{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:23Z","timestamp":1725558983358},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255215"},{"type":"electronic","value":"9783540320043"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-32004-3_18","type":"book-chapter","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T17:15:56Z","timestamp":1278868556000},"page":"164-178","source":"Crossref","is-referenced-by-count":12,"title":["Privacy for Profitable Location Based Services"],"prefix":"10.1007","author":[{"given":"Tobias","family":"K\u00f6lsch","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lothar","family":"Fritsch","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Markulf","family":"Kohlweiss","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dogan","family":"Kesdogan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-18730-8","volume-title":"Mobile Commerce: Grundlagen und Techniken","author":"K. Turowski","year":"2004","unstructured":"Turowski, K., Pousttchi, K.: Mobile Commerce: Grundlagen und Techniken. Springer, Berlin (2004)"},{"key":"18_CR2","unstructured":"Camponovo, G., Pigneur, Y.: Business model analysis applied to mobile business. In: ICEIS 2003 (2003)"},{"key":"18_CR3","unstructured":"PRIME WP 14.0:PRIME Public Deliverable D14.0a Framework V0. Technical report (2004) , http:\/\/www.prime-project.eu.int"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Myllymaki, J., Edlund, S.: Location Aggregation from Multiple Sources. In: Society, I.C., ed.: Proceedings of the Third International Conference on Mobile Data Management (MDM 2002), Singapore (2002)","DOI":"10.1109\/MDM.2002.994393"},{"key":"18_CR5","volume-title":"Information Age Economy","author":"F. Rose","year":"1999","unstructured":"Rose, F.: The economics, concept and design of information intermediaries - A theoretic approach. In: Information Age Economy. Physica-Verlag, Heidelberg (1999)"},{"key":"18_CR6","unstructured":"Barkhuus, L., Dey, A.: Location Based Services for Mobile Telephony: a study of users\u2019 privacy concerns (2003)"},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1080\/01972240252818207","volume":"18","author":"K. Sheehan","year":"2002","unstructured":"Sheehan, K.: Toward a Typology of Internet Users and Online Privacy Concerns. The Information Society\u00a018, 21\u201332 (2002)","journal-title":"The Information Society"},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1509\/jppm.19.1.62.16949","volume":"19","author":"K.B. Sheehan","year":"2000","unstructured":"Sheehan, K.B., Grubbs Hoy, M.: Dimensions of Privacy Concern among Online Consumers. Journal of Public Policy and Marketing\u00a019, 62\u201373 (2000)","journal-title":"Journal of Public Policy and Marketing"},{"key":"18_CR9","unstructured":"Federal Trade Commission: Privacy Online: Fair Information Practices in the Electronic Marketplace. Technical report (2000)"},{"issue":"2","key":"18_CR10","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1080\/019722499128565","volume":"15","author":"Gary T. Marx","year":"1999","unstructured":"Marx, G.: What\u2019s in a name? - Some reflections on the Sociology of Anonymity. The Information Society\u00a015 (1999)","journal-title":"The Information Society"},{"key":"18_CR11","unstructured":"Federrath, H., Jerichow, A., Kesdogan, D., Pfitzmann, A.: Security in Public Mobile Communication Networks. In: IFIP TC 6 International Workshop on Personal Wireless Communications, Aachen, Verlag der Augustinus Buchhandlung, pp. 105\u2013116 (1995)"},{"issue":"2","key":"18_CR12","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"David L. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a04(2) (1981)","journal-title":"Communications of the ACM"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Camenish, J., van Herreweghen, E.: Design and Implementation of the Idemix Anonymous Credential System - Research Report RZ 3419. Technical report, Z\u00fcrich (2002)","DOI":"10.1145\/586110.586114"},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A.R. Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing\u00a02, 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), pp. 31\u201342 (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"18_CR16","unstructured":"Ashley, P., Hada, S., G\u00fcnter, K., Powers, C., Schunter, M.: Enterprise Privacy Authorization Language (EPAL 1.1) - IBM Research Report. Technical report (2003), http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/Specification\/index.html"},{"key":"18_CR17","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification - W3C Recommendation. Technical report (2002)"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Snekkenes, E.: Concepts for personal location privacy policies. In: Proceedings of the 3rd ACM conference on Electronic Commerce, Tampa, Florida, USA, pp. 48\u201357 (2001)","DOI":"10.1145\/501158.501164"},{"key":"18_CR19","unstructured":"Jaisingh, J., Metha, S., Chaturvedi, A.: Privacy and Information Markets: An experimental study. In: PACIS,Volume Proceedings of the PACIS 2004, Shanghai (2004)"},{"key":"18_CR20","volume-title":"Economics of Information Security.","author":"A. Acquisti","year":"2004","unstructured":"Acquisti, A.: Privacy and Security of Personal Information - Economic Incentives and Technological Solutions. In: Camp, J.L., Lewis, S. (eds.) Economics of Information Security. Kluwer, Dordrecht (2004)"},{"key":"18_CR21","unstructured":"Oinonen, K.: TR101 - LIF Privacy Guidelines. (2002)"},{"key":"18_CR22","first-page":"297","volume":"28","author":"M. M\u00fcller","year":"2004","unstructured":"M\u00fcller, M.: Standards for Geographic Location and Privacy: IETF\u2019s Geopriv. Datenschutz und Datensicherheit (DuD)\u00a028, 297\u2013303 (2004)","journal-title":"Datenschutz und Datensicherheit (DuD)"},{"key":"18_CR23","unstructured":"GSM Association: Location Based Services - Permanent Reference Document SE.23. Technical report (2003)"},{"key":"18_CR24","unstructured":"Marbrouk, M., et. al.: OpenGIS Location Services (OpenLS): Core Services (2004)"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Synnes, K., Nord, J., Parnes, P.: Location Privacy in the Alipes Platform. Technical report, Lulea, Sweden (2002)","DOI":"10.1109\/HICSS.2003.1174843"},{"key":"18_CR26","unstructured":"Huber, M., Dietl, T., Kammerl, J., Dornbusch, P.: Collecting and providing location information: The location trader. In: MoMuc, M\u00fcnchen, TU M\u00fcnchen (2003)"},{"issue":"2","key":"18_CR27","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/S1389-1286(01)00217-1","volume":"37","author":"Sebastian Clau\u00df","year":"2001","unstructured":"Clau\u00df, S., K\u00f6hntopp, M.: Identity management and its support of multilateral security. Computer Networks 205\u2013219 (2001), http:\/\/drim.inf.tu-dresden.de\/","journal-title":"Computer Networks"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Jendricke, U., tom Markotten, D.G.: Usability meets security - the identity-manager as your personal security assistant for the internet. In: Proceedings of 16th Annual Computer Security Applications Conference, New Orleans, USA (2000)","DOI":"10.1109\/ACSAC.2000.898889"},{"key":"18_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/BFb0055871","volume-title":"Computer Security \u2013 ESORICS 98","author":"D. Kesdogan","year":"1998","unstructured":"Kesdogan, D., Reichl, P., Jungh\u00e4rtchen, K.: Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 295\u2013312. Springer, Heidelberg (1998)"},{"key":"18_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-540-25955-8_17","volume-title":"Privacy in Statistical Databases","author":"W.E. Winkler","year":"2004","unstructured":"Winkler, W.E.: Re-identification methods for masked microdata. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol.\u00a03050, pp. 216\u2013230. Springer, Heidelberg (2004)"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)","DOI":"10.21236\/ADA465464"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-32004-3_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:33:52Z","timestamp":1605742432000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-32004-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255215","9783540320043"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-32004-3_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}