{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:46:19Z","timestamp":1725471979006},"publisher-location":"Berlin, Heidelberg","reference-count":61,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540478423"},{"type":"electronic","value":"9783540478454"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11907503_12","type":"book-chapter","created":{"date-parts":[[2006,10,24]],"date-time":"2006-10-24T14:15:53Z","timestamp":1161699353000},"page":"159-173","source":"Crossref","is-referenced-by-count":3,"title":["Auditing and Inference Control for Privacy Preservation in Uncertain Environments"],"prefix":"10.1007","author":[{"given":"Xiangdong","family":"An","sequence":"first","affiliation":[]},{"given":"Dawn","family":"Jutla","sequence":"additional","affiliation":[]},{"given":"Nick","family":"Cercone","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"12_CR1","first-page":"197","volume":"18","author":"H. Chen","year":"2004","unstructured":"Chen, H., Finin, T., Joshi, A.: An ontology for context-aware pervasive computing environments. Knowledge Engineering Review, Special Issue on Ontologies for Distributed Systems\u00a018(3), 197\u2013207 (2004)","journal-title":"Knowledge Engineering Review, Special Issue on Ontologies for Distributed Systems"},{"issue":"6","key":"12_CR2","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MIS.2004.70","volume":"19","author":"M. Khedr","year":"2004","unstructured":"Khedr, M., Karmouch, A.: Negotiating context information in context-aware systems. IEEE Intelligent Systems\u00a019(6), 21\u201329 (2004)","journal-title":"IEEE Intelligent Systems"},{"issue":"1","key":"12_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2004.04.002","volume":"28","author":"M. Khedr","year":"2005","unstructured":"Khedr, M., Karmouch, A.: ACAI: Agent-based context-aware infrastructure for spontaneous applications. Journal of Network and Computer Applications\u00a028(1), 19\u201344 (2005)","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"12_CR4","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MPRV.2002.993142","volume":"1","author":"N. Davies","year":"2002","unstructured":"Davies, N., Gellersen, H.W.: Beyond prototypes: Challenges in deploying ubiquitous systems. IEEE Pervasive Computing\u00a01(1), 26\u201335 (2002)","journal-title":"IEEE Pervasive Computing"},{"issue":"1","key":"12_CR5","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"A. Dey","year":"2001","unstructured":"Dey, A.: Understanding and using context. Personal and Ubiquitous Computing\u00a05(1), 4\u20137 (2001)","journal-title":"Personal and Ubiquitous Computing"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"S. Warren","year":"1890","unstructured":"Warren, S., Brandeis, L.: The right to privacy. Harvard Law Review\u00a04, 193\u2013220 (1890)","journal-title":"Harvard Law Review"},{"key":"12_CR7","unstructured":"An, X., Jutla, D.: A survey of privacy technologies. Technical report, Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada (2005)"},{"key":"12_CR8","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The platform for privacy preferences 1.0 (P3P 1.0) specification. Technical report, W3C Recommendation (2002), http:\/\/www.w3.org\/TR\/P3P"},{"key":"12_CR9","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M.: A P3P preference exchange language 1.0 (APPEL 1.0). Technical report, W3C Working Draft (2002), http:\/\/www.w3.org\/TR\/P3P-preference"},{"key":"12_CR10","unstructured":"Clark, J., DeRose, S.: XML Path language (XPath) Version 1.0. Technical report, W3C Recommendation (1999), http:\/\/www.w3.org\/TR\/xpath"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kieman, J., Srikant, R., Xu, Y.: An XPath-based preference language for P3P. In: Proceedings of the 12th International WWW Conference (WWW 2003), Budapest, Hungary (May 2003)","DOI":"10.1145\/775152.775241"},{"key":"12_CR12","unstructured":"McBride, B., Wenning, R., Cranor, L.: A RDF schema for P3P. Technical report, W3C Note (2002), http:\/\/www.w3.org\/TR\/p3p-rdfschema"},{"key":"12_CR13","unstructured":"Hogben, G.: P3P using the semantic web (OWL ontology, RDF policy