{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:36:32Z","timestamp":1743104192987,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642008863"},{"type":"electronic","value":"9783642008870"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00887-0_39","type":"book-chapter","created":{"date-parts":[[2009,3,19]],"date-time":"2009-03-19T09:49:36Z","timestamp":1237456176000},"page":"441-455","source":"Crossref","is-referenced-by-count":16,"title":["Optimal Privacy-Aware Path in Hippocratic Databases"],"prefix":"10.1007","author":[{"given":"Min","family":"Li","sequence":"first","affiliation":[]},{"given":"Xiaoxun","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yanchun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","first-page":"143","volume-title":"Proceedings of VLDB 2002","author":"R. Agrawal","year":"2002","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic Databases. In: Proceedings of VLDB 2002, pp. 143\u2013154. Morgan Kaufmann, San Francisco (2002)"},{"key":"39_CR2","first-page":"86","volume-title":"Proceedings of SIGMOD 2003","author":"R. Agrawal","year":"2003","unstructured":"Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: Proceedings of SIGMOD 2003, pp. 86\u201397. ACM Press, New York (2003)"},{"key":"39_CR3","unstructured":"Ashley, P., Powers, C.S., Schunter, M.: Privacy promises, access control, and privacy management. In: Third International Symposium on Electronic Commerce (2002)"},{"key":"39_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-39650-5_10","volume-title":"Computer Security \u2013 ESORICS 2003","author":"M. Backes","year":"2003","unstructured":"Backes, M., Pfitzmann, B., Schunter, M.: A toolkit for managing enterprise privacy policies. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 162\u2013180. Springer, Heidelberg (2003)"},{"issue":"7","key":"39_CR5","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1109\/TKDE.2004.1318565","volume":"16","author":"E. Bertino","year":"2004","unstructured":"Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-X: A Peer-to-Peer Framework for Trust Establishment. IEEE Trans. Knowl. Data Eng.\u00a016(7), 827\u2013842 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"39_CR6","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proc. IEEE Symp. Security Privacy, pp. 164\u2013173 (1996)"},{"issue":"3","key":"39_CR7","first-page":"203","volume":"8","author":"P. Bresciani","year":"2004","unstructured":"Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., Perini, A.: TROPOS: An agent-oriented software development methodology. JAAMAS\u00a08(3), 203\u2013236 (2004)","journal-title":"JAAMAS"},{"key":"39_CR8","first-page":"102","volume-title":"Proceedings of SACMAT 2005","author":"J.W. Byun","year":"2005","unstructured":"Byun, J.W., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Proceedings of SACMAT 2005, pp. 102\u2013110. ACM Press, New York (2005)"},{"key":"39_CR9","unstructured":"Byun, J.W., Bertino, E., Li, N.: Purpose based access control for privacy protection in relational database systems. Technical Report 2004-52, Purdue University"},{"key":"39_CR10","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M., Reagle, J.: The platform for privacy preferences 1.0 (P3P1.0) specification. W3C recommendation (2002), \n                    \n                      http:\/\/www.w3.org\/TR\/P3P\/"},{"key":"39_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-540-24741-8_3","volume-title":"Advances in Database Technology - EDBT 2004","author":"E. Ferrari","year":"2004","unstructured":"Ferrari, E., Thuraisingham, B.: Security and privacy for web databases and services. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B\u00f6hm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol.\u00a02992, pp. 17\u201328. Springer, Heidelberg (2004)"},{"issue":"4","key":"39_CR12","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/637411.637416","volume":"31","author":"T. Finin","year":"2002","unstructured":"Finin, T., Joshi, A.: Agents, trust, and information access on the semantic web. ACM SIGMODRec\u00a031(4), 30\u201335 (2002)","journal-title":"ACM SIGMODRec"},{"key":"39_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-24747-0_14","volume-title":"Trust Management","author":"P. Giorgini","year":"2004","unstructured":"Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Requirements engineering meets trust management. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol.\u00a02995, pp. 176\u2013190. Springer, Heidelberg (2004)"},{"key":"39_CR14","first-page":"167","volume-title":"Proceedings of RE 2005","author":"P. Giorgini","year":"2005","unstructured":"Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modeling security requirements through ownership, permission and delegation. In: Proceedings of RE 2005, pp. 167\u2013176. IEEE Press, Lausanne (2005)"},{"key":"39_CR15","first-page":"40","volume":"73","author":"C. Handy","year":"1995","unstructured":"Handy, C.: Trust and the virtual organization. Harv. Bus. Rev.\u00a073, 40\u201350 (1995)","journal-title":"Harv. Bus. Rev."},{"key":"39_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-36467-6_6","volume-title":"Privacy Enhancing Technologies","author":"G. Karjoth","year":"2003","unstructured":"Karjoth, G., Schunter, M., Waidner, M.: Platform for enterprise privacy practices: Privacy-enabled management of customer data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 69\u201384. Springer, Heidelberg (2003)"},{"key":"39_CR17","unstructured":"Massacci, F., Zannone, N.: Privacy is linking permission to purpose. In: Proceedings of the 12th International Workshop on Sec. protocols (2004)"},{"key":"39_CR18","volume-title":"Problem solving methods in AI","author":"N.J. Nilsson","year":"1971","unstructured":"Nilsson, N.J.: Problem solving methods in AI. McGraw-Hill, New York (1971)"},{"key":"39_CR19","volume-title":"Principles of Artificial Intelligence","author":"N.J. Nilsson","year":"1994","unstructured":"Nilsson, N.J.: Principles of Artificial Intelligence. Morgan Kaufmann, San Francisco (1994)"},{"key":"39_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-36467-6_10","volume-title":"Privacy Enhancing Technologies","author":"K.E. Seamons","year":"2003","unstructured":"Seamons, K.E., Winslett, M., Yu, T., Yu, L., Jarvis, R.: Protecting privacy during on-line trust negotiation. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 129\u2013143. Springer, Heidelberg (2003)"},{"key":"39_CR21","unstructured":"Tumer, A., Dogac, A., Toroslu, H.: A Semantic based Privacy framework forweb services. In: Proceedings of ESSW 2003 (2003)"},{"key":"39_CR22","first-page":"244","volume-title":"Proceedings of ICPADS 1997","author":"M. Yasuda","year":"1997","unstructured":"Yasuda, M., Tachikawa, T., Takizawa, M.: Information flow in a purpose-oriented access control model. In: Proceedings of ICPADS 1997, pp. 244\u2013249. IEEE Press, Lausanne (1997)"},{"key":"39_CR23","unstructured":"World Wide Web Consortium (W3C). A P3P Preference Exchange Language 1.0 (APPEL 1.0), \n                    \n                      www.w3.org\/TR\/P3P-preferences"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00887-0_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:53:04Z","timestamp":1558266784000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00887-0_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642008863","9783642008870"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00887-0_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}