{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:06:29Z","timestamp":1725541589613},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_24","type":"book-chapter","created":{"date-parts":[[2009,11,28]],"date-time":"2009-11-28T03:33:01Z","timestamp":1259379181000},"page":"193-200","source":"Crossref","is-referenced-by-count":0,"title":["A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments"],"prefix":"10.1007","author":[{"given":"Yuan","family":"Tian","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Biao","family":"Song","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eui-Nam","family":"Huh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"4","key":"24_CR1","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1179\/030801803225008677","volume":"28","author":"K.S. Jones","year":"2003","unstructured":"Jones, K.S.: Privacy: What\u2019 different now? Interdiscip. Sci. Rev.\u00a028(4), 287\u2013292 (2003)","journal-title":"Interdiscip. Sci. Rev."},{"key":"24_CR2","series-title":"Information and Software Technology","first-page":"337","volume-title":"Towards the development of privacy-aware systems","author":"P. Guarda","year":"2009","unstructured":"Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Information and Software Technology, pp. 337\u2013350. Butterworth-Heinemann, Newton (2009)"},{"key":"24_CR3","first-page":"102","volume-title":"Symposium on Access Control Models and Technologies","author":"J. Byun","year":"2005","unstructured":"Byun, J., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Symposium on Access Control Models and Technologies, pp. 102\u2013110. ACM, New York (2005)"},{"key":"24_CR4","first-page":"603","volume-title":"Purpose Based Access Control for Privacy Protection in Relational Database","author":"J.-W. Byun","year":"2008","unstructured":"Byun, J.-W., Li, N.: Purpose Based Access Control for Privacy Protection in Relational Database, vol.\u00a017(4), pp. 603\u2013619. Springer, Heidelberg (2008)"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of the 28th VLDB Conference, Hong Kong, China, pp. 143\u2013154 (2002)","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"issue":"3","key":"24_CR6","first-page":"203","volume":"8","author":"P. Bresciani","year":"2004","unstructured":"Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., Perini, A.: TROPOS: An agent-oriented software development methodology. JAAMAS\u00a08(3), 203\u2013236 (2004)","journal-title":"JAAMAS"},{"issue":"2","key":"24_CR7","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.autcon.2007.03.004","volume":"17","author":"C.-C. Lin","year":"2008","unstructured":"Lin, C.-C., Wang, W.-C., Yu, W.-D.: Improving AHP for construction with an adaptive AHP approach(A3). Automation in Construction\u00a017(2), 180\u2013187 (2008)","journal-title":"Automation in Construction"},{"key":"24_CR8","unstructured":"Massacci, F., Mylopoulos, J.P., Zannone, N.: Hierarchical hippocratic databases with mnimal disclosure for virtual organizations. Springer, Heidelberg"},{"key":"24_CR9","unstructured":"Federal Trade Commission. Privacy online: Fair information practices in the electronic marketplace: A report to congress (May 2000), \n                  \n                    http:\/\/www.ftc.gov\/reports\/privacy2000\/privacy2000.pdf"},{"key":"24_CR10","unstructured":"Tian, Y., Song, B., Huh, E.-n.: A Threat-based Privacy Preservation System in Untrusted Environment (in press)"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T01:38:55Z","timestamp":1558402735000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_24","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}