{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:35:01Z","timestamp":1725798901468},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319100845"},{"type":"electronic","value":"9783319100852"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10085-2_23","type":"book-chapter","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T23:14:54Z","timestamp":1408490094000},"page":"248-262","source":"Crossref","is-referenced-by-count":2,"title":["Dynamic Privacy Policy Management in Services-Based Interactions"],"prefix":"10.1007","author":[{"given":"Nariman","family":"Ammar","sequence":"first","affiliation":[]},{"given":"Zaki","family":"Malik","sequence":"additional","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]},{"given":"Abdelmounaam","family":"Rezgui","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"The bio2rdf project, \n                    \n                      http:\/\/s4.semanticscience.org\/bio2rdf\/"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (2001)","DOI":"10.1145\/375551.375602"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Johnson, C., et al.: Securing electronic health records without impeding the flow of information. International Journal of Medical Informatics (2007)","DOI":"10.1016\/j.ijmedinf.2006.09.015"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Barhamgi, M., Benslimane, D., Ghedira, C., Gancarski, A.L.: Privacy-preserving data mashup. In: International Conference on Advanced Information Networking and Applications (AINA) (2011)","DOI":"10.1109\/AINA.2011.47"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Barhamgi, M., Benslimane, D., Medjahed, B.: A query rewriting approach for web service composition. Transactions on Services Computing (2010)","DOI":"10.1109\/TSC.2010.4"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Bhatti, R., Bertino, E., Ghafoor, A.: A trust-based context-aware access control model for web-services. In: International Conference on Web Services (2004)","DOI":"10.1109\/ICWS.2004.1314738"},{"key":"23_CR7","unstructured":"Brown, G., Pocock, A., Zhao, M.-J., Luj\u00e1n, M.: Conditional Likelihood Maximisation: A Unifying Framework for Information Theoretic Feature Selection. The Journal of Machine Learning Research (2012)"},{"key":"23_CR8","unstructured":"Christopoulou, E., Goumopoulos, C., Zaharakis, I., Kameas, A.: An ontology-based conceptual model for composing context-aware applications. Research Academic Computer Technology Institute (2004)"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Ferrini, R., Bertino, E.: Supporting rbac with xacml+ owl. In: Symposium on Access Control Models and Technologies (2009)","DOI":"10.1145\/1542207.1542231"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Fung, B., Trojer, T., Hung, P.C., Xiong, L., Al-Hussaeni, K., Dssouli, R.: Service-oriented architecture for high-dimensional private data mashup. IEEE Transactions on Services Computing (2012)","DOI":"10.1109\/TSC.2011.13"},{"key":"23_CR11","unstructured":"Grandison, T., Ganta, S.R., Braun, U., Kaufman, J., et al.: Protecting privacy while sharing medical data between regional healthcare entities. Studies in Health Technology and Informatics (2007)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: An update (2009)","DOI":"10.1145\/1656274.1656278"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Kasthuri, S., Meyyappan, T.: Detection of sensitive items in market basket database using association rule mining for privacy preserving. In: International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME) (2013)","DOI":"10.1109\/ICPRIME.2013.6496472"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J.: On the efficiency of checking perfect privacy. In: SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (2006)","DOI":"10.1145\/1142351.1142375"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. Transactions on Knowledge Discovery from Data (TKDD) (2007)","DOI":"10.1145\/1217299.1217302"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Mohammed, N., Fung, B., Hung, P.C., Lee, C.-K.: Anonymizing healthcare data: a case study on the blood transfusion service. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2009)","DOI":"10.1145\/1557019.1557157"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Mont, M.C., Thyne, R.: Privacy policy enforcement in enterprises with identity management solutions. In: International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services (2006)","DOI":"10.1145\/1501434.1501465"},{"key":"23_CR18","unstructured":"Nguyen, H.-V., Choi, Y.: Proactive detection of ddos attacks utilizing k-nn classifier in an anti-ddos framework. International Journal of Electrical, Computer, and Systems Engineering (2010)"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Pallapa, G., Di Francescoy, M., Das, S.K.: Adaptive and context-aware privacy preservation schemes exploiting user interactions in pervasive environments. In: International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) (2012)","DOI":"10.1109\/WoWMoM.2012.6263765"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Rahmouni, H.B., Solomonides, T., Mont, M.C., Shiu, S.: Privacy compliance in european healthgrid domains: An ontology-based approach. In: International Symposium on Computer-Based Medical Systems, CBMS (2009)","DOI":"10.1109\/CBMS.2009.5255423"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (2002)","DOI":"10.1142\/S021848850200165X"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Villata, S., Costabello, L., Delaforge, N., Gandon, F.: A social semantic web access control model. Journal on Data Semantics (2013)","DOI":"10.1007\/978-3-7091-0894-9_6"},{"key":"23_CR23","unstructured":"Wang, K., Fung, B.C., Philip, S.Y.: Handicapping attacker\u2019s confidence: an alternative to k-anonymization. Knowledge and Information Systems (2007)"}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10085-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T12:52:18Z","timestamp":1558961538000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10085-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319100845","9783319100852"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10085-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}