{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:47:02Z","timestamp":1725515222890},"publisher-location":"Boston, MA","reference-count":15,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387096988"},{"type":"electronic","value":"9780387096995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09699-5_39","type":"book-chapter","created":{"date-parts":[[2008,7,16]],"date-time":"2008-07-16T18:12:54Z","timestamp":1216231974000},"page":"605-620","source":"Crossref","is-referenced-by-count":0,"title":["Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data"],"prefix":"10.1007","author":[{"given":"Indrajit","family":"Ray","sequence":"first","affiliation":[]},{"given":"Sudip","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"Ackerman, M., Cranor, L., Reagle, J.: Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. Communications of the ACM (1999)","DOI":"10.1145\/336992.336995"},{"issue":"3","key":"39_CR2","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/69.390247","volume":"7","author":"P. Bonatti","year":"1995","unstructured":"Bonatti, P., Kraus, S.: Foundations on Secure Deductive Databases. IEEE Transactions on Knowledge and Data Engineering 7(3), 406\u2013422 (1995)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"39_CR3","unstructured":"Corp., A.: Privacy Bird Project. http:\/\/www.privacybird.org"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Cranor, L., et al.: The Platform for Privacy Preferences 1.1 (P3P 1.1). Tech. rep., World Wide Web Consortium (2004)","DOI":"10.1016\/S1742-6847(04)00019-9"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer, J.: Inference Control in Statistical Databases from Theory to Practice. Volume 2316. Springer (2002)","DOI":"10.1007\/3-540-47804-3"},{"key":"39_CR6","unstructured":"Goecks, J., Mynatt, E.: Enabling Privacy Management in Ubiquitous Computing Environments Through Trust and Reputation. In: Proceedings of CSCW 2002 Workshop on Privacy in Digital Environments. New Orleans, LA (2002)"},{"issue":"2","key":"39_CR7","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1006\/knac.1993.1008","volume":"5","author":"T.R. Gruber","year":"1993","unstructured":"Gruber, T.R.: A Translation Approach to Portable Ontology Specifications. Knowledge Acquisition 5(2), 199\u2013220 (1993)","journal-title":"Knowledge Acquisition"},{"issue":"1","key":"39_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A. Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data 1(1), Article 3 (2007)","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"39_CR9","unstructured":"Nguyen, D., Mynatt, E.: Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems. Technical Report GIT-GVU-02-16, Georgia Institute of Technology (2002)"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Ray, I., Chakraborty, S.: A Vector Model of Trust for Developing Trustworthy Systems. In: Proceedings of the 9th European Symposium on Research in Computer Security, pp. 260\u2013275. Sophia Antipolis, France (2004)","DOI":"10.1007\/978-3-540-30108-0_16"},{"issue":"6","key":"39_CR11","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting Respondents\u2019 Identities in Microdata Release. IEEE Transactions on Knowledge and Data Engineering (TKDE) 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering (TKDE)"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Samarati, P., Sweeney, L.: Generalizing Data to Provide Anonymity When Disclosing Information. In: Proceedings of the 17th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. Seattle, WA (1998)","DOI":"10.1145\/275487.275508"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Shand, B., Dimmock, N., Bacon, J.: Trust for Ubiquitous, Transparent Collaboration. In: Proceedings of the 1st IEEE International Conference on Pervasive Computing and Communications. Dallas, TX (2003)","DOI":"10.1109\/PERCOM.2003.1192737"},{"issue":"5","key":"39_CR14","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: K-Anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuziness and Knowledge-based Systems 10(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuziness and Knowledge-based Systems"},{"issue":"2","key":"39_CR15","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1017\/S0269888900007797","volume":"11","author":"M. Uschold","year":"1996","unstructured":"Uschold, M., Gr\u00fcninger, M.: Ontologies: Principles, Methods, and Applications. Knowledge Engineering Review 11(2), 93\u2013155 (1996)","journal-title":"Knowledge Engineering Review"}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Proceedings of The Ifip Tc 11 23rd International Information Security Conference"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09699-5_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:45:46Z","timestamp":1619574346000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09699-5_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387096988","9780387096995"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09699-5_39","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}