{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:21:37Z","timestamp":1725488497637},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540009887"},{"type":"electronic","value":"9783540366096"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36609-1_14","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T14:28:12Z","timestamp":1186669692000},"page":"177-193","source":"Crossref","is-referenced-by-count":5,"title":["A Trusted Method for Self-profiling in e-Commerce"],"prefix":"10.1007","author":[{"given":"Siani","family":"Pearson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,25]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"O. Andy. Peer-to-Peer, Harnessing the Power of Disruptive Technology, O\u2019Reilly, 2001.","DOI":"10.1145\/375348.377427"},{"key":"14_CR2","unstructured":"G. Bahadur, W. Chan and C. Weber, Privacy Defended, p45, Que, 2002."},{"key":"14_CR3","unstructured":"B. Balacheff, D. Chan, L. Chen, S. Pearson, and G. Proudler, \u201cHow can you trust a Computing Platform?\u201d Proceedings of ISSE 2000, Barcelona, Spain, 27\u201329 September 2000."},{"key":"14_CR4","unstructured":"S. Brands, \u201cA Semi-Technical Overview of Digital Credentials\u201d, International Journal on Information Security, August 2002. Available via http:\/\/www.credentica.com"},{"issue":"3","key":"14_CR5","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1093\/ijlit\/9.3.275","volume":"9","author":"L. Bygrave","year":"2001","unstructured":"L. Bygrave, \u201cElectronic Agents and Privacy: A Cyberspace Odyssey 2001\u201d, International Journal of Law and Information Technology, vol 9, no 3, p. 280, OUP, 2001.","journal-title":"International Journal of Law and Information Technology"},{"key":"14_CR6","unstructured":"Applied Artificial Intelligence, Special Issue on \u201cTrust in Agents\u201d, C. Castelfranchi, R. Falcone, B. Firozabadi and Y. Tan (editors), Taylor and Francis, vol 14, no 8, p.765, 2000."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Castelfranchi, C. and Y.-H. Tan, eds., Trust and Deception in Virtual Societies, Kluwer, 2001.","DOI":"10.1007\/978-94-017-3614-5"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"D. Chaum, \u201cAchieving Electronic Privacy\u201d, Scientific American, p. 96\u2013101, August 1992.","DOI":"10.1038\/scientificamerican0892-96"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"H. Chi Wong and K. Sycara, \u201cAdding Security and Trust to Multiagent Systems\u201d, Applied Artificial Intelligence, Special Issue on \u201cTrust in Agents\u201d, C. Castelfranchi, R. Falcone, B. Firozabadi and Y. Tan (editors), Taylor and Francis, vol 14, no 9, p. 927\u2013941, 2000.","DOI":"10.1080\/08839510050144886"},{"key":"14_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/3-540-45831-X_14","volume-title":"InfraSec 2002","author":"M. Enzmann","year":"2002","unstructured":"M. Enzmann, T. Kunz and M. Schneider, \u201cA New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping\u201d, G. Davida, Y. Frankel and O. Rees (eds.), InfraSec 2002, LNCS 2437, p. 199\u2013213, Springer-Verlag, 2002."},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"D. Grritzalis and N. Kyrloglou, \u201cConsumer Online-Privacy and Anonymity Protection using Infomediary Schemes\u201d, Proceedings of SCCC 2001, p. 115\u2013123, IEEE Comput. Soc., 2001.","DOI":"10.1109\/SCCC.2001.972639"},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1038\/nbt0402-332","volume":"20","author":"B. Huberman","year":"2002","unstructured":"B. Huberman and T. Hogg, \u201cProtecting Privacy while Revealing Data\u201d, Nature Biotech, vol 20, p. 332, 2002.","journal-title":"Nature Biotech"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"L. Korba, \u201cPrivacy in Distributed Electronic Commerce\u201d, Proceedings of the 35th Hawaii International Conference on System Sciences, IEEE, 2002.","DOI":"10.1109\/HICSS.2002.994534"},{"key":"14_CR14","unstructured":"Liberty Alliance, Liberty Alliance Project, http:\/\/www.projectliberty.org"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Y. Mass