558},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540478423"},{"type":"electronic","value":"9783540478454"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11907503_11","type":"book-chapter","created":{"date-parts":[[2006,10,24]],"date-time":"2006-10-24T14:15:53Z","timestamp":1161699353000},"page":"143-158","source":"Crossref","is-referenced-by-count":2,"title":["Shadow: A Middleware in Pervasive Computing Environment for User Controllable Privacy Protection"],"prefix":"10.1007","author":[{"given":"Wentian","family":"Lu","sequence":"first","affiliation":[]},{"given":"Jun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xianping","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Xiaoxing","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"11_CR1","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/BF01846697","volume":"4","author":"R.H.R. Harper","year":"1995","unstructured":"Harper, R.H.R.: Why people do and don?t wear active badges: A case study. Computer Supported Cooperative Work\u00a04(4), 297\u2013318 (1995)","journal-title":"Computer Supported Cooperative Work"},{"key":"11_CR2","first-page":"199","volume-title":"AINA","author":"J. Li","year":"2006","unstructured":"Li, J., Bu, Y., Chen, S., Tao, X., Lu, J.: Followme: On research of pluggable infrastructure for context-awareness. In: AINA, vol.\u00a0(1), pp. 199\u2013204. IEEE Computer Society, Los Alamitos (2006)"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/501158.501164","volume-title":"ACM Conference on Electronic Commerce","author":"E. Snekkenes","year":"2001","unstructured":"Snekkenes, E.: Concepts for personal location privacy policies. In: ACM Conference on Electronic Commerce, pp. 48\u201357. ACM, New York (2001)"},{"issue":"1","key":"11_CR4","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MPRV.2003.1186726","volume":"2","author":"G. Myles","year":"2003","unstructured":"Myles, G., Friday, A., Davies, N.: Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing\u00a02(1), 56\u201364 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-540-39881-3_6","volume-title":"Security in Pervasive Computing","author":"U. Hengartner","year":"2004","unstructured":"Hengartner, U., Steenkiste, P.: Protecting access to people location information. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 25\u201338. Springer, Heidelberg (2004)"},{"issue":"1","key":"11_CR6","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. ACM Trans. Inf. Syst. Secur.\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"2","key":"11_CR7","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D.M. Goldschlag","year":"1999","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Onion routing. Commun. ACM\u00a042(2), 39\u201341 (1999)","journal-title":"Commun. ACM"},{"issue":"1","key":"11_CR8","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A.R. Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing\u00a02(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"#cr-split#-11_CR9.1","doi-asserted-by":"crossref","unstructured":"Heiber, T., Marron, P.J.: Exploring the relationship between context and privacy. In: Robinson, P., Vogt, H., Wagealla, W. (eds.) Privacy, Security and Trust within the Context of Pervasive Computing. The Kluwer International Series in Engineering and Computer Science, vol.??780 (2005);","DOI":"10.1007\/0-387-23462-4_4"},{"key":"#cr-split#-11_CR9.2","unstructured":"University of Stuttgart, Faculty of Computer Science, Electrical Engineering, and Information Technology. Springer-Verlag, ISBN 0-387-23461-6"},{"issue":"5","key":"11_CR10","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweene","year":"2002","unstructured":"Sweene, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"11_CR11","first-page":"249","volume-title":"ICDM","author":"K. Wang","year":"2004","unstructured":"Wang, K., Yu, P.S., Chakraborty, S.: Bottom-up generalization: A data mining solution to privacy protection. In: ICDM, pp. 249\u2013256. IEEE Computer Society, Los Alamitos (2004)"},{"key":"11_CR12","series-title":"IFIP Conference Proceedings","first-page":"356","volume-title":"DBSec.","author":"L. Sweeney","year":"1997","unstructured":"Sweeney, L.: Datafly: A system for providing anonymity in medical data. In: Lin, T.Y., Qian, S. (eds.) DBSec. IFIP Conference Proceedings, vol.\u00a0113, pp. 356\u2013381. Chapman & Hall, Boca Raton (1997)"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45427-6_23","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"M. Langheinrich","year":"2001","unstructured":"Langheinrich, M.: Privacy by design - principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol.\u00a02201, pp. 273\u2013291. Springer, Heidelberg (2001)"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 237\u2013245. Springer, Heidelberg (2002)"},{"issue":"3","key":"11_CR15","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.websem.2003.07.008","volume":"1","author":"F.L. Gandon","year":"2004","unstructured":"Gandon, F.L., Sadeh, N.M.: Semantic web technologies to reconcile privacy and context awareness. J. Web Sem.\u00a01(3), 241\u2013260 (2004)","journal-title":"J. Web Sem."},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: MobiSys, USENIX (2004)","DOI":"10.1145\/990064.990087"},{"key":"11_CR17","unstructured":"Zugenmaier, A., Kreuzer, M., M\u00fcller, G.: The freiburg privacy diamond: An attacker model for a mobile computing environment. In: Irmscher, K., F\u00e4hnrich, K.P. (eds.) KiVS Kurzbeitr\u00e4ge, pp. 131\u2013141. VDE Verlag (2003)"},{"issue":"5","key":"11_CR18","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweene","year":"2002","unstructured":"Sweene, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010(5), 571\u2013588 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys, USENIX (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"11_CR20","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/1124772.1124788","volume-title":"CHI 2006: Proceedings of the SIGCHI conference on Human Factors in computing systems","author":"K.P. Tang","year":"2006","unstructured":"Tang, K.P., Keyani, P., Fogarty, J., Hong, J.I.: Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in locationbased applications. In: CHI 2006: Proceedings of the SIGCHI conference on Human Factors in computing systems, pp. 93\u2013102. ACM Press, New York (2006)"},{"key":"11_CR21","unstructured":"Anciaux, N., van Heerde, H., Feng, L., Apers, P.: Implanting Life-Cycle Privacy Policies in a Context Database. Technical Report TR-CTIT-06-03, CTIT, University of Twente (2006)"}],"container-title":["Lecture Notes in Computer Science","Smart Sensing and Context"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11907503_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:38:22Z","timestamp":1619509102000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11907503_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540478423","9783540478454"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11907503_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}