{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:12:27Z","timestamp":1747807947282},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642275845"},{"type":"electronic","value":"9783642275852"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27585-2_8","type":"book-chapter","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T22:38:29Z","timestamp":1328654309000},"page":"89-103","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Towards a Similarity Metric for Comparing Machine-Readable Privacy Policies"],"prefix":"10.1007","author":[{"given":"Inger Anne","family":"T\u00f8ndel","sequence":"first","affiliation":[]},{"given":"\u00c5smund Ahlmann","family":"Nyre","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1-2","key":"8_CR1","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.ijhcs.2005.04.019","volume":"63","author":"C. Jensen","year":"2005","unstructured":"Jensen, C., Potts, C., Jensen, C.: Privacy practices of internet users: Self-reports versus observed behavior. International Journal of Human-Computer Studies\u00a063(1-2), 203\u2013227 (2005)","journal-title":"International Journal of Human-Computer Studies"},{"issue":"2","key":"8_CR2","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1165734.1165735","volume":"13","author":"L.F. Cranor","year":"2006","unstructured":"Cranor, L.F., Guduru, P., Arjula, M.: User interfaces for privacy agents. ACM Trans. Comput.-Hum. Interact.\u00a013(2), 135\u2013178 (2006)","journal-title":"ACM Trans. Comput.-Hum. Interact."},{"key":"8_CR3","unstructured":"Privacy Finder, http:\/\/www.privacyfinder.org"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Shelat, A., Sommer, D., Fischer-H\u00fcbner, S., Hansen, M., Krasemann, H., Lacoste, G., Leenes, R., Tseng, J.: Privacy and identity management for everyone. In: Proceedings of the 2005 Workshop on Digital Identity Management, DIM 2005, pp. 20\u201327 (2005)","DOI":"10.1145\/1102486.1102491"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Levy, S.E., Gutwin, C.: Improving understanding of website privacy policies with fine-grained policy anchors. In: Proceedings of the 14th International Conference on World Wide Web, WWW 2005, pp. 480\u2013488 (2005)","DOI":"10.1145\/1060745.1060816"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"T\u00f8ndel, I.A., Nyre, \u00c5.A., Bernsmed, K.: Learning privacy preferences. In: Proceedings of the Sixth International Conference on Availability, Reliability and Security, ARES 2011 (2011)","DOI":"10.1109\/ARES.2011.96"},{"issue":"4","key":"8_CR7","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/1053291.1053295","volume":"48","author":"B. Berendt","year":"2005","unstructured":"Berendt, B., G\u00fcnther, O., Spiekermann, S.: Privacy in e-commerce: stated preferences vs. actual behavior. Commun. ACM\u00a048(4), 101\u2013106 (2005)","journal-title":"Commun. ACM"},{"issue":"2","key":"8_CR8","first-page":"89","volume":"3","author":"S.A. Bag\u00fc\u00e9s","year":"2009","unstructured":"Bag\u00fc\u00e9s, S.A., Surutusa, L.A.R., Arias, M., Fern\u00e1ndez-Valdivelso, C., Mat\u00edas, I.R.: Personal privacy management for common users. International Journal of Smart Home\u00a03(2), 89\u2013106 (2009)","journal-title":"International Journal of Smart Home"},{"key":"8_CR9","unstructured":"W3C. Platform for Privacy Preferences, http:\/\/www.w3.org\/P3P\/"},{"key":"8_CR10","unstructured":"Trabelsi, S.: Second release of the policy engine. Prime Life, Tech. Rep. D5.3.2 (2010)"},{"key":"8_CR11","unstructured":"OASIS eXtensible Access Control Markup Language (XACML), http:\/\/www.oasis-open.org\/committees\/xacml"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00155578","volume":"6","author":"J.L. Kolodner","year":"1992","unstructured":"Kolodner, J.L.: An introduction to case-based reasoning. Artificial Intelligence Review\u00a06, 3\u201334 (1992)","journal-title":"Artificial Intelligence Review"},{"issue":"1","key":"8_CR13","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/AIC-1994-7104","volume":"7","author":"A. Aamodt","year":"1994","unstructured":"Aamodt, A., Plaza, E.: Case-based reasoning: Foundational issues, methodological variations, and system approaches. AI Communications\u00a07(1), 39\u201359 (1994)","journal-title":"AI Communications"},{"key":"8_CR14","unstructured":"Mitchell, T.: Machine Learning. McGraw-Hill (1997)"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1145\/253262.253345","volume":"26","author":"T. Bozkaya","year":"1997","unstructured":"Bozkaya, T., Ozsoyoglu, M.: Distance-based indexing for high-dimensional metric spaces. SIGMOD Rec.\u00a026, 357\u2013368 (1997)","journal-title":"SIGMOD Rec."},{"key":"8_CR16","doi-asserted-by":"publisher","DOI":"10.1201\/b16944","volume-title":"Coding Theory and Cryptography: The Essentials","author":"D.C. Hankerson","year":"2000","unstructured":"Hankerson, D.C., Hoffman, G., Leonard, D.A., Lindner, C.C., Phelps, K.T., Rodger, C.A., Wall, J.R.: Coding Theory and Cryptography: The Essentials, 2nd edn. Marcel Dekker, Inc., New York (2000)","edition":"2"},{"key":"8_CR17","unstructured":"Arasu, A., Ganti, V., Kaushik, R.: Efficient exact set-similarity joins. In: Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB), pp. 918\u2013929. VLDB Endowment (September 2006)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Bernstein, A., Kaufmann, E., B\u00fcrki, C., Klein, M.: How similar is it? towards personalized similarity measures in ontologies. In: Ferstl, O.K., Sinz, E.J., Eckert, S., Isselhorst, T. (eds.) Wirtschaftsinformatik 2005, pp. 1347\u20131366. Physica-Verlag HD (2005)","DOI":"10.1007\/3-7908-1624-8_71"},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MSP.2010.38","volume":"8","author":"A.I. Anton","year":"2010","unstructured":"Anton, A.I., Earp, J.B., Young, J.D.: How internet users\u2019 privacy concerns have evolved since 2002. IEEE Security and Privacy\u00a08, 21\u201327 (2010)","journal-title":"IEEE Security and Privacy"},{"key":"8_CR20","unstructured":"Fischer-H\u00fcbner, S., W\u00e4stlund, E., Zwingelberg, H.: Ui prototypes: Policy administration and presentation version 1. Prime Life, Tech. Rep. D4.3.1 (2009)"}],"container-title":["Lecture Notes in Computer Science","Open Problems in Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27585-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T00:05:03Z","timestamp":1584403503000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27585-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642275845","9783642275852"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27585-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}