{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:11:17Z","timestamp":1743048677890,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642296147"},{"type":"electronic","value":"9783642296154"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29615-4_8","type":"book-chapter","created":{"date-parts":[[2012,4,23]],"date-time":"2012-04-23T11:30:30Z","timestamp":1335180630000},"page":"98-113","source":"Crossref","is-referenced-by-count":0,"title":["Methods for Privacy Protection Considering Status of Service Provider and User Community"],"prefix":"10.1007","author":[{"given":"Kazutomo","family":"Hamamoto","sequence":"first","affiliation":[]},{"given":"Yasuyuki","family":"Tahara","sequence":"additional","affiliation":[]},{"given":"Akihiko","family":"Ohsuga","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Yamabe, T., Fujinami, K., Shoji, T., Nakamura, N., Nakajima, T.: PENATES: Privacy Protection Architecture for Context-Aware Environments. In: Computer Symposium, Tokyo, pp. 55\u201364 (2004)"},{"key":"8_CR2","unstructured":"Tamaru, S., Iwaya, A., Takashio, K., Tokuda, H.: An application Framework for Personalized Public Space Considering Privacy. IPSJ report in Japan, pp. 49\u201356, 2003-OS-93"},{"key":"8_CR3","unstructured":"Miyamoto, T., Takeuchi, T., Okuda, T., Harumoto, K., Ariyoshi, Y., Shimojo, S.: Proposal for profile control mechanism considering privacy and quality of personalization services. In: DEWS 2005, Japan, 6-A-01 (2005)"},{"issue":"3","key":"8_CR4","first-page":"563","volume":"J88-B","author":"M. Imada","year":"2005","unstructured":"Imada, M., Takasugi, K., Ohta, M., Koyanagi, K.: LOOM: A Loosely managed privacy protection method for ubiquitous networking environments. IEICE Journal B in Japan\u00a0J88-B(3), 563\u2013573 (2005)","journal-title":"IEICE Journal B in Japan"},{"issue":"9","key":"8_CR5","first-page":"2260","volume":"46","author":"K. Nakanishi","year":"2005","unstructured":"Nakanishi, K., Takashio, K., Tokuda, H.: A concept of location anonymization. IPSJ Journal in Japan\u00a046(9), 2260\u20132268 (2005)","journal-title":"IPSJ Journal in Japan"},{"key":"8_CR6","unstructured":"Hirotaka, N., Nobuhiro, N.: Service platform for privacy Controllable Tag. IPSJ report in Japan, 2007-UBI-16, pp. 57\u201363 (2007)"},{"issue":"MLB-26","key":"8_CR7","first-page":"45","volume":"93","author":"T. Sanda","year":"2003","unstructured":"Sanda, T., Yamada, S., Kamioka, E.: Proposal for a method of privacy protection in ubiquitous computing environments. IPSJ Journal in Japan 2003(93(MLB-26)), 45\u201351 (2003)","journal-title":"IPSJ Journal in Japan"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 237\u2013245. Springer, Heidelberg (2002)"},{"issue":"1","key":"8_CR9","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MPRV.2003.1186726","volume":"2","author":"G. Myles","year":"2003","unstructured":"Myles, G., Friday, A., Davies, N.: Protection Privacy in environments with location-based Applications. IEEE Pervasive Computing\u00a02(1), 56\u201364 (2003)","journal-title":"IEEE Pervasive Computing"},{"issue":"5","key":"8_CR10","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based System\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based System"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Pareschi, L., Riboni, D., Bettini, C.: Protecting users\u2019 anonymity in pervasive computing environments. In: Sixth Annual IEEE International Conf. on Per. Com. and Communications, pp. 11\u201319 (2008)","DOI":"10.1109\/PERCOM.2008.58"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Hong J. I., Landy, J.A.: An architecture for privacy-sensitive ubiquitous computing. In MobiSYS 2004, Proceedings of the 2nd International Conference on Mobile Systems, Applications and Services, pp. 177\u2013189 (2004)","DOI":"10.1145\/990064.990087"},{"issue":"7","key":"8_CR13","first-page":"598","volume":"50","author":"K. Sato","year":"2009","unstructured":"Sato, K.: Life-log: About the Profit Use of the Cellular Phone Behavional Data that Considers the Privacy Protection. IPSJ Magazine in Japan\u00a050(7), 598\u2013602 (2009)","journal-title":"IPSJ Magazine in Japan"},{"key":"8_CR14","unstructured":"P3P, http:\/\/www.w3.org\/P3P\/"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-540-24747-0_8","volume-title":"Trust Management","author":"J.-M. Seigneur","year":"2004","unstructured":"Seigneur, J.-M., Jensen, C.D.: Trading Privacy for Trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol.\u00a02995, pp. 93\u2013107. Springer, Heidelberg (2004)"},{"key":"8_CR16","first-page":"46","volume":"20","author":"Y. Matsuo","year":"2005","unstructured":"Matsuo, Y., Tomobe, H., Hasida, K., Nakajima, H., Ishizuka, M.: Social Network Extraction from the Web information. JSAI Journal in Japan\u00a020, 46\u201356 (2005)","journal-title":"JSAI Journal in Japan"},{"key":"8_CR17","unstructured":"ArtiSoc, http:\/\/mas.kke.co.jp\/"},{"key":"8_CR18","unstructured":"Hamamoto, K., Tahara, Y., Ohsuga, A.: Proposal for Profile Opening Method Considering Privacy by Anonymization. In: JWEIN 2010 Symposium in Japan, Proceeding 2010 (August 2010)"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Kato, Y., Hasegawa, T.: Effect of Advanced Demand Signals scheme. In: IEEE VTS 54th Vehicular Technology Conference, VTC 2001 Fall, pp. 708\u2013712 (2002)","DOI":"10.1109\/VTC.2001.956862"},{"key":"8_CR20","unstructured":"Kaneda, T.: Kozo Keikaku Engineering Inc., Nagoya-Ins.of Tech. Univ.: Pedestrian Simulation by Artisoc, Japan, pp. 79\u2013114 (2010) ISBN 978-4-904701-17-1"}],"container-title":["Lecture Notes in Computer Science","Information Security Technology for Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29615-4_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:56:20Z","timestamp":1742982980000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29615-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642296147","9783642296154"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29615-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}