{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:53:33Z","timestamp":1725558813995},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642142819"},{"type":"electronic","value":"9783642142826"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14282-6_8","type":"book-chapter","created":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T10:29:39Z","timestamp":1277720979000},"page":"102-111","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-Respecting Access Control in Collaborative Workspaces"],"prefix":"10.1007","author":[{"given":"Stefanie","family":"P\u00f6tzsch","sequence":"first","affiliation":[]},{"given":"Katrin","family":"Borcea-Pfitzmann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Ardagna, C.A., Camenisch, J., Kohlweiss, M., Leenes, R., Neven, G., Priem, B., Samarati, P., Sommer, D., Verdicchio, M.: Exploiting Cryptography for Privacy-Enhanced Access Control: A result of the PRIME Project. Journal of Computer Security, JCS (2009) (to appear)","DOI":"10.3233\/JCS-2010-0367"},{"key":"8_CR2","unstructured":"Adams, A.: The implications of users\u2019 privacy perception on communication and information privacy policies. In: Proceedings of Telecommunications Policy Research Conference, Washington, DC (1999)"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM\u00a028, 1030\u20131044 (1985)","journal-title":"Communications of the ACM"},{"issue":"2","key":"8_CR4","first-page":"12","volume":"3","author":"R.H. Cutler","year":"1995","unstructured":"Cutler, R.H.: Distributed presence and community in cyberspace. Interpersonal Computer and Technology\u00a03(2), 12\u201332 (1995)","journal-title":"Interpersonal Computer and Technology"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Camenisch, J., van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 21\u201330 (2002)","DOI":"10.1145\/586110.586114"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Franz, E., Wahrig, H., B\u00f6ttcher, A., Borcea-Pfitzmann, K.: Access Control in A Privacy-Aware eLearning Environment. In: First International Conference on Availability, Reliability and Security, pp. 879\u2013886 (2006)","DOI":"10.1109\/ARES.2006.20"},{"issue":"47","key":"8_CR7","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1524\/itit.2005.47.6.352","volume":"6","author":"M. Hansen","year":"2005","unstructured":"Hansen, M., Borcea-Pfitzmann, K., Pfitzmann, A.: PRIME - Ein europ\u00e4isches Projekt f\u00fcr nutzerbestimmtes Identit\u00e4tsmanagement. It - Information Technology, Oldenbourg\u00a06(47), 352\u2013359 (2005)","journal-title":"It - Information Technology, Oldenbourg"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.1109\/APSCC.2008.106","volume-title":"APSCC 2008: Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference","author":"D.-Y. Kao","year":"2008","unstructured":"Kao, D.-Y., Wang, S.-J., Mathur, K., Jain, S., Huang, F.F.-Y.: Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet. In: APSCC 2008: Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference, Washington, DC, USA, pp. 1364\u20131368. IEEE Computer Society, Los Alamitos (2008)"},{"key":"8_CR9","unstructured":"Lampson, B.: Protection. In: 5th Princeton Symposium on Information Science and Systems, pp. 437\u2013443 (1971)"},{"key":"8_CR10","first-page":"226","volume-title":"IFIP Advances in Information and Communication Technology","author":"S. P\u00f6tzsch","year":"2009","unstructured":"P\u00f6tzsch, S.: Privacy Awareness: A Means to Solve the Privacy Paradox? In: IFIP Advances in Information and Communication Technology, vol.\u00a0298, pp. 226\u2013236. Springer, Boston (2009)"},{"key":"8_CR11","unstructured":"P\u00f6tzsch, S.: Untersuchung des Einflusses von wahrgenommener Privatsph\u00e4re und Anonymit\u00e4t auf die Kommunikation in einer Online-Community. In: Fischer, S., Maehle, E., Reischuk, R. (eds.) Informatik 2009, Im Fokus das Leben, L\u00fcbeck, Bonn, September 28-October 2. LNI, vol.\u00a0154, pp. 2152\u20132165. Gesellschaft fr Informatik (2009)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Pek\u00e1rek, M., P\u00f6tzsch, S.: A comparison of privacy issues in collaborative workspaces and social networks. In: Identity in the Information Society, Special Issue on Social Web and Identity (2009)","DOI":"10.1007\/s12394-009-0016-4"},{"key":"8_CR13","unstructured":"Razavi, M.N., Iverson, L.: Towards usable privacy for social software. Technical Report LERSSE-TR-2007-03, University of British Columbia (2007)"},{"key":"8_CR14","unstructured":"Razavi, M.N., Iverson, L.: Supporting selective information sharing with people-tagging. In: Proceedings of the ACM CHI 2008 Extended Abstracts on Human Factors in Computing Systems, Florence, Italy (April 2008)"},{"issue":"2","key":"8_CR15","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"issue":"1","key":"8_CR16","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1057977.1057979","volume":"37","author":"W. Tolone","year":"2005","unstructured":"Tolone, W., Ahn, G.-J., Pai, T., Hong, S.-P.: Access control in collaborative systems. ACM Comput. Surv.\u00a037(1), 29\u201341 (2005)","journal-title":"ACM Comput. Surv."},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/266741.266748","volume-title":"RBAC 1997: Proceedings of the second ACM workshop on Role-based access control","author":"R.K. Thomas","year":"1997","unstructured":"Thomas, R.K.: Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In: RBAC 1997: Proceedings of the second ACM workshop on Role-based access control, pp. 13\u201319. ACM, New York (1997)"},{"key":"8_CR18","unstructured":"Online harassment and cyberstalking cumulative statistics for the years 2000-2008 (2009), http:\/\/www.haltabuse.org\/resources\/stats\/Cumulative2000-2008.pdf"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Life"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14282-6_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:50:22Z","timestamp":1606186222000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14282-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642142819","9783642142826"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14282-6_8","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2010]]}}}