and RDQL rules). Technical report, W3C Working Group Note (2004), http:\/\/www.w3.org\/P3P\/2004\/040920_p3p-sw.html"},{"key":"12_CR14","unstructured":"Hogben, G.: Describing the P3P base data schema using OWL. In: Kagal, L., Finin, T., Hendler, J. (eds.) Policy Management for the Web (PM4W): Proceedings of the 14th World Wide Web Conference (WWW\u201905) Workshop, Chiba, Japan, pp. 44\u201351 (2005)"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Gandon, F.L., Sadeh, N.M.: Semantic web technologies to reconcile privacy and context awareness. Journal of Web Semantics\u00a01(3) (2005)","DOI":"10.1016\/j.websem.2003.07.008"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Kagal, L., Finin, T., Joshi, A.: A policy language for pervasive systems. In: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como (2003)","DOI":"10.1109\/POLICY.2003.1206958"},{"key":"12_CR17","unstructured":"Kagal, L., Finin, T., Joshi, A.: Declarative policies for describing web services capabilities and constraints. In: Proceedings of the W3C Workshop on Constraints and Capabilities for Web Services, Redwood Shores, CA, USA (2004)"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/POLICY.2005.15","volume-title":"Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005)","author":"P. Kolari","year":"2005","unstructured":"Kolari, P., Ding, L., Ganjugunte, S., Kagal, L., Joshi, A., Finin, T.: Enhancing web privacy protection through declarative policies. In: Sahai, A., Winsborough, W.H. (eds.) Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), Stockholm, Sweden, pp. 57\u201366. IEEE Computer Society, Los Alamitos (2005)"},{"issue":"337","key":"12_CR19","doi-asserted-by":"publisher","first-page":"7","DOI":"10.2307\/2284695","volume":"67","author":"I. Fellegi","year":"1972","unstructured":"Fellegi, I.: On the question of statistical confidentiality. Journal of American Statistical Association\u00a067(337), 7\u201318 (1972)","journal-title":"Journal of American Statistical Association"},{"issue":"3","key":"12_CR20","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1145\/320613.320616","volume":"5","author":"D. Denning","year":"1980","unstructured":"Denning, D.: Secure statistical databases with random sample queries. ACM Transactions on Database Systems\u00a05(3), 291\u2013315 (1980)","journal-title":"ACM Transactions on Database Systems"},{"key":"12_CR21","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/882082.882103","volume-title":"Proceedings of the 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD 2003)","author":"J. Staddon","year":"2003","unstructured":"Staddon, J.: Dynamic inference control. In: Zaki, M.J., Aggarwal, C.C. (eds.) Proceedings of the 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD 2003), pp. 94\u2013100. ACM Press, New York (2003)"},{"key":"12_CR22","unstructured":"Shoshani, A.: Statistical databases: Characteristics, problems and some solutions. In: Proceedings of the 8th International Conference on Very Large Databases (VLDB 1982), Mexico City, Mexico, pp. 208\u2013213 (1982)"},{"key":"12_CR23","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/571985.572003","volume-title":"Proceedings of the 15th Annual ACM Symposium on User Interface Software and Technology (UIST 2002)","author":"A. Dey","year":"2002","unstructured":"Dey, A., Mankoff, J., Abowd, G., Carter, S.: Distributed mediation of ambiguous context in aware environments. In: Beaudouin-Lafon, M. (ed.) Proceedings of the 15th Annual ACM Symposium on User Interface Software and Technology (UIST 2002), Paris, France, pp. 121\u2013130. ACM Press, New York (2002)"},{"key":"12_CR24","volume-title":"Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference","author":"J. Pearl","year":"1988","unstructured":"Pearl, J.: Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann Publishers, San Francisco (1988)"},{"key":"12_CR25","unstructured":"Wong, W.