{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:46:37Z","timestamp":1725475597929},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540687900"},{"type":"electronic","value":"9783540687931"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11957454_9","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T09:15:43Z","timestamp":1165828543000},"page":"152-171","source":"Crossref","is-referenced-by-count":11,"title":["Protecting Privacy with the MPEG-21 IPMP Framework"],"prefix":"10.1007","author":[{"given":"Nicholas Paul","family":"Sheppard","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 506\u2013522. Springer, Heidelberg (2004)"},{"key":"9_CR2","first-page":"41","volume":"15","author":"D.L. Burk","year":"2001","unstructured":"Burk, D.L., Cohen, J.E.: Fair use infrastructure for copyright management systems. Harvard Journal of Law and Technology\u00a015, 41\u201383 (2001)","journal-title":"Harvard Journal of Law and Technology"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Cha, S.-C., Joung, Y.-J.: From P3P to data licenses. In: Workshop on Privacy Enhancing Technologies, pp. 205\u2013221 (2003)","DOI":"10.1007\/978-3-540-40956-4_14"},{"key":"9_CR4","unstructured":"ContentGuard. Extensible Rights Markup Language (2004), http:\/\/www.xrml.org"},{"key":"9_CR5","unstructured":"El-Khatib, K.: A privacy negotiation protocol for web services. In: Workshop on Collaboration Agents: Autonomous Agents for Collaborative Environments (2003)"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1109\/JPROC.2004.827365","volume":"92","author":"J.S. Erickson","year":"2004","unstructured":"Erickson, J.S., Mulligan, D.K.: The technical and legal dangers of code-based fair use enforcement. Proceedings of the IEEE\u00a092, 985\u2013996 (2004)","journal-title":"Proceedings of the IEEE"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Gunter, C.A., May, M.J., Stubblebine, S.G.: A formal privacy system and its application to location based services. In: Workshop on Privacy Enhancing Technologies, pp. 256\u2013282 (2004)","DOI":"10.1007\/11423409_17"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: International Conference On Mobile Systems, Applications And Services, pp. 177\u2013189 (2004)","DOI":"10.1145\/990064.990087"},{"key":"9_CR9","unstructured":"International Standards Organisation. Information technology \u2013 multimedia framework (MPEG-21) \u2013 part 1: Vision, technologies and strategy. ISO\/IEC 21000-1 (2001)"},{"key":"9_CR10","unstructured":"International Standards Organisation. Information technology \u2013 multimedia framework (MPEG-21) \u2013 part 2: Digital item declaration. ISO\/IEC 21000-2 (2003)"},{"key":"9_CR11","unstructured":"International Standards Organisation. Information technology \u2013 multimedia framework (MPEG-21) \u2013 part 4: Intellectual property management and protection components. ISO\/IEC 21000-4 (2006)"},{"key":"9_CR12","unstructured":"International Standards Organisation. Information technology \u2013 multimedia framework (MPEG-21) \u2013 part 5: Rights expression language. ISO\/IEC 21000-5 (2004)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Irwin, K., Yu, T.: Determining user privacy preferences by asking the right questions: An automated approach. In: ACM Workshop on Privacy in the Electronic Society, pp. 47\u201350 (2005)","DOI":"10.1145\/1102199.1102209"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1016\/S0167-4048(02)01117-3","volume":"21","author":"S. Kenny","year":"2002","unstructured":"Kenny, S., Korba, L.: Applying digital rights management systems to privacy rights. Computers & Security\u00a021, 648\u2013664 (2002)","journal-title":"Computers & Security"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Mykletun, E., Tsudik, G.: Incorporating a secure coprocessor in the database-as-a-service model. In: International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems, pp. 38\u201344 (2005)","DOI":"10.1109\/IWIA.2005.28"},{"key":"9_CR16","unstructured":"Organization for the Advancement of Structured Information Standards. OASIS Customer Information Quality TC (2004), http:\/\/www.oasis-open.org\/committees\/ciq\/"},{"key":"9_CR17","unstructured":"Organization for the Advancement of Structured Information Standards. OASIS eXtensible Access Control Markup Language TC (2004), http:\/\/www.oasis-open.org\/committees\/xacml\/"},{"key":"9_CR18","unstructured":"Powers, C., Adler, S., Wishart, B.: EPAL translation of the Freedom of Information and Protection of Privacy Act. White paper, Ontario Information and Privacy Commissioner (March 11, 2004), http:\/\/www.ipc.on.ca\/docs\/EPAL%20FI1.pdf"},{"key":"9_CR19","unstructured":"Schunter, M., Powers, C.: The Enterprise Privacy Authorization Language (EPAL 1.1) (2003), http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal"},{"key":"9_CR20","unstructured":"Tumer, A., Dogac, A., Toroslu, I.H.: A semantic based privacy framework for web services. In: Proceedings of WWW 2003 Workshop on E-Services and the Semantic Web (2003)"},{"key":"9_CR21","unstructured":"W3 Consortium. XML Path Language (XPath) (1999), http:\/\/www.w3.org\/TR\/xpath"},{"key":"9_CR22","unstructured":"W3 Consortium. Platform for Privacy Preferences (P3P) project (2004), http:\/\/www.w3.org\/P3P"},{"key":"9_CR23","unstructured":"W3 Consortium. XForms (2005), http:\/\/www.w3.org\/MarkUp\/Forms"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Zittrain, J.: What the publisher can teach the patient: Property and privacy in an era of trusted privication. Stanford Law Review\u00a052 (2000)","DOI":"10.2139\/ssrn.214468"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11957454_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:21:41Z","timestamp":1619508101000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11957454_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687900","9783540687931"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11957454_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}