{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:51:25Z","timestamp":1742968285794,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319630878"},{"type":"electronic","value":"9783319630885"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63088-5_1","type":"book-chapter","created":{"date-parts":[[2017,7,11]],"date-time":"2017-07-11T07:57:45Z","timestamp":1499759865000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Anonymity-Preserving Methods for Client-Side Filtering in Position-Based Collaboration Approaches"],"prefix":"10.1007","author":[{"given":"Henrik","family":"Detjen","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Hoffmann","sequence":"additional","affiliation":[]},{"given":"Gerd","family":"Bumiller","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Geisler","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Jansen","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Markard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,12]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJISCRAM.2015040101","volume":"7","author":"H Detjen","year":"2015","unstructured":"Detjen, H., Hoffmann, S., R\u00f6sner, L., Winter, S., Geisler, S., Kr\u00e4mer, N., Bumiller, G.: Integrating volunteers into rescue processes: analysis of user requirements and mobile app conception. Int. J. Inf. Syst. Crisis Response Manag. 7, 1\u201318 (2015)","journal-title":"Int. J. Inf. Syst. Crisis Response Manag."},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10, 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond K-anonymity. ACM Trans. Knowl. Discov. Data 1, 3 (2007)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). doi:\n                    10.1007\/11787006_1"},{"key":"1_CR6","volume-title":"Privatheit und Datenschutz in der intelligenten \u00dcberwachung","author":"H-H Vagts","year":"2013","unstructured":"Vagts, H.-H.: Privatheit und Datenschutz in der intelligenten \u00dcberwachung. KIT Scientific Publishing, Karlsruhe (2013)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, San Francisco, California (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Masoumzadeh, A., Joshi, J., Karimi, H.A.: LBS (K, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users. In: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, Seattle, Washington (2009)","DOI":"10.1145\/1653771.1653845"},{"key":"1_CR9","unstructured":"European Commission, \u201ceuropa.eu\u201d. \n                    http:\/\/ec.europa.eu\/eurostat\/de\/web\/population-and-housing-census\/census-data\/2011-census\n                    \n                  . Accessed May 10 2016"},{"key":"1_CR10","unstructured":"Kim, J.: A method for limiting disclosure in microdata based on random noise and transformation. In: Proceedings of the Section on Survey Research Methods of the American (1986)"}],"container-title":["Lecture Notes in Computer Science","Collaboration Technologies and Social Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63088-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T05:28:30Z","timestamp":1559107710000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63088-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319630878","9783319630885"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63088-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"12 July 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CollabTech","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Collaboration Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saskatoon, SK","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"collabtech2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.collabtech.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}