-K., Cooper, G., Wagner, M.: Bayesian network anomaly pattern detection for disease outbreaks. In: Proceedings of the 20th International Conference on Machine Learning (ICML-2003), Washington DC, USA (2003)"},{"key":"12_CR26","unstructured":"Johansen, K., Lee, S.: Network security: Bayesian network intrusion detection. Technical report, Department of Computer Science, Johns Hopkins University, Baltimore, MD, USA (2003)"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Mutz, D., Robertson, W., Valeur, F.: Bayesian event classification for intrusion detection. In: Proceedings of the 19th Annual Computer Security Applications Conference, LasVegas, Nevada, USA (2003)","DOI":"10.1109\/CSAC.2003.1254306"},{"key":"12_CR28","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/0004-3702(80)90014-4","volume":"13","author":"R. Reiter","year":"1980","unstructured":"Reiter, R.: A logic for default reasoning. Artificial Intelligence\u00a013, 81\u2013132 (1980)","journal-title":"Artificial Intelligence"},{"key":"12_CR29","first-page":"470","volume-title":"Proceedings of the 20th Hawaii International Conference on System Science","author":"D. Nute","year":"1987","unstructured":"Nute, D.: Defeasible reasoning. In: Proceedings of the 20th Hawaii International Conference on System Science, Kailua-Kona, HI, USA, pp. 470\u2013477. IEEE Press, Los Alamitos (1987)"},{"key":"12_CR30","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"L. Zadeh","year":"1965","unstructured":"Zadeh, L.: Fuzzy sets. Information and Control\u00a08, 338\u2013353 (1965)","journal-title":"Information and Control"},{"key":"12_CR31","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/0004-3702(80)90011-9","volume":"13","author":"J. McCarthy","year":"1980","unstructured":"McCarthy, J.: Circumscription | a form of non-monotonic reasoning. Artificial Intelligence\u00a013, 27\u201339 (1980)","journal-title":"Artificial Intelligence"},{"key":"12_CR32","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/0004-3702(85)90042-6","volume":"28","author":"R.C. Moore","year":"1985","unstructured":"Moore, R.C.: Semantical considerations on non-monotonic logic. Artificial Intelligence\u00a028, 75\u201394 (1985)","journal-title":"Artificial Intelligence"},{"key":"12_CR33","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1214\/aoms\/1177698950","volume":"38","author":"A.P. Dempster","year":"1967","unstructured":"Dempster, A.P.: Upper and lower probabilities induced by a multivalued mapping. Annual Mathematical Statistics\u00a038, 325\u2013339 (1967)","journal-title":"Annual Mathematical Statistics"},{"key":"12_CR34","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G. Shafer","year":"1976","unstructured":"Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)"},{"issue":"1","key":"12_CR35","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/69.273026","volume":"6","author":"D. Dubois","year":"1994","unstructured":"Dubois, D., Lang, J., Prade, H.: Automated reasoning using possibilistic logic: semantics, belief revision, and variable certainty weights. IEEE Transactions on Knowledge and Data Engineering\u00a06(1), 64\u201371 (1994)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"12_CR36","volume-title":"Probabilistic Reasoning in Expert Systems: Theory and Algorithms","author":"R.E. Neapolitan","year":"1990","unstructured":"Neapolitan, R.E.: Probabilistic Reasoning in Expert Systems: Theory and Algorithms. John Wiley & Sons, Inc., New York (1990)"},{"key":"12_CR37","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/RISP.1990.63843","volume-title":"Proceedings of the 1990 IEEE Symposium on Security and Privacy","author":"S. Jajodia","year":"1990","unstructured":"Jajodia, S., Sandhu, R.: Polyinstantiation integrity in multilevel relations. In: Proceedings of the 1990 IEEE Symposium on Security and Privacy, pp. 104\u2013115. IEEE Computer Society, Los Alamitos (1990)"},{"issue":"3","key":"12_CR38","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0169-023X(98)00044-5","volume":"29","author":"F. Cuppens","year":"1999","unstructured":"Cuppens, F., Gabillon, A.: Logical foundations of multilevel databases. Data & Knowledge Engineering\u00a029(3), 199\u2013222 (1999)","journal-title":"Data & Knowledge Engineering"},{"issue":"7","key":"12_CR39","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MC.1983.1654444","volume":"16","author":"D.E. Denning","year":"1983","unstructured":"Denning, D.E., Schl\u00f6rer, J.: