{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:07:02Z","timestamp":1742389622292},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255215"},{"type":"electronic","value":"9783540320043"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-32004-3_6","type":"book-chapter","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T21:15:56Z","timestamp":1278882956000},"page":"48-55","source":"Crossref","is-referenced-by-count":9,"title":["Secure Identity Management for Pseudo-Anonymous Service Access"],"prefix":"10.1007","author":[{"given":"Michael","family":"Hitchens","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Judy","family":"Kay","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bob","family":"Kummerfeld","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ajay","family":"Brar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"3","key":"6_CR1","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/MPRV.2002.1037723","volume":"1","author":"X. Jiang","year":"2002","unstructured":"Jiang, X., Landay, J.A.: Modeling Privacy Control in Context-Aware Systems. IEEE Pervasive Computing\u00a01(3), 59\u201363 (2002)","journal-title":"IEEE Pervasive Computing"},{"issue":"1","key":"6_CR2","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MPRV.2003.1186726","volume":"2","author":"G. Myles","year":"2003","unstructured":"Myles, G., Friday, A., Davies, N.: Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing\u00a02(1), 56\u201364 (2003)","journal-title":"IEEE Pervasive Computing"},{"issue":"1","key":"6_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A. Beresford","year":"2003","unstructured":"Beresford, A., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing\u00a02(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"6_CR4","volume-title":"Ninth Workshop on Hot Topics in Operating Systems (HotOS IX)","author":"U. Hengartner","year":"2003","unstructured":"Hengartner, U., Steenkiste, P.: Access Control to Information in Pervasive Computing Environments. In: Ninth Workshop on Hot Topics in Operating Systems (HotOS IX). ACM, New York (2003)"},{"issue":"2","key":"6_CR5","first-page":"18","volume":"2","author":"I. Ishitani","year":"2003","unstructured":"Ishitani, I., Almedia, V., Meira, W.: Masks: Bringing Anonymity and Personalisation Together. IEEE Pervasive Computing\u00a02(2), 18\u201323 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"6_CR6","unstructured":"Goldberg, A.: A Pseudonymous Communications Infrastructure for the Internet, PhD Thesis, University of California at Berkely (2000)"},{"key":"6_CR7","unstructured":"Vinge, V.: True Names, Dell Books (1981)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36532-X_1","volume-title":"Software Security \u2013 Theories and Systems","author":"R.H. Campbell","year":"2003","unstructured":"Campbell, R.H., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards security and privacy for pervasive computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol.\u00a02609, pp. 1\u201315. Springer, Heidelberg (2003)"},{"key":"6_CR9","unstructured":"Rao, J., Rohatgi, P.: Can Pseudonymity Really Guarantee Privacy? In: 9th USENIX Security Symposium, Denver, USA (August 2000), pp. 85\u201396."},{"key":"6_CR10","first-page":"203","volume-title":"Proceedings of AH\u20192002, Adaptive Hypertext 2002","author":"J. Kay","year":"2002","unstructured":"Kay, J., Kummerfeld, R.J., Lauder, P.: Personis: a server for user models. In: De Bra, P., Brusilovsky, P., Conejo, R. (eds.) Proceedings of AH 2002, Adaptive Hypertext 2002, pp. 203\u2013212. Springer, Heidelberg (2002)"},{"issue":"2","key":"6_CR11","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/767193.767196","volume":"3","author":"A. Kobsa","year":"2003","unstructured":"Kobsa, A., Schreck, J.: Privacy through Pseudonymity in User-Adaptive Systems. ACM Transactions on Internet Technology\u00a03(2), 149\u2013183 (2003)","journal-title":"ACM Transactions on Internet Technology"},{"key":"6_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-83230-7","volume-title":"User Models in Dialog Systems","author":"A. Kobsa","year":"1989","unstructured":"Kobsa, A.: A Taxonomy of Beliefs and Goals for User Models in Dialog Systems. In: Kobsa, A., Wahlster, W. (eds.) User Models in Dialog Systems. Springer Symbolic Computation, New York (1989)"},{"issue":"1-2","key":"6_CR13","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1023\/A:1011187500863","volume":"11","author":"A. Kobsa","year":"2001","unstructured":"Kobsa, A.: Generic User Modeling Systems. User Modeling and User-Adapted Interaction\u00a011(1-2), 49\u201363 (2001)","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 237\u2013245. Springer, Heidelberg (2002)"},{"issue":"1","key":"6_CR15","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MPRV.2003.1186726","volume":"2","author":"G. Myles","year":"2003","unstructured":"Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing\u00a02(1), 56\u201364 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"6_CR16","unstructured":"Pfitzmann, A., Hansen, M.: Anonymity, Unobservability, Pseudonymity and Identity Management \u2013 A Proposal for Terminology, http:\/\/www.freehaven.net\/anonbib\/cache\/terminology.pdf"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Hitchens, M., Kay, J., Kummerfeld, R.J.: School of Information Technologies, Secure identity management for pseudo-anonymous service access. TR 546 School of Information Technologies, University of Sydney (June 2004)","DOI":"10.1007\/978-3-540-32004-3_6"},{"key":"6_CR18","unstructured":"Brar, A., Kay, J.: Privacy and Security in Ubiquitous Personalized Applications. TR 561. School of Information Technologies, University of Sydney (November 2004)"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-32004-3_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:33:55Z","timestamp":1605760435000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-32004-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255215","9783540320043"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-32004-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}