{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:25:46Z","timestamp":1742970346253,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642289767"},{"type":"electronic","value":"9783642289774"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-28977-4_11","type":"book-chapter","created":{"date-parts":[[2012,7,28]],"date-time":"2012-07-28T06:51:22Z","timestamp":1343458282000},"page":"297-316","source":"Crossref","is-referenced-by-count":0,"title":["A Client-Side Privacy Framework for Web Personalization"],"prefix":"10.1007","author":[{"given":"C.","family":"Kolias","sequence":"first","affiliation":[]},{"given":"V.","family":"Kolias","sequence":"additional","affiliation":[]},{"given":"G.","family":"Kambourakis","sequence":"additional","affiliation":[]},{"given":"E.","family":"Kayafas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Kolias, C., Kolias, V., Anagnostopoulos, I., Kambourakis, G., Kayafas, E.: Enhancing User Privacy in Adaptive Web Sites with Client-Side User Profiles. In: Third International Workshop on Semantic Media Adaptation and Personalization, SMAP 2008, December 15-16, pp. 170\u2013176 (2008)","DOI":"10.1109\/SMAP.2008.32"},{"issue":"2","key":"11_CR2","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1017\/S0269888901000108","volume":"16","author":"A. Kobsa","year":"2001","unstructured":"Kobsa, A., Koenemann, J., Pohl, W.: Personalised hypermedia presentation techniques for improving online customer relationships. The Knowledge Engineering Review\u00a016(2), 111\u2013155 (2001)","journal-title":"The Knowledge Engineering Review"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Brusilovsky, P., Maybury, M.T.: From adaptive hypermedia to the adaptive web. Communications of the ACM\u00a045(5) (May 2002)","DOI":"10.1145\/506218.506239"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Kobsa, A.: Personalized hypermedia and international privacy. Communications of the ACM\u00a045(5) (May 2002)","DOI":"10.1145\/506218.506249"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Teltzrow, M., Kobsa, A.: Impacts of User Privacy Preferences on Personalized Systems: A Comparative Study. In: Designing Personalized User Experiences in eCommerce, pp. 315\u2013332. Kluwer Academic (2004)","DOI":"10.1007\/1-4020-2148-8_17"},{"key":"11_CR6","unstructured":"W3C, \n                      http:\/\/www.w3.org\/\n                     (accessed November 27, 2011)"},{"key":"11_CR7","unstructured":"W3C, A P3P Preference Exchange Language 1.0 (APPEL1.0), \n                      http:\/\/www.w3.org\/TR\/P3P-preferences\/\n                     (accessed November 27, 2011)"},{"key":"11_CR8","unstructured":"W3C, The Platform for Privacy Preferences 1.0 (P3P1.0), \n                      http:\/\/www.w3.org\/TR\/P3P\/\n                     (accessed November 27, 2011)"},{"key":"11_CR9","unstructured":"AT&T Privacy Bird, \n                      http:\/\/www.privacybird.org\/\n                     (accessed November 27, 2011)"},{"key":"11_CR10","unstructured":"Guha, S., Reznichenko, A., Tang, K., Haddadi, H., Francis, P.: Serving Ads from localhost for Performance, Privacy, and Profit. In: Proceedings of Hot Topics in Networking (November 2009)"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1007\/11610113_53","volume-title":"Frontiers of WWW Research and Development - APWeb 2006","author":"S. Preibusch","year":"2006","unstructured":"Preibusch, S.: Implementing Privacy Negotiations in E-Commerce. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, vol.\u00a03841, pp. 604\u2013615. Springer, Heidelberg (2006)"},{"key":"11_CR12","unstructured":"TRUSTe, \n                      http:\/\/www.truste.org\/\n                     (accessed November 27, 2011)"},{"key":"11_CR13","unstructured":"Bleichenbacher, D., Gabber, E., Gibbons, P.B., Matias, Y., Mayer, A.: On secure and pseudonymous client relationships with multiple servers. In: Proceedings of the 3rd USENIX Electronic Commerce Workshop, pp. 99\u2013108 (1998)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Gabber, E., Gibbons, P., Matias, Y., Mayer, A.: How to make personalized web browsing simple, secure, and anonymous. In: Proceedings of the Conference on Financial Cryptography. Springer, New York (1997)","DOI":"10.1007\/3-540-63594-7_64"},{"issue":"2","key":"11_CR15","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/767193.767196","volume":"3","author":"A. Kobsa","year":"2003","unstructured":"Kobsa, A., Schreck, J.: Privacy through pseudonymity in user-adaptive systems. ACM Transactions on Internet Technology (TOIT)\u00a03(2), 149\u2013183 (2003)","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Finin, T., Weber, J.: Draft