{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:30:10Z","timestamp":1725496210115},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540768890"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76890-6_6","type":"book-chapter","created":{"date-parts":[[2007,11,21]],"date-time":"2007-11-21T10:37:06Z","timestamp":1195641426000},"page":"804-813","source":"Crossref","is-referenced-by-count":5,"title":["Managing Pervasive Environment Privacy Using the \u201cfair trade\u201d Metaphor"],"prefix":"10.1007","author":[{"given":"Abraham","family":"Esquivel","sequence":"first","affiliation":[]},{"given":"Pablo A.","family":"Haya","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Garc\u00eda-Herranz","sequence":"additional","affiliation":[]},{"given":"Xavier","family":"Alam\u00e1n","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"6_CR1","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/2.940014","volume":"34","author":"J. Hightower","year":"2001","unstructured":"Hightower, J., Borriello, G.: Location Systems for Ubiquitous Computing. IEEE Computer\u00a034(8), 57\u201366 (2001)","journal-title":"IEEE Computer"},{"issue":"1","key":"6_CR2","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MPRV.2003.1186716","volume":"2","author":"A. Stone","year":"2003","unstructured":"Stone, A.: The Dark Side of Pervasive Computing. IEEE Pervasive Computing\u00a02(1), 4\u20138 (2003)","journal-title":"IEEE Pervasive Computing"},{"issue":"3","key":"6_CR3","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1145\/355324.355325","volume":"7","author":"A. Dix","year":"2000","unstructured":"Dix, A., Rodden, T., Davies, N., Trevor, J., Friday, A., Palfreyman, K.: Exploiting space and location as a design framework for interactive mobile systems. ACM Trans. Comput.-Hum. Interact.\u00a07(3), 285\u2013321 (2000)","journal-title":"ACM Trans. Comput.-Hum. Interact."},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Dey, K.A.: Understanding and Using Context. Personal Ubiquitous Computing 5(1) (2001)","DOI":"10.1007\/s007790170019"},{"issue":"1","key":"6_CR5","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/128756.128759","volume":"10","author":"R. Want","year":"1992","unstructured":"Want, R., Hoper, A., Falcao, V., Gibbons, J.: The Active Badge location system. ACM Trans. on Information Systems\u00a010(1), 91\u2013102 (1992)","journal-title":"ACM Trans. on Information Systems"},{"key":"6_CR6","volume-title":"Privacy and Freedom","author":"A.F. Westin","year":"1967","unstructured":"Westin, A.F.: Privacy and Freedom. Atheneum, NY (1967)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Hengartner, U., Steenkiste, P.: Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. In: 1st IEEE\/CreateNet Intl. Conf. on Security and Privacy for Emerging Areas in Communication Nerworks (IEEE\/CreateNet SecureComm 2005) (2005)","DOI":"10.1109\/SECURECOMM.2005.18"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Kagal, L., Finin, T., Joshi, A.: A Policy Language for a Pervasive Computing Environment. In: IEEE 4th Intl. Workshop on Policies for Distributed Systems and Networks (2003)","DOI":"10.1109\/POLICY.2003.1206958"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of the 1st Intl. Conf. on Mobile Systems, Applications, and Services MobiSys (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"6_CR10","unstructured":"Al-Muhtadi, J., Campbell, H.R., Kapadia, A., Dennis, M.M., Yi, S.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: 22th Intl. Conf. on Distributed Computing Systems (22th ICDCS 2002), Vienna, Austria (2002)"},{"key":"6_CR11","unstructured":"Lederer, S.: Designing Disclosure: Interactive Personal Privacy at the Dawn of Ubiquitous Computing. Research Project Report, Master of Science, Computer Science Division, University of California, Berkeley (2003)"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 237\u2013245. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76890-6_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:45:49Z","timestamp":1619520349000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76890-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540768890"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76890-6_6","relation":{},"subject":[]}}