{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:54:18Z","timestamp":1742914458172,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030425036"},{"type":"electronic","value":"9783030425043"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-42504-3_8","type":"book-chapter","created":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T18:03:57Z","timestamp":1583863437000},"page":"109-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Ontology-Based Modeling of Privacy Vulnerabilities for Data Sharing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9176-2024","authenticated-orcid":false,"given":"Jens Hjort","family":"Schwee","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9995-758X","authenticated-orcid":false,"given":"Fisayo Caleb","family":"Sangogboye","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6133-9030","authenticated-orcid":false,"given":"Aslak","family":"Johansen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5124-744X","authenticated-orcid":false,"given":"Mikkel Baun","family":"Kj\u00e6rgaard","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,3,6]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Ardakanian, O., Bhattacharya, A., Culler, D.: Non-intrusive techniques for establishing occupancy related energy savings in commercial buildings. In: BuildSys 2016, pp. 21\u201330 (2016)","DOI":"10.1145\/2993422.2993574"},{"key":"8_CR2","unstructured":"Arendt, K., et al.: Room-level occupant counts, airflow and CO$$_2$$ data from an office building. In: Proceedings of the First Workshop on Data Acquisition To Analysis, DATA 2018, pp. 13\u201314 (2018)"},{"issue":"3\u20134","key":"8_CR3","first-page":"21:1","volume":"14","author":"IB Arief-Ang","year":"2018","unstructured":"Arief-Ang, I.B., Hamilton, M., Salim, F.D.: A scalable room occupancy prediction with transferable time series decomposition of CO$$_2$$ sensor data. ACM Trans. Sens. Netw. 14(3\u20134), 21:1\u201321:28 (2018)","journal-title":"ACM Trans. Sens. Netw."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Arief-Ang, I.B., Salim, F.D., Hamilton, M.: CD-HOC: indoor human occupancy counting using carbon dioxide sensor data. arXiv preprint arXiv:1706.05286 (2017)","DOI":"10.1145\/3137133.3137146"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1016\/j.apenergy.2018.02.091","volume":"226","author":"B Balaji","year":"2018","unstructured":"Balaji, B., et al.: Brick: metadata schema for portable smart building applications. Appl. Energy 226, 1273\u20131292 (2018)","journal-title":"Appl. Energy"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/j.energy.2014.10.025","volume":"78","author":"C Beckel","year":"2014","unstructured":"Beckel, C., Sadamori, L., Staake, T., Santini, S.: Revealing household characteristics from smart meter data. Energy 78, 397\u2013410 (2014)","journal-title":"Energy"},{"key":"8_CR7","unstructured":"California State Legislature: California Consumer Privacy Act of 2018, June 2018. https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180AB375"},{"key":"8_CR8","unstructured":"Carrara, W., Oudkerk, F., Van Steenbergen, E., Tinholt, D.: Open data goldbook for data managers and data holders, February 2018"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"8_CR10","series-title":"Springer Proceedings in Energy","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1007\/978-3-030-00662-4_57","volume-title":"Cold Climate HVAC 2018","author":"JW Dziedzic","year":"2019","unstructured":"Dziedzic, J.W., Yan, D., Novakovic, V.: Real time measurement of dynamic metabolic factor (D-MET). In: Johansson, D., Bagge, H., Wahlstr\u00f6m, \u00c5. (eds.) CCC 2018. SPE, pp. 677\u2013688. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-00662-4_57"},{"key":"8_CR11","unstructured":"European Parliament and Council of the European Union: Regulations (EU) 2016\/679 of the European Parliament and of the Council - general data protection regulation (GDPR). Official Journal of the European Union L119, 1\u201388 (2016). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"issue":"4","key":"8_CR12","doi-asserted-by":"publisher","first-page":"14:1","DOI":"10.1145\/1749603.1749605","volume":"42","author":"BCM Fung","year":"2010","unstructured":"Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14:1\u201314:53 (2010)","journal-title":"ACM Comput. Surv."