{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:10:41Z","timestamp":1725516641414},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642314780"},{"type":"electronic","value":"9783642314797"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31479-7_50","type":"book-chapter","created":{"date-parts":[[2012,8,9]],"date-time":"2012-08-09T04:10:15Z","timestamp":1344485415000},"page":"296-301","source":"Crossref","is-referenced-by-count":0,"title":["Privacy in Pervasive Social Networks"],"prefix":"10.1007","author":[{"given":"Olfa","family":"Mabrouki","sequence":"first","affiliation":[]},{"given":"Abdelghani","family":"Chibani","sequence":"additional","affiliation":[]},{"given":"Yacine","family":"Amirat","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"50_CR1","unstructured":"Al-Muhtadi, J., Campbell, R., Kapadia, A., Dennis Mickunas, M., Yi, S., Dennis, M., Yi, M.S.: Routing through the mist: Privacy preserving communication in ubiquitous computing environments (2002)"},{"key":"50_CR2","first-page":"695","volume-title":"Proceedings of the 31st Annual International Computer Software and Applications Conference, COMPSAC 2007","author":"R. Babbitt","year":"2007","unstructured":"Babbitt, R., Wong, J., Chang, C.: Towards the modeling of personal privacy in ubiquitous computing environments. In: Proceedings of the 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, vol.\u00a002, pp. 695\u2013699. IEEE Computer Society, Washington, DC (2007)"},{"key":"50_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A.R. Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing\u00a02, 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"50_CR4","doi-asserted-by":"crossref","unstructured":"Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work, pp. 1\u201310. ACM (2000)","DOI":"10.1145\/358916.358935"},{"key":"50_CR5","doi-asserted-by":"crossref","unstructured":"Brands, S.A.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press (2000)","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"50_CR6","doi-asserted-by":"crossref","unstructured":"Cas, J.: Privacy in pervasive computing environments - a contradiction in terms? IEEE Technology and Society Magazine, 24\u201333 (2005)","DOI":"10.1109\/MTAS.2005.1407744"},{"key":"50_CR7","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/330534.330540","volume":"43","author":"J.L. Crowley","year":"2000","unstructured":"Crowley, J.L., Coutaz, J., B\u00e9rard, F.: Perceptual user interfaces: things that see. Commun. ACM\u00a043, 54\u201364 (2000)","journal-title":"Commun. ACM"},{"key":"50_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11428572_10","volume-title":"Pervasive Computing","author":"M. Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol.\u00a03468, pp. 152\u2013170. Springer, Heidelberg (2005)"},{"key":"50_CR9","unstructured":"Edwards, J.: Location privacy protection act of 2001 (2001)"},{"key":"50_CR10","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking, pp. 31\u201342 (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"50_CR11","doi-asserted-by":"crossref","unstructured":"Hudson, S.E., Smith, I.: Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In: Proceedings of the 1996 ACM Conference on Computer Supported Cooperative Work, pp. 248\u2013257. ACM (1996)","DOI":"10.1145\/240080.240295"},{"key":"50_CR12","doi-asserted-by":"crossref","unstructured":"Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS 2005, pp. 88\u201397 (2005)","DOI":"10.1109\/ICDE.2005.269"},{"key":"50_CR13","unstructured":"Shan, C., Mary-Anne, W.: Privacy in social networks: a comparative study. In: PACIS 2009 Proceedings, pp. 81\u201393 (2009)"},{"key":"50_CR14","unstructured":"Mokhtar, S.B., Capra, L.: From pervasive to social computing: Algorithms and deployments. In: Proceedings of the ACM International Conference on Pervasive Services (ICPS 2009) (July 2009)"},{"key":"50_CR15","doi-asserted-by":"crossref","unstructured":"Mokhtar, S.B., McNamara, L., Capra, L.: A middleware service for pervasive social networking. In: Proceedings of the International Workshop on Middleware for Pervasive Mobile and Embedded Computing, M-PAC 2009, pp. 2:1\u20132:6. ACM, New York (2009)","DOI":"10.1145\/1657127.1657130"},{"key":"50_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-540-39653-6_24","volume-title":"UbiComp 2003: Ubiquitous Computing","author":"C. Neustaedter","year":"2003","unstructured":"Neustaedter, C., Greenberg, S.: The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol.\u00a02864, pp. 297\u2013314. Springer, Heidelberg (2003)"},{"key":"50_CR17","first-page":"129","volume-title":"CHI 2003: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"L. Palen","year":"2003","unstructured":"Palen, L., Dourish, P.: Unpacking \u201cprivacy\u201d for a networked world. In: CHI 2003: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129\u2013136. ACM, New York (2003)"},{"key":"50_CR18","unstructured":"Pallapa, G.V.: A Privacy Enhanced Situation-aware Middleware Framework For Ubiquitous Computing Environments. PhD thesis (December 2009)"},{"key":"50_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/3-540-45682-1_32","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"R.L. Rivest","year":"2001","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 552\u2013565. Springer, Heidelberg (2001)"},{"key":"50_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36532-X_1","volume-title":"Software Security \u2013 Theories and Systems","author":"F. Pasquale","year":"2003","unstructured":"Pasquale, F., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards Security and Privacy for Pervasive Computing. In: Okada, M., Babu, C. S., Scedrov, A., Tokuda, H. (eds.) ISSS 2002. LNCS, vol.\u00a02609, pp. 1\u201315. Springer, Heidelberg (2003)"},{"key":"50_CR21","doi-asserted-by":"crossref","unstructured":"Cardoso, R.S., Issarny, V.: Architecting Pervasive Computing Systems for Privacy: A Survey. In: Sixth Working IEEE\/IFIP Conference on Software Architecture: WICSA 2007, Mumbai, Maharashtra, Inde, p. 26 (2007)","DOI":"10.1109\/WICSA.2007.11"},{"key":"50_CR22","doi-asserted-by":"crossref","unstructured":"Zhao, Q.A., Stasko, J.T.: Evaluating image filtering based techniques in media space applications. In: Proceedings of the 1998 ACM Conference on Computer Supported Cooperative Work, pp. 11\u201318 (1998)","DOI":"10.1145\/289444.289450"}],"container-title":["Communications in Computer and Information Science","Constructing Ambient Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31479-7_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T23:47:45Z","timestamp":1557186465000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31479-7_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642314780","9783642314797"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31479-7_50","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}