{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:13:49Z","timestamp":1743092029556,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319470719"},{"type":"electronic","value":"9783319470726"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47072-6_7","type":"book-chapter","created":{"date-parts":[[2016,9,20]],"date-time":"2016-09-20T21:20:20Z","timestamp":1474406420000},"page":"94-110","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-Preserving Targeted Mobile Advertising: Formal Models and Analysis"],"prefix":"10.1007","author":[{"given":"Yang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Simpson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,22]]},"reference":[{"unstructured":"Abe, A., Simpson, A.C.: Formal models for privacy. In: Proceedings of the 9th International Workshop on Privacy and Anonymity in the Information Society (PAIS 2016). Bordeaux, France (2016)","key":"7_CR1"},{"unstructured":"Ahn, H., Kim, K.J., Han, I.: Mobile advertisement recommender system using collaborative filtering: MAR-CF. In: Proceedings of the 2006 Conference of the Korea Society of Management Information Systems, pp. 709\u2013715. The Korea Society of Management Information Systems (2006)","key":"7_CR2"},{"unstructured":"Beales, H.: The value of behavioral targeting (2010). \n                      http:\/\/www.networkadvertising.org\/pdfs\/Beales_NAI_Study.pdf\n                      \n                     Accessed April 2015","key":"7_CR3"},{"doi-asserted-by":"crossref","unstructured":"Farahat, A.: Privacy preserving frequency capping in Internet banner advertising. In: Proceedings of the 18th International Conference on World Wide Web (WWW 2009), pp. 1147\u20131148. ACM, Madrid, Spain (2009)","key":"7_CR4","DOI":"10.1145\/1526709.1526900"},{"issue":"1","key":"7_CR5","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1287\/mnsc.1100.1246","volume":"57","author":"A Goldfarb","year":"2011","unstructured":"Goldfarb, A., Tucker, C.E.: Privacy regulation and online advertising. Manag. Sci. 57(1), 57\u201371 (2011)","journal-title":"Manag. Sci."},{"unstructured":"Guha, S., Cheng, B., Francis, P.: Privad: Practical privacy in online advertising. In: Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI 2011), pp. 169\u2013182. Boston, MA, USA (2011)","key":"7_CR6"},{"issue":"2","key":"7_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1764873.1764877","volume":"40","author":"H Haddadi","year":"2010","unstructured":"Haddadi, H.: Fighting online click-fraud using bluff ads. ACM SIGCOMM Comput. Commun. Rev. 40(2), 21\u201325 (2010)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"doi-asserted-by":"crossref","unstructured":"Haddadi, H., Hui, P., Brown, I.: MobiAd: Private and scalable mobile advertising. In: Proceedings of the 5th ACM International Workshop on Mobility in the Evolving Internet Architecture (MobiArch 2010), pp. 33\u201338. ACM, Chicago, IL, USA (2010)","key":"7_CR8","DOI":"10.1145\/1859983.1859993"},{"doi-asserted-by":"crossref","unstructured":"Hardt, M., Nath, S.: Privacy-aware personalization for mobile advertising. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS 2012), pp. 662\u2013673. ACM, Raleigh, NC, USA (2012)","key":"7_CR9","DOI":"10.1145\/2382196.2382266"},{"unstructured":"ISO\/IEC: ISO\/IEC 13658: Information Technology \u2013 Z Formal Specification Notation \u2013 Syntax, Type System and Semantics. ISO\/IEC (2002)","key":"7_CR10"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/978-3-540-30482-1_3","volume-title":"Formal Methods and Software Engineering","author":"J Jacky","year":"2004","unstructured":"Jacky, J.: Model-based testing with spec#. In: Davies, J., Schulte, W., Barnett, M. (eds.) ICFEM 2004. LNCS, vol. 3308, pp. 5\u20136. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Liu, Y., Simpson, A.C.: Privacy-preserving targeted mobile advertising: Requirements, design, and a prototype implementation. Software: Practice and Experience (2016). \n                      http:\/\/dx.doi.org\/10.1002\/spe.2403","key":"7_CR12","DOI":"10.1002\/spe.2403"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/978-3-540-73210-5_25","volume-title":"Integrated Formal Methods","author":"D Plagge","year":"2007","unstructured":"Plagge, D., Leuschel, M.: Validating Z specifications using the ProB animator and model checker. In: Davies, J., Gibbons, J. (eds.) IFM 2007. LNCS, vol. 4591, pp. 480\u2013500. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Roesner, F., Kohno, T., Moshchuk, A., Parno, B., Wang, H.J., Cowan, C.: User-driven access control: Rethinking permission granting in modern operating systems. In: Proceedings of the 2012 IEEE Symposium on Security and privacy (SP 2012), pp. 224\u2013238. IEEE, San Francisco, CA, USA (2012)","key":"7_CR14","DOI":"10.1109\/SP.2012.24"},{"unstructured":"Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., Barocas, S.: Adnostic: Privacy preserving targeted advertising. In: Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS 2010). San Diego, CA, USA (2010), April 6, 2016. \n                      https:\/\/www.isoc.org\/isoc\/conferences\/ndss\/10\/pdf\/05.pdf","key":"7_CR15"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-05089-3_1","volume-title":"FM 2009: Formal Methods","author":"MC Tschantz","year":"2009","unstructured":"Tschantz, M.C., Wing, J.M.: Formal methods for privacy. In: Cavalcanti, A., Dams, D.R. (eds.) FM 2009. LNCS, vol. 5850, pp. 1\u201315. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Yan, J., Liu, N., Wang, G., Zhang, W., Jiang, Y., Chen, Z.: How much can behavioral targeting help online advertising? In: Proceedings of the 18th International Conference on World Wide Web (WWW 2009), pp. 261\u2013270. ACM, Madrid, Spain (2009)","key":"7_CR17","DOI":"10.1145\/1526709.1526745"},{"issue":"4","key":"7_CR18","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/S0957-4174(02)00189-6","volume":"24","author":"ST Yuan","year":"2003","unstructured":"Yuan, S.T., Tsao, Y.W.: A recommendation mechanism for contextualized mobile advertising. Expert Syst. Appl. 24(4), 399\u2013414 (2003)","journal-title":"Expert Syst. Appl."}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Security Assurance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47072-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:30:34Z","timestamp":1558315834000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47072-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319470719","9783319470726"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47072-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"22 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}