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Kaur, M., Salim, F.D., Ren, Y., Chan, J., Tomko, M., Sanderson, M.: Shopping intent recognition and location prediction from cyber-physical activities via Wi-Fi logs. In: Proceedings of the 5th Conference on Systems for Built Environments, BuildSys 2018, pp. 130\u2013139 (2018)","DOI":"10.1145\/3276774.3276786"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Khalil, N., Benhaddou, D., Gnawali, O., Subhlok, J.: Sonicdoor: scaling person identification with ultrasonic sensors by novel modeling of shape, behavior and walking patterns. In: BuildSys 2017, pp. 3:1\u20133:10 (2017)","DOI":"10.1145\/3229064"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Kj\u00e6rgaard, M.B., Johansen, A., Sangogboye, F., Holmegaard, E.: Occure: an occupancy reasoning platform for occupancy-driven applications. In: CBSE 2016, pp. 39\u201348 (2016)","DOI":"10.1109\/CBSE.2016.14"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Kleiminger, W., Beckel, C., Santini, S.: Household occupancy monitoring using electricity meters. In: UbiComp 2015, pp. 975\u2013986 (2015)","DOI":"10.1145\/2750858.2807538"},{"key":"8_CR17","unstructured":"Klyne, G., Carroll, J., McBride, B.: RDF 1.1 concepts and abstract syntax, February 2014. https:\/\/www.w3.org\/TR\/rdf11-concepts\/. Accessed 18 Oct 2019"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. In: ICDE 2006, pp. 24\u201324, April 2006","DOI":"10.1109\/ICDE.2006.1"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Nergiz, M.E., Atzori, M., Clifton, C.: Hiding the presence of individuals from shared databases. In: SIGMOD 2007 (2007)","DOI":"10.1145\/1247480.1247554"},{"key":"8_CR20","unstructured":"Office of the Australian Information Commissioner: Privacy Act 1988, Compilation No. 81, August 2019. https:\/\/www.legislation.gov.au\/Details\/C2019C00241"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Pappachan, P., et al.: Towards privacy-aware smart buildings: capturing, communicating, and enforcing privacy policies and preferences. In: ICDCSW, pp. 193\u2013198 (2017)","DOI":"10.1109\/ICDCSW.2017.52"},{"key":"8_CR22","unstructured":"European Parliament, Council of the European Union: Directive 2002\/58\/EC of the European parliament and of the council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (directive on privacy and electronic communications). Official Journal of the European Union L201, 37\u201347 (2002). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L:2002:201:TOC"},{"key":"8_CR23","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.enpol.2016.11.046","volume":"101","author":"S Pfenninger","year":"2017","unstructured":"Pfenninger, S., DeCarolis, J., Hirth, L., Quoilin, S., Staffell, I.: The importance of open data and software: is energy research lagging behind? Energy Policy 101, 211\u2013215 (2017). https:\/\/doi.org\/10.1016\/j.enpol.2016.11.046","journal-title":"Energy Policy"},{"key":"8_CR24","unstructured":"Prudhommeaux, E.: SPARQL query language for RDF (2008). http:\/\/www.w3.org\/TR\/rdf-sparql-query\/"},{"key":"8_CR25","doi-asserted-by":"publisher","first-page":"239","DOI":"10.5897\/IJPS11.1795","volume":"10","author":"H Rashid Asmaa","year":"2015","unstructured":"Rashid Asmaa, H., Mohd Yasin, N.: Privacy preserving data publishing: review. Int. J. Phys. Sci. 10, 239\u2013247 (2015)","journal-title":"Int. J. Phys. Sci."},{"issue":"1","key":"8_CR26","doi-asserted-by":"publisher","first-page":"3069","DOI":"10.1038\/s41467-019-10933-3","volume":"10","author":"L Rocher","year":"2019","unstructured":"Rocher, L., Hendrickx, J.M., de Montjoye, Y.A.: Estimating the success of re-identifications in incomplete datasets using generative models. Nat. Commun. 10(1), 3069 (2019)","journal-title":"Nat. Commun."},{"issue":"6","key":"8_CR27","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1007\/s12273-017-0397-5","volume":"10","author":"FC Sangogboye","year":"2017","unstructured":"Sangogboye, F.C., Arendt, K., Singh, A., Veje, C.T., Kj\u00e6rgaard, M.B., J\u00f8rgensen, B.N.: Performance comparison of occupancy count estimation and prediction with common versus dedicated sensors for building model predictive control. Build. Simul. 10(6), 829\u2013843 (2017)","journal-title":"Build. Simul."},{"key":"8_CR28","unstructured":"Schwee, J., Sangogboye, F., Kj\u00e6rgaard, M.: Evaluating practical privacy attacks for building data anonymized by standard methods. In: IoTSec 2019, April 2019"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Sonta, A.J., Jain, R.K.: Inferring occupant ties: automated inference of occupant network structure in commercial buildings. In: BuildSys 2018, pp. 126\u2013129 (2018)","DOI":"10.1145\/3276774.3276779"},{"issue":"05","key":"8_CR30","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. Data for Better Living: AI and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-42504-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,10]],"date-time":"2024-03-10T01:20:50Z","timestamp":1710033650000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-42504-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030425036","9783030425043"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-42504-3_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Privacy and Identity","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Summer School on Privacy and Identity Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Windisch","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Switzerland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"privacy-identity2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifip-summerschool.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}