{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:01:47Z","timestamp":1725512507295},"publisher-location":"Boston, MA","reference-count":24,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387094274"},{"type":"electronic","value":"9780387094281"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09428-1_14","type":"book-chapter","created":{"date-parts":[[2008,5,17]],"date-time":"2008-05-17T15:28:30Z","timestamp":1211038110000},"page":"215-230","source":"Crossref","is-referenced-by-count":1,"title":["A Model for Reasoning About the Privacy Impact of Composite Service Execution in Pervasive Computing"],"prefix":"10.1007","author":[{"given":"Roberto Speicys","family":"Cardoso","sequence":"first","affiliation":[]},{"given":"Val\u00e9rie","family":"Issarny","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P., ter Hofstede, A.H.M.: YAWL: Yet Another Workflow Language. In-formation Systems 30(4) (2005)","DOI":"10.1016\/j.is.2004.02.002"},{"key":"14_CR2","unstructured":"Axelrod, R.: Structure of Decision: The Cognitive Maps of Political Elites. Princeton Univer-sity Press (1976)"},{"key":"14_CR3","unstructured":"Ben Mokhtar, S., Georgantas, N., Issarny, V.: COCOA: COnversation-based Service COmpo-sition in PervAsive Computing Environments. In: ICPS\u201906: Proceedings of the IEEE International Conference on Pervasive Services (2006)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Botha, R.A., Eloff, J.H.P.: Separation of Duties for Access Control Enforcement in Workflow Environments. IBM Systems Journal 40(3) (2001)","DOI":"10.1147\/sj.403.0666"},{"key":"14_CR5","unstructured":"Carlsson, C., Full \u00e9r, R.: Adaptive Fuzzy Cognitive Maps for Hyperknowledge Representation in Strategy Formation Process. In: Proceedings of International Panel Conference on Soft and Intelligent Computing (1996)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Chafle, G., Chandra, S., Mann, V., Nanda, M.G.: Orchestrating Composite Web Services under Data Flow Constraints. In: ICWS \u201905: Proceedings of the IEEE International Conference on Web Services (2005)","DOI":"10.1109\/ICWS.2005.88"},{"key":"14_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/VRAIS.1993.380742","volume-title":"Virtual Worlds as Fuzzy Cognitive Maps","author":"JA Dickerson","year":"1993","unstructured":"Dickerson, J.A., Kosko, B.: Virtual Worlds as Fuzzy Cognitive Maps. In: Proceedings of the IEEE Virtual Reality Annual International Symposium (1993)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Falcone, R., Pezzulo, G., Castelfranchi, C.: A Fuzzy Approach to a Belief-Based Trust Com-putation. In: Trust, Reputation, and Security: Theories and Practice (2003)","DOI":"10.1007\/3-540-36609-1_7"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Golle, P.: Revisiting the Uniqueness of Simple Demographics in the U.S. Population. In: WPES \u201906: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society (2006)","DOI":"10.1145\/1179601.1179615"},{"key":"14_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.1992.258761","volume-title":"Extended Fuzzy Cognitive Maps","author":"M Hagiwara","year":"1992","unstructured":"Hagiwara, M.: Extended Fuzzy Cognitive Maps. In: IEEE International Conference on Fuzzy Systems (1992)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Irwin, K., Yu, T.: An Identifiability-Based Access Control Model for Privacy Protection in Open Systems. In: WPES \u201904: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society (2004)","DOI":"10.1145\/1029179.1029194"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Kang, I., Lee, S., Choi, J.: Using Fuzzy Cognitive Maps for the Relationship Management in Airline Service. Expert Systems with Applications 26(4) (2004)","DOI":"10.1016\/j.eswa.2003.10.012"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Knorr, K., Stormer, H.: Modeling and Analyzing Separation of Duties in Workflow Environ-ments. In: Sec \u201901: Proceedings of the 16th International Conference on Information Security: Trusted Information (2001)","DOI":"10.1007\/0-306-46998-7_14"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Kosko, B.: Fuzzy Cognitive Maps. International Journal of Man-Machine Studies 24(1) (1986)","DOI":"10.1016\/S0020-7373(86)80040-2"},{"key":"14_CR15","unstructured":"Kosko, B.: Neural Networks and Fuzzy Systems: A Dynamical Systems Approach to Machine Intelligence. Prentice-Hall International Editions (1991)"},{"key":"14_CR16","unstructured":"O\u2019Harrow, Jr., R.: No Place to Hide. Free Press (2005)"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Parsopoulos, K.E., Papageorgiou, E.I., Groumpos, P.P., Vrahatis, M.N.: A First Study of Fuzzy Cognitive Maps Learning Using Particle Swarm Optimization. In: CEC \u201903: The 2003 Congress on Evolutionary Computation (2003)","DOI":"10.1109\/CEC.2003.1299840"},{"key":"14_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS.1996.541174","volume-title":"Fuzzy Cognitive Maps for Policy Analysis","author":"K Perusich","year":"1996","unstructured":"Perusich, K.: Fuzzy Cognitive Maps for Policy Analysis. In: Proceedings of the International Symposium on Technology and Society Technical Expertise and Public Decisions (1996)"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Rajasekaran, P., Miller, J., Verma, K., Sheth, A.: Enhancing Web Services Description and Discovery to Facilitate Composition. In: SWSWPC \u201904: Proceedings of the First International Workshop on Semantic Web Services and Web Process Composition (2004)","DOI":"10.1007\/978-3-540-30581-1_6"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Singh, M.P., Huhns, M.N.: Service-Oriented Computing - Semantics, Processes, Agents. John Wiley and Sons (2005)","DOI":"10.1002\/0470091509"},{"key":"14_CR21","unstructured":"Sirin, E., Hendler, J., Parsia, B.: Semi-automatic Composition of Web Services Using Seman-tic Descriptions. In: Web Services: Modeling, Architecture and Infrastructure Workshop in conjunction with ICEIS 2003 (2003)"},{"key":"14_CR22","unstructured":"Stylios, C.D., Groumpos, P.P.: Fuzzy Cognitive Maps in Modeling Supervisory Control Sys-tems. Journal of Intelligent and Fuzzy Systems 8(2) (2000)"},{"key":"14_CR23","unstructured":"Sweeney, L.: Uniqueness of Simple Demographics in the U.S. Population. Tech. Rep. LIDAP-WP4, Carnegie Mellon University, Laboratory for International Data Privacy, Pittsburgh, PA (2000)"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in Privacy Preserving Data Mining. ACM SIGMOD Record 33(1) (2004)","DOI":"10.1145\/974121.974131"}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Trust Management II"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09428-1_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:33:04Z","timestamp":1605648784000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09428-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387094274","9780387094281"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09428-1_14","relation":{},"subject":[]}}