{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:46:42Z","timestamp":1725565602922},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540219590"},{"type":"electronic","value":"9783540246930"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24693-0_28","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T02:02:45Z","timestamp":1284170565000},"page":"332-344","source":"Crossref","is-referenced-by-count":13,"title":["A Secure Web Services for Location Based Services in Wireless Networks"],"prefix":"10.1007","author":[{"given":"Minsoo","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jintaek","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Sehyun","family":"Park","sequence":"additional","affiliation":[]},{"given":"Jaeil","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Seoklae","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","volume-title":"Geopriv Requirements","author":"J Ceullar","year":"2003","unstructured":"Jorge Ceullar, John B. Morris, Deirdre Mulligan, Jon Peterson and James Polk, \u201cGeopriv Requirements,\u201d draft-ietf-geopriv-reqs-0.3, 3, 2003\u201307\u201330"},{"key":"28_CR2","unstructured":"WLIA, \u201cAdopted WLIA Privacy Policy (First Revision),\u201d \n                    http:\/\/www.wliaonline.com\n                    \n                  \n                  \/indstandard\/privacy.html"},{"key":"28_CR3","volume-title":"Location Privacy","author":"D Greening","year":"2002","unstructured":"Dan Greening, \u201cLocation Privacy,\u201d location interoperability forum, 2002"},{"key":"28_CR4","unstructured":"Shereen Fink, \u201cThe Fine Line Between Location-Based Services & Privacy,\u201d \n                    http:\/\/www.sun.com\n                    \n                  \n                  \/aboutsun\/media\/presskits\/sp\/"},{"issue":"(l)","key":"28_CR5","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1023\/A:1018777802208","volume":"6","author":"U Leonhardt","year":"1998","unstructured":"Ulf Leonhardt and Jeff Magee., \u201cSecurity Considerations for a Distributed Location Service\u201d, Journal of Network and System Management, Vol 6(l):51\u201370, March 1998.","journal-title":"Journal of Network and System Management"},{"key":"28_CR6","volume-title":"XML-Signature Syntax and Processing","author":"D Eastlake","year":"2002","unstructured":"W3C Recommendation. D. Eastlake, J. Reagle, and D. Solo., \u201cXML-Signature Syntax and Processing\u201d, February 2002."},{"key":"28_CR7","volume-title":"XML Encryption Syntax and Processing","author":"T Imamura","year":"2002","unstructured":"W3C Recommendation T. Imamura, B. Dillaway, J. Schaad, E. Simon., \u201cXML Encryption Syntax and Processing\u201d, December 2002."},{"key":"28_CR8","volume-title":"Security Assertion Markup Language (SAML) 1.0","author":"OASIS Standard","year":"2002","unstructured":"OASIS Standard, Security Assertion Markup Language (SAML) 1.0, November 2002."},{"key":"28_CR9","volume-title":"Professional Web Services Secuirty","author":"B Galbraith","year":"2002","unstructured":"Ben Galbraith, et al., Professional Web Services Secuirty, Wrox Press, 2002."},{"key":"28_CR10","volume-title":"Role(s) of a proxy in location based services","author":"A Escudero-Pascual","year":"2002","unstructured":"Alberto Escudero-Pascual, Gerald Q. Maguire Jr., \u201cRole(s) of a proxy in location based services\u201d 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. PIMRC2002. Lisbone. Portugal. September 2002."},{"key":"28_CR11","unstructured":"W3C working draft, \u201cXML Key Management Specification (XKMS) v 2.0\u201d, April 2003."},{"key":"28_CR12","unstructured":"OpenSSL, \n                    http:\/\/www.openssl.org\n                    \n                  \n                  \/"},{"key":"28_CR13","unstructured":"OpenSAML, \n                    http:\/\/www.opensaml.org\n                    \n                  \n                  \/"},{"key":"28_CR14","volume-title":"Location, location, location-based services","author":"H Srivatsa","year":"2002","unstructured":"Harsha Srivatsa, \u201cLocation, location, location-based services\u201d, IBM, November 2002."