and O. Shehory, \u201cDistributed Trust in Open Multi-agent Systems\u201d, Trust in Cybersocieties, R. Falcone, M. Singh and Y. Tan (eds.), LNAI 2246, p. 159\u2013173, Springer, 2001.","DOI":"10.1007\/3-540-45547-7_10"},{"key":"14_CR16","unstructured":"Microsoft Corporation, Building User-Centric Experiences: An Introduction to Microsoft.NET My Services, Sept 2001. Available via http:\/\/www.microsoft.com\/net\/myservices.asp"},{"key":"14_CR17","unstructured":"T. Nabeth and C. Roda, \u201cIntelligent Agents and the Future of Identity\u201d, IPTS Report, no. 67, September 2002. Available via http:\/\/www.jrc.es\/ ]"},{"key":"14_CR18","first-page":"155","volume-title":"Being Digital","author":"N. Negroponte","year":"1995","unstructured":"N. Negroponte. Being Digital, p. 155, Hodder & Stoughton, London, 1995."},{"issue":"4","key":"14_CR19","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1145\/255950.153582","volume":"36","author":"J. Neilson","year":"1993","unstructured":"J. Neilson, \u201cNoncommand User Interfaces\u201d, Com. of ACM, vol 36, no 4, p. 83\u201399, April 1993.","journal-title":"Com. of ACM"},{"key":"14_CR20","unstructured":"S. Pearson (ed.), Trusted Computing Platforms, Prentice Hall, 2002."},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"S. Riche, G. Brebner and M. Gittler, \u201cClient-Side Profile Storage\u201d, Proceedings of International Workshop on Web Engineering, Pisa, Italy, May 25th 2002.","DOI":"10.1007\/3-540-45745-3_11"},{"key":"14_CR22","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"B. Schneier, Applied Cryptography. New York: John Wiley & Sons, 2nd edition, 1996.","edition":"2nd edition"},{"key":"14_CR23","unstructured":"K. Scribben. \u201cPrivacy@net \u2014 An International comparative study of consumer privacy on the Internet\u201d, Consumers International, January 2001. (ISBN: 19023 913168)."},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"A. Serjantov and G. Danezis, \u201cTowards an Information Theoretic Metric for Anonymity\u201d, Workshop on Privacy Enhancing Technologies, San Francisco, CA, USA, 14 \u2014 15 April, 2002.","DOI":"10.1007\/3-540-36467-6_4"},{"issue":"12","key":"14_CR25","first-page":"57","volume":"43","author":"B. Shneiderman","year":"2000","unstructured":"B. Shneiderman, \u201cDesigning Trust into Online Experiences\u201d, ACM, Special Issue on \u201cTrusting Technology\u201d, Communications of the ACM, vol 43, no 12, p..57\u201359, December 2000.","journal-title":"ACM, Special Issue on \u201cTrusting Technology\u201d, Communications of the ACM"},{"key":"14_CR26","unstructured":"A. Tabachnick and L. Fidell, Using Multivariate Statistics, 4th ed, pub. Allyn & Bacon, 2000."},{"key":"14_CR27","unstructured":"Trusted Computing Platform Alliance, Building A Foundation of Trust in the PC, White Paper, January 2000. Available via http:\/\/www.trustedcomputing.org"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Trusted Computing Platform Alliance, TCPA Main Specification, Version 1.1, 2001. Available via http:\/\/www.trustedcomputing.org","DOI":"10.1016\/S1353-4858(01)00312-9"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"J. D. Tygar \u201cAtomicity in electronic commerce\u201d, Proc. 15th Annual ACM Symposium on Principles of Distributed Computing, Philadelphia, USA, May 1996, p. 8\u201326, New York, 1996.","DOI":"10.1145\/248052.248054"},{"key":"14_CR30","unstructured":"World Wide Web Consortium, Platform for Privacy Preferences Specification 1.0. http:\/\/www.w3.org\/TR\/P3P\/"}],"container-title":["Lecture Notes in Computer Science","Trust, Reputation, and Security: Theories and Practice"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36609-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T17:55:41Z","timestamp":1556733341000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36609-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540009887","9783540366096"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/3-540-36609-1_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}