specification of the KQML agent-communication language. Tech. Rep. (1993), \n                      http:\/\/www.cs.umbc.edu\/kqml\/kqmlspec\/spec.html\n                     (accessed November 27, 2011)","DOI":"10.1145\/191246.191322"},{"issue":"3","key":"11_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MSECP.2003.1203218","volume":"1","author":"L. Ishitani","year":"2003","unstructured":"Ishitani, L., Almeida, V., Meira Jr., W.: Masks: Bringing Anonymity and Personalization Together. IEEE Security and Privacy\u00a01(3), 18\u201323 (2003)","journal-title":"IEEE Security and Privacy"},{"issue":"6","key":"11_CR18","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"1","key":"11_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B. Gedik","year":"2008","unstructured":"Gedik, B., Liu, L.: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. IEEE Transactions on Mobile Computing\u00a07(1), 1\u201318 (2008)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Stenneth, L., Yu, P.S., Wolfson, O.: Mobile systems location privacy: \u201cMobiPriv\u201d a robust k anonymous system. In: 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), October 11-13, pp. 54\u201363 (2010)","DOI":"10.1109\/WIMOB.2010.5645011"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"You, T., Peng, W., Lee, W.-C.: Protecting moving trajectories using dummies. In: International Workshop on Privacy-Aware Location-Based Mobile Services (2007)","DOI":"10.1109\/MDM.2007.58"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.-L.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, Vancouver, Canada, June 09-12 (2008)","DOI":"10.1145\/1376616.1376631"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Shin, H., Vaidya, J., Atluri, V.: A profile anonymization model for privacy in a personalized location based service environment mobile data management. In: 9th International Conference on MDM 2008, April 27-30, pp. 73\u201380 (2008)","DOI":"10.1109\/MDM.2008.33"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Xu, Y., Wang, K., Yang, G., Fu, A.W.C.: Online anonymity for personalized web services. In: Proceeding of the 18th ACM Conference on Information and Knowledge Management, Hong Kong, China, November 02-06 (2009)","DOI":"10.1145\/1645953.1646155"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Shen, Y., Liu, Y., Zhang, Y.: Personalized-Granular k-Anonymity. In: International Conference on Information Engineering and Computer Science, ICIECS 2009, December 19-20, pp. 1\u20134 (2009)","DOI":"10.1109\/ICIECS.2009.5365939"},{"key":"11_CR26","unstructured":"Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., Barocas, S.: Adnostic: Privacy preserving targeted advertising. In: NDSS (2010)"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Livshits, B.: RePriv: Re-imagining content personalization and in-browser privacy. In: 2011 IEEE Symposium on Security and Privacy (SP), May 22-25, pp. 131\u2013146 (2011)","DOI":"10.1109\/SP.2011.37"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Chen, T., Han, W.-L., Wang, H.-D., Zhou, Y.-X., Xu, B., Zang, B.-Y.: Content Recommendation system based on private dynamic user profile. In: 2007 International Conference on Machine Learning and Cybernetics, August 19-22, vol.\u00a04, pp. 2112\u20132118 (2007)","DOI":"10.1109\/ICMLC.2007.4370493"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Shen, X., Tan, B., Zhai, C.: Implicit user modeling for personalized search. In: CIKM 2005: Proceedings of the 14th ACM International Conference on Information and Knowledge Management, pp. 824\u2013831. ACM (2005)","DOI":"10.1145\/1099554.1099747"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Shankar, U., Karlof, C.: Doppelganger: Better browser privacy without the bother. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006) (2006)","DOI":"10.1145\/1180405.1180426"},{"key":"11_CR31","unstructured":"Brar, A., Kay, J.: Privacy and Security in Ubiquitous Personalized Applications. In: Proc. User Modelling Workshop on Privacy-Enhanced Personalization, Edinburgh, UK, July 25 (2005)"},{"key":"11_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, p. 237. Springer, Heidelberg (2002)"}],"container-title":["Studies in Computational Intelligence","Semantic Hyper\/Multimedia Adaptation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28977-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T20:30:27Z","timestamp":1675283427000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-28977-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642289767","9783642289774"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28977-4_11","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2013]]}}}