{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:54:14Z","timestamp":1743058454432,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341281"},{"type":"electronic","value":"9783642341298"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34129-8_41","type":"book-chapter","created":{"date-parts":[[2012,10,17]],"date-time":"2012-10-17T11:15:22Z","timestamp":1350472522000},"page":"427-434","source":"Crossref","is-referenced-by-count":0,"title":["Location Privacy Policy Management System"],"prefix":"10.1007","author":[{"given":"Arej","family":"Muhammed","sequence":"first","affiliation":[]},{"given":"Dan","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Squicciarini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacygrid. In: Proceeding of the 17th International Conference on World Wide Web, pp. 237\u2013246 (2008)","DOI":"10.1145\/1367497.1367531"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Chow, C.Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, pp. 171\u2013178 (2006)","DOI":"10.1145\/1183471.1183500"},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"Cvrcek, D., Kumpost, M., Matyas, V., Danezis, G.: A study on the value of location privacy. In: Proc. of the ACM Workshop on Privacy in Electronic Society, pp. 109\u2013118 (2006)","DOI":"10.1145\/1179601.1179621"},{"issue":"3","key":"41_CR4","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10922-008-9106-0","volume":"16","author":"M.L. Damiani","year":"2008","unstructured":"Damiani, M.L., Bertino, E., Silvestri, C.: Spatial domains for the administration of location-based access control policies. Journal of Network and Systems Management\u00a016(3), 277\u2013302 (2008)","journal-title":"Journal of Network and Systems Management"},{"key":"41_CR5","unstructured":"Danezis, G., Lewis, S., Anderson, R.: How much is location privacy worth. In: Fourth Workshop on the Economics of Information Security (2005)"},{"issue":"1","key":"41_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B. Gedik","year":"2008","unstructured":"Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing\u00a07(1), 1\u201318 (2008)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"41_CR7","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Skiadopoulos, S.: Prive: anonymous location-based queries in distributed mobile systems. In: Proceedings of the 16th International Conference on World Wide Web, pp. 371\u2013380 (2007)","DOI":"10.1145\/1242572.1242623"},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31\u201342 (2003)","DOI":"10.1145\/1066116.1189037"},{"issue":"1","key":"41_CR9","first-page":"21","volume":"2","author":"D. Lin","year":"2009","unstructured":"Lin, D., Bertino, E., Cheng, R., Prabhakar, S.: Location privacy in moving-object environments. Transactions on Data Privacy\u00a02(1), 21\u201346 (2009)","journal-title":"Transactions on Data Privacy"},{"key":"41_CR10","doi-asserted-by":"crossref","unstructured":"Mokbel, M.F.: Towards privacy-aware location-based database servers. In: 22nd International Conference on Data Engineering Workshops. Proceedings, p. 93 (2006)","DOI":"10.1109\/ICDEW.2006.152"},{"key":"41_CR11","unstructured":"Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763\u2013774 (2006)"},{"issue":"1","key":"41_CR12","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MPRV.2003.1186726","volume":"2","author":"G. Myles","year":"2003","unstructured":"Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing\u00a02(1), 56\u201364 (2003)","journal-title":"IEEE Pervasive Computing"},{"issue":"6","key":"41_CR13","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s00779-008-0214-3","volume":"13","author":"N. Sadeh","year":"2009","unstructured":"Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao, J.: Understanding and capturing people\u