{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T17:40:30Z","timestamp":1738258830176,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540691365"},{"type":"electronic","value":"9783540693048"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-69304-8_55","type":"book-chapter","created":{"date-parts":[[2008,6,9]],"date-time":"2008-06-09T05:47:18Z","timestamp":1212990438000},"page":"514-519","source":"Crossref","is-referenced-by-count":5,"title":["Privacy-Aware Access Control through Negotiation in Daily Life Service"],"prefix":"10.1007","author":[{"given":"Hyun-A","family":"Park","sequence":"first","affiliation":[]},{"given":"Justin","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: The 28th International Conference on Very Large Databases (VLDB) (2002)","key":"55_CR1","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"55_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11741060_1","volume-title":"Construction and Analysis of Safe, Secure, and Interoperable Smart Devices","author":"C.A. Ardagna","year":"2006","unstructured":"Ardagna, C.A., Damiani, E., Cremonini, M., De Capitani di Vimercati, S., Samarati, P.: The architecture of a privacy-aware access control decision component. In: Barthe, G., Gr\u00e9goire, B., Huisman, M., Lanet, J.-L. (eds.) CASSIS 2005. LNCS, vol.\u00a03956. Springer, Heidelberg (2006)"},{"unstructured":"Ashley, P., Hada, S., Powers, C., Schunter, M.: Enterprise Privacy Authorization Language (EPAL). IBM Research (2003)","key":"55_CR3"},{"unstructured":"Byun, J., Bertino, E., Li, N.: Purpose-based access control for privacy protection in relational database systems. Technical Report 2004-52, Purdue University (2004)","key":"55_CR4"},{"doi-asserted-by":"crossref","unstructured":"Byun, J., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Symposium on Access Control Models and Technologies Proceedings of the tenth ACM symposium on Access control models and technologies, pp. 102\u2013110 (2005)","key":"55_CR5","DOI":"10.1145\/1063979.1063998"},{"unstructured":"Cavoukian, A.: Genetic Privacy: the right \u201cnot to know\u201d, Notes for Remarksin 10th World Congress on Medical Law (1994)","key":"55_CR6"},{"unstructured":"Mont, M.C., Pearson, S., Bramhall, P.: An Adaptive Privacy Management System For Data Repositories, HPL-2004-211 (November 18, 2004)","key":"55_CR7"},{"unstructured":"Wu, C., Potdar, V., Chang, E.: A conceptual framework for privacy policy negotiation in web services. In: Furnell, S.M., Dowland, P.S. (eds.) Sixth International Network Conference (INC), pp. 195\u2013202 (2006)","key":"55_CR8"},{"doi-asserted-by":"crossref","unstructured":"Eldin\u2019, Wagenaar, R.: IEEE International Conference on Towards users driven privacy control 2004, vol.\u00a05, pp. 4673\u20134679 (2004)","key":"55_CR9","DOI":"10.1109\/ICSMC.2004.1401269"},{"key":"55_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/11568285_5","volume-title":"Ambient Networks","author":"W. Hommel","year":"2005","unstructured":"Hommel, W.: An Architecture for Privacy-Aware Inter-domain Identity Management. In: Sch\u00f6nw\u00e4lder, J., Serrat, J. (eds.) DSOM 2005. LNCS, vol.\u00a03775, pp. 49\u201360. Springer, Heidelberg (2005)"},{"unstructured":"Hatakeyama, M., Gomi, H.: Privacy Policy Negotiation Framework for Attribute Exchange. In: W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement (2006)","key":"55_CR11"},{"unstructured":"El-Khatib, K.: A Privacy Negotiation Protocol for Web Services. In: Workshop on Collaboration Agents: Autonomous Agents for Collaborative Environments Halifax (2003)","key":"55_CR12"},{"doi-asserted-by":"crossref","unstructured":"LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D.: Disclosure in Hippocratic databases. In: The 30th International Conference onVery Large Databases (VLDB) (August 2004)","key":"55_CR13","DOI":"10.1016\/B978-012088469-8.50013-9"},{"key":"55_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/11802167_11","volume-title":"Embedded and Ubiquitous Computing","author":"H.J. Mun","year":"2006","unstructured":"Mun, H.J., Lee, K.M., Lee, S.H.: Person-Wise Privacy Level Access Control for Personal Information Directory Services. In: Sha, E., Han, S.-K., Xu, C.-Z., Kim, M.-H., Yang, L.T., Xiao, B. (eds.) EUC 2006. LNCS, vol.\u00a04096, pp. 89\u201396. Springer, Heidelberg (2006)"},{"key":"55_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-540-74835-9_6","volume-title":"Computer Security \u2013 ESORICS 2007","author":"Q. Ni","year":"2007","unstructured":"Ni, Q., Lin, D., Bertino, E., Lobo, J.: Conditional Privacy-Aware Role Based Access Control. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 72\u201389. Springer, Heidelberg (2007)"},{"unstructured":"Al-Fedaghi, S.S.: Beyond Purpose-Based Privacy Access Control. In: Bailey, J., Fekete, A. (eds.) Australasian Database ADC 2007. CRPIT 63, Ballarat, Australia, pp. 23\u201332. ACS (2007)","key":"55_CR16"},{"unstructured":"P3P. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, The Wolrld Wide Web Consortium (2002) (April 16, 2002), http:\/\/www.w3.org\/p3p\/","key":"55_CR17"},{"unstructured":"http:\/\/www.istmobilife.org\/index.php?option=com_content&task=view&id=41&Itemid=51","key":"55_CR18"},{"unstructured":"http:\/\/www.newsfactor.com\/perl\/story\/20064.html","key":"55_CR19"},{"unstructured":"http:\/\/www.ist-mobilife.org\/images\/stories\/architecture%20wp5.pdf","key":"55_CR20"},{"unstructured":"http:\/\/www.acm.org\/crossroads\/xrds11-2\/spa_article.html","key":"55_CR21"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69304-8_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T17:09:14Z","timestamp":1738256954000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69304-8_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540691365","9783540693048"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69304-8_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}