{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:37Z","timestamp":1725475837443},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540482734"},{"type":"electronic","value":"9783540482765"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11915072_38","type":"book-chapter","created":{"date-parts":[[2006,11,29]],"date-time":"2006-11-29T18:53:24Z","timestamp":1164826404000},"page":"1347-1356","source":"Crossref","is-referenced-by-count":3,"title":["A User-Centric Privacy Framework for Pervasive Environments"],"prefix":"10.1007","author":[{"given":"Susana Alcalde","family":"Bag\u00fc\u00e9s","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Zeidler","sequence":"additional","affiliation":[]},{"given":"Carlos Fernandez","family":"Valdivielso","sequence":"additional","affiliation":[]},{"given":"Ignacio R.","family":"Matias","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"38_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A.R. Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing\u00a02(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"unstructured":"Cranor, L., Langheinrich, M., Marchiori, M., Reagle, J.: The platform for privacy preferences 1.0 (P3P1.0) specification. W3C Recommendation (April 2002)","key":"38_CR2"},{"key":"38_CR3","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/0-306-47573-1_8","volume-title":"Geographic Location in the Internet","author":"J.R. Cuellar","year":"2002","unstructured":"Cuellar, J.R.: Location information privacy. In: Sarikaya, B. (ed.) Geographic Location in the Internet, pp. 179\u2013212. Kluwer Academic Publishers, Norwell (2002)"},{"unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: Ponder: A language for specifying security and management policies for distributed systems (2000)","key":"38_CR4"},{"key":"38_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11428572_10","volume-title":"Pervasive Computing","author":"M. Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol.\u00a03468, pp. 152\u2013170. Springer, Heidelberg (2005)"},{"doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proceedings of the First International Conference on Mobile Systems, Applications, and Services (May 2003)","key":"38_CR6","DOI":"10.1145\/1066116.1189037"},{"key":"38_CR7","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1145\/990064.990087","volume-title":"MobiSYS 2004: Proceedings of the 2nd international conference on Mobile systems, applications, and services","author":"J.I. Hong","year":"2004","unstructured":"Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: MobiSYS 2004: Proceedings of the 2nd international conference on Mobile systems, applications, and services, pp. 177\u2013189. ACM Press, New York (2004)"},{"unstructured":"Kagal, L.: Rei ontology specifications, version 2.0 (July 2004) http:\/\/ebiquity.umbc.edu\/resource\/html\/id\/34\/Rei-Specifications","key":"38_CR8"},{"doi-asserted-by":"crossref","unstructured":"Kagal, L., Finin, T., Joshi, A.: A policy language for a pervasive computing environment. In: Proceedings of the 4th International Workshop on Policies for Distributed Systems and Networks (September 2003)","key":"38_CR9","DOI":"10.1109\/POLICY.2003.1206958"},{"key":"38_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/0470092335","volume-title":"Location\u2013based Services \u2014 Fundamentals and Operation","author":"A. K\u00fcpper","year":"2005","unstructured":"K\u00fcpper, A.: Location\u2013based Services \u2014 Fundamentals and Operation. John Wiley & Sons, Chichester (2005)"},{"key":"38_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 237\u2013245. Springer, Heidelberg (2002)"},{"unstructured":"Langheinrich, M., Cranor, L., Marchiori, M.: Appel: A P3P Preference Exchange Language. W3C Working Draft (April 2002)","key":"38_CR12"},{"issue":"1","key":"38_CR13","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MPRV.2003.1186726","volume":"2","author":"G. Myles","year":"2003","unstructured":"Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing\u00a02(1), 56\u201364 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"38_CR14","volume-title":"Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability","author":"A. Pfitzmann","year":"2001","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, unobservability, and pseudonymity - A proposal for terminology. In: Federrath, H. (ed.) Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., Tschofenig, H., Morris, J., Cuellar, J., Polk, J.: A document format for expressing privacy preferences for location information (February 2006), http:\/\/www.ietf.org\/html.charters\/geopriv-charter.html","key":"38_CR15","DOI":"10.17487\/rfc4745"},{"key":"38_CR16","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/BF02283186","volume":"2","author":"M. Sloman","year":"1994","unstructured":"Sloman, M.: Policy driven management for distributed systems. Journal of Network and Systems Management\u00a02, 333\u2013360 (1994)","journal-title":"Journal of Network and Systems Management"},{"key":"38_CR17","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/501158.501164","volume-title":"EC 2001: Proceedings of the 3rd ACM conference on Electronic Commerce","author":"E. Snekkenes","year":"2001","unstructured":"Snekkenes, E.: Concepts for personal location privacy policies. In: EC 2001: Proceedings of the 3rd ACM conference on Electronic Commerce, Tampa, Florida, USA, October 2001, pp. 48\u201357. ACM Press, New York (2001)"},{"issue":"5","key":"38_CR18","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-Anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"unstructured":"The OWL Services Coalition. OWL-S: Semantic markup for web services (November 2004), http:\/\/www.daml.org\/services\/owl-s\/1.0\/owl-s.html","key":"38_CR19"},{"doi-asserted-by":"crossref","unstructured":"Weiser, M.: The computer for the twenty-first century. Scientific American, 94\u2013104 (September 1991)","key":"38_CR20","DOI":"10.1038\/scientificamerican0991-94"},{"doi-asserted-by":"crossref","unstructured":"Yavatkar, R., Pendarakis, D., Guerin, R.: RFC2753 - A framework for policy-based admission control (January 2000)","key":"38_CR21","DOI":"10.17487\/rfc2753"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11915072_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:41:35Z","timestamp":1619494895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11915072_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540482734","9783540482765"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11915072_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}