Inference control for statistical databases. IEEE Computer\u00a016(7), 69\u201382 (1983)","journal-title":"IEEE Computer"},{"key":"12_CR40","doi-asserted-by":"crossref","unstructured":"Yip, R.W., Levitt, K.N.: Data level inference detection in database systems. In: Proceedings of the 11th IEEE Computer Security Foundations, Rockport, MA, pp. 179\u2013189 (1998)","DOI":"10.1109\/CSFW.1998.683168"},{"issue":"1","key":"12_CR41","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/320064.320069","volume":"4","author":"D.E. Denning","year":"1979","unstructured":"Denning, D.E., Denning, P.J., Schwartz, M.D.: The tracker: a threat to statistical database security. ACM Transactions on Database Systems\u00a04(1), 76\u201396 (1979)","journal-title":"ACM Transactions on Database Systems"},{"issue":"1","key":"12_CR42","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/320064.320068","volume":"4","author":"D. Dobkin","year":"1979","unstructured":"Dobkin, D., Jones, A., Lipton, R.: Secure databases: Protection against user influence. ACM Transactions on Database Systems\u00a04(1), 97\u2013106 (1979)","journal-title":"ACM Transactions on Database Systems"},{"issue":"370","key":"12_CR43","doi-asserted-by":"publisher","first-page":"377","DOI":"10.2307\/2287463","volume":"75","author":"L.H. Cox","year":"1980","unstructured":"Cox, L.H.: Suppression methodology and statistical disclosure control. Journal of the American Statistical Association\u00a075(370), 377\u2013385 (1980)","journal-title":"Journal of the American Statistical Association"},{"issue":"6","key":"12_CR44","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TSE.1982.236161","volume":"8","author":"F.Y. Chin","year":"1982","unstructured":"Chin, F.Y., \u00d6zsoyoglu, G.: Auditing and inference control in statistical databases. IEEE Transactions on Software Engineering\u00a08(6), 574\u2013582 (1982)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"12_CR45","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/335168.335210","volume-title":"Proceedings of the 19th ACM SIGMOD-SIGART Symposium on Principles of Database Systems (PODS 2000)","author":"J. Kleinberg","year":"2000","unstructured":"Kleinberg, J., Papadimitriou, C., Raghavan, P.: Auditing boolean attributes. In: Proceedings of the 19th ACM SIGMOD-SIGART Symposium on Principles of Database Systems (PODS 2000), Dallas, TX, pp. 86\u201391. ACM Press, New York (2000)"},{"issue":"4","key":"12_CR46","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1145\/1994.383392","volume":"9","author":"J.F. Traub","year":"1984","unstructured":"Traub, J.F., Yemini, Y., Woznaikowski, H.: The statistical security of a statistical database. ACM Transactions on Database Systems\u00a09(4), 672\u2013679 (1984)","journal-title":"ACM Transactions on Database Systems"},{"issue":"3","key":"12_CR47","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1145\/320613.320617","volume":"5","author":"L.L. Beck","year":"1980","unstructured":"Beck, L.L.: A security mechanism for statistical databases. ACM Transactions on Database Systems\u00a05(3), 316\u2013338 (1980)","journal-title":"ACM Transactions on Database Systems"},{"issue":"1","key":"12_CR48","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/348.349","volume":"9","author":"S.P. Reiss","year":"1984","unstructured":"Reiss, S.P.: Practical data-swapping: The first steps. ACM Transactions on Database Systems\u00a09(1), 20\u201337 (1984)","journal-title":"ACM Transactions on Database Systems"},{"key":"12_CR49","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0169-023X(01)00024-6","volume":"38","author":"J. Biskup","year":"2001","unstructured":"Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data & Knowledge Engineering\u00a038, 199\u2013222 (2001)","journal-title":"Data & Knowledge Engineering"},{"issue":"1","key":"12_CR50","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/319830.319833","volume":"8","author":"G.L. Sicherman","year":"1983","unstructured":"Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets. ACM