{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:54:52Z","timestamp":1725569692321},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642169335"},{"type":"electronic","value":"9783642169342"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16934-2_47","type":"book-chapter","created":{"date-parts":[[2010,11,5]],"date-time":"2010-11-05T14:15:39Z","timestamp":1288966539000},"page":"639-655","source":"Crossref","is-referenced-by-count":2,"title":["Context Sensitive Privacy Management in a Distributed Environment"],"prefix":"10.1007","author":[{"given":"Grzegorz","family":"Go\u0142aszewski","sequence":"first","affiliation":[]},{"given":"Janusz","family":"G\u00f3rski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","unstructured":"ZigBee Alliance, http:\/\/www.zigbee.org\/"},{"key":"47_CR2","unstructured":"European Commission: Directive 95\/46\/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Offic. J. of the Euro. Communities L 281, 31\u201350 (1995)"},{"key":"47_CR3","unstructured":"Directive 2002\/58\/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). Offic. J. L 201, 37\u201347 (2002)"},{"key":"47_CR4","unstructured":"OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980)"},{"key":"47_CR5","unstructured":"Health Insurance Portability and Accountability Act, Privacy\/Security\/Enforcement Regulation Text, 45 CFR Parts 160 and 164, U.S. Congress Act, with amendments (2003)"},{"key":"47_CR6","unstructured":"Bruynen, J., et al.: Deliverable D1.2: Angel System Specification. Technical report, Angel Consortium (2008)"},{"key":"47_CR7","unstructured":"Advanced IP STB reference platform STB810, http:\/\/www.nxp.com\/applications\/set_top_box\/ip_stb\/stb810\/"},{"key":"47_CR8","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.is.2005.02.004","volume":"31","author":"D.N. Jutla","year":"2006","unstructured":"Jutla, D.N., Bodorik, P., Zhang, Y.: PeCAN: An architecture for users\u2019 privacy-aware electronic commerce contexts on the semantic web. Infor. Syst.\u00a031, 295\u2013320 (2006)","journal-title":"Infor. Syst."},{"key":"47_CR9","first-page":"1","volume-title":"7th international conference on Human computer interaction with mobile devices & services","author":"D. Hong","year":"2005","unstructured":"Hong, D., Yuan, M., Shen, V.Y.: Dynamic Privacy Management: a Plugin Service for the Middleware in Pervasive Computing. In: 7th international conference on Human computer interaction with mobile devices & services, pp. 1\u20138. ACM, New York (2005)"},{"key":"47_CR10","first-page":"289","volume-title":"International Conference on Collaborative Computing: Networking, Applications and Worksharing","author":"G. Skinner","year":"2007","unstructured":"Skinner, G.: The TLC-PP framework for delivering a Privacy Augmented Collaborative Environment (PACE). In: International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 289\u2013293. IEEE Computer Society, Washington (2007)"},{"key":"47_CR11","first-page":"3078","volume-title":"IEEE International Conference on Industrial Technology","author":"G. Skinner","year":"2006","unstructured":"Skinner, G., Han, S., Chang, E.: Integration of Situational and Reward Elements for Fair Privacy Principles and Preferences (F3P). In: IEEE International Conference on Industrial Technology, pp. 3078\u20133082. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"47_CR12","first-page":"369","volume":"16","author":"C.A. Ardagna","year":"2008","unstructured":"Ardagna, C.A., Cremonini, M., De Capitani di Vimercati, S., Samarami, P.: A Privacy-Aware Access Control System. J. of Comp. Sec.\u00a016, 369\u2013392 (2008)","journal-title":"J. of Comp. Sec."},{"key":"47_CR13","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/1655168.1655178","volume-title":"The 1st ACM Workshop on Information Security Governance","author":"C.A. Ardagna","year":"2009","unstructured":"Ardagna, C.A., De Capitani di Vimercati, S., Paraboschi, S., Pedrini, E., Samarati, P.: An XACML-Based Privacy-Centered Access Control System. In: The 1st ACM Workshop on Information Security Governance, pp. 49\u201358. ACM, New York (2009)"},{"key":"47_CR14","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/IRI.2007.4296603","volume-title":"IEEE International Conference on Information Reuse and Integration","author":"R. Saleh","year":"2007","unstructured":"Saleh, R., Jutla, D., Bodorik, P.: Management of Users\u2019 Privacy Preferences in Context. In: IEEE International Conference on Information Reuse and Integration, pp. 91\u201397. IEEE Computer Society, Washington (2007)"},{"key":"47_CR15","first-page":"444","volume-title":"International Conference on Computational Science and Engineering","author":"N. Liampotis","year":"2009","unstructured":"Liampotis, N., Roussaki, I., Papadopoulou, E., Abu-Shaaban, Y., Williams, M.H., Taylor, N.K., McBurney, S.M., Dolinar, K.: A Privacy Framework for Personal Self-Improving Smart Spaces. In: International Conference on Computational Science and Engineering, vol.\u00a03, pp. 444\u2013449. IEEE Computer Society, Los Alamitos (2009)"},{"key":"47_CR16","doi-asserted-by":"crossref","unstructured":"Venezia, C., Taylor, N., Williams, H., Doolin, K., Roussaki, I.: Novel Pervasive Computing Services Experienced through Personal Smart Spaces. In: Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, pp. 484\u2013489 (2009)","DOI":"10.1109\/MDM.2009.85"},{"key":"47_CR17","doi-asserted-by":"crossref","unstructured":"G\u00f3rski, J., Go\u0142aszewski, G., Miler, J., Piech\u00f3wka, M., Baldus, H.: Trustworthiness: safety, security and privacy issues. In: 14th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2007, Morocco, pp. 641\u2013644 (2007)","DOI":"10.1109\/ICECS.2007.4511073"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16934-2_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T03:16:08Z","timestamp":1636773368000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16934-2_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642169335","9783642169342"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16934-2_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}