},{"key":"28_CR15","volume-title":"Mobile Location Protocol (MLP), TS 101 Specification Version 3.0.0 6","author":"Location Inter-operability Forum (LIF)","year":"2002","unstructured":"Location Inter-operability Forum (LIF), Mobile Location Protocol (MLP), TS 101 Specification Version 3.0.0 6, June 2002."},{"key":"28_CR16","volume-title":"Privacy Guidelines","author":"Location Inter-operability Forum (LIF)","year":"2002","unstructured":"Location Inter-operability Forum (LIF), \u201cPrivacy Guidelines\u201d, LIF TR 101 Report, 2002"},{"key":"28_CR17","unstructured":"3GPP, Enhanced support for User Privacy in location services, TR 23.871,"},{"key":"28_CR18","volume-title":"A Request for Technology In Support of an OGC Web Services Initiative","author":"Open GIS Consortium (OGC)","year":"2003","unstructured":"Open GIS Consortium (OGC), \u201cA Request for Technology In Support of an OGC Web Services Initiative,\u201d 2003"},{"key":"28_CR19","series-title":"IEEE Transactions on Mobile Computing","volume-title":"An Approach to Agent-Based Service Composition and Its Application to Mobile Business Processes","author":"M Berger","year":"2003","unstructured":"Michael Berger, et al., \u201cAn Approach to Agent-Based Service Composition and Its Application to Mobile Business Processes\u201d, IEEE Transactions on Mobile Computing, VOL. 2, NO. 3, July-September 2003."},{"key":"28_CR20","series-title":"Computer Communications, Vol.23","first-page":"588","volume-title":"Security Broker for multimedia wireless LANs","author":"A Ganz","year":"2000","unstructured":"Aura Ganz, Se Hyun Park, and Zvi Ganz, \u201cSecurity Broker for multimedia wireless LANs\u201d, Computer Communications, Vol.23, issue 5\u20136, pp. 588\u2013592, March 2000."},{"key":"28_CR21","unstructured":"Alberto Escudero-Pascual, Thijs Holleboom, and Simone Fischer-Hiibner, \u201cPrivacy for Location Data in mobile networks\u201d"},{"key":"28_CR22","volume-title":"Privacy and Location-based Stating the Policies Clearly","author":"E Beinat","year":"2001","unstructured":"Euro Beinat, \u201cPrivacy and Location-based Stating the Policies Clearly\u201d, GEO Informatics, Volume 4, September 2001"},{"key":"28_CR23","volume-title":"Beresford and Frank Stajano, \u201cLocation Privacy in Pervasive Computing\u201d, PERVASIVE computing","author":"R Alastair","year":"2003","unstructured":"Alastair R. Beresford and Frank Stajano, \u201cLocation Privacy in Pervasive Computing\u201d, PERVASIVE computing, January-March 2003."},{"key":"28_CR24","volume-title":"Performance of Computer Communication Systems: A Model-Based Approach","author":"BRH John","year":"1999","unstructured":"Boudewijn R. Haverkort John, \u201cPerformance of Computer Communication Systems: A Model-Based Approach\u201d, Wiley & Sons, October 1999."},{"key":"28_CR25","series-title":"Technical Report TR-I4-95-08","volume-title":"A Generalized Analysis technique for queueing networks with mixed priority strategy and class switching","author":"G Bolch","year":"1995","unstructured":"Gunter Bolch, Stefan Greiner, Kishor Trevedi, \u201cA Generalized Analysis technique for queueing networks with mixed priority strategy and class switching\u201d, Technical Report TR-I4\u201395-08, Oct. 1995."}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24693-0_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:03:42Z","timestamp":1620011022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24693-0_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540219590","9783540246930"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24693-0_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}