Transactions on Database Systems\u00a08(1), 41\u201359 (1983)","journal-title":"ACM Transactions on Database Systems"},{"key":"12_CR51","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1109\/RISP.1994.296583","volume-title":"Proceedings of the 1994 IEEE Symposium on Security and Privacy","author":"M.E. Stickel","year":"1994","unstructured":"Stickel, M.E.: Elimination of inference channels by optimal upgrading. In: Proceedings of the 1994 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 168\u2013174. IEEE Computer Society, Los Alamitos (1994)"},{"key":"12_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0169-023X(99)00043-9","volume":"33","author":"J. Biskup","year":"2000","unstructured":"Biskup, J.: For unknown secrecies refusal is better than lying. Data & Knowledge Engineering\u00a033, 1\u201324 (2000)","journal-title":"Data & Knowledge Engineering"},{"issue":"1-2","key":"12_CR53","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1023\/A:1026106029043","volume":"40","author":"J. Biskup","year":"2004","unstructured":"Biskup, J., Bonatti, P.: Controlled query evaluation for known policies by combing lying and refusal. Annals of Mathematics and Artificial Intelligence\u00a040(1-2), 37\u201362 (2004)","journal-title":"Annals of Mathematics and Artificial Intelligence"},{"key":"12_CR54","volume-title":"An introduction to Bayesian networks","author":"F.V. Jensen","year":"1996","unstructured":"Jensen, F.V.: An introduction to Bayesian networks. UCL Press, London, UK (1996)"},{"key":"12_CR55","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-2270-5","volume-title":"Expert Systems and Probabilistic Network Models","author":"E. Castillo","year":"1997","unstructured":"Castillo, E., Gutierrez, J.M., Hadi, A.S.: Expert Systems and Probabilistic Network Models. Springer, Heidelberg (1997)"},{"key":"12_CR56","doi-asserted-by":"crossref","unstructured":"Heckerman, D.: A tutorial on learning with Bayesian networks. Technical report, Microsoft Research, MSR-TR-95-06 (1995)","DOI":"10.1016\/B978-1-55860-377-6.50079-7"},{"key":"12_CR57","volume-title":"Advances in Neural Information Processing Systems 13 (NIPS 2000)","author":"S. Tong","year":"2000","unstructured":"Tong, S., Koller, D.: Active learning for parameter estimation in Bayesian networks. In: Leen, T.K., Dietterich, T.G., Tresp, V. (eds.) Advances in Neural Information Processing Systems 13 (NIPS 2000). MIT Press, Cambridge (2000)"},{"key":"12_CR58","first-page":"141","volume-title":"Proceedings of the 14th Canadian Conference on Artificial Intelligence","author":"J. Cheng","year":"2001","unstructured":"Cheng, J., Greiner, R.: Learning Bayesian belief network classifiers: algorithms and systems. In: Proceedings of the 14th Canadian Conference on Artificial Intelligence, pp. 141\u2013151. Springer, Heidelberg (2001)"},{"key":"12_CR59","volume-title":"Learning Bayesian Networks","author":"R.E. Neapolitan","year":"2003","unstructured":"Neapolitan, R.E.: Learning Bayesian Networks. Prentice-Hall, Englewood Cliffs (2003)"},{"key":"12_CR60","doi-asserted-by":"crossref","unstructured":"Meng, D., Sivakumar, K., Kargupta, H.: Privacy sensitive Bayesian network parameter learning. In: Proceedings of the 4th IEEE International Conference on Data Mining (ICDM 2004), Brighton, UK, pp. 427\u2013430. IEEE Computer Society Press, Los Alamitos (2004)","DOI":"10.1109\/ICDM.2004.10076"},{"issue":"2","key":"12_CR61","first-page":"21","volume":"20","author":"B. D\u2019Ambrosio","year":"1999","unstructured":"D\u2019Ambrosio, B.: Inference in Bayesian networks. AI Magazine\u00a020(2), 21\u201336 (1999)","journal-title":"AI Magazine"}],"container-title":["Lecture Notes in Computer Science","Smart Sensing and Context"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11907503_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T13:36:22Z","timestamp":1683639382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11907503_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540478423","9783540478454"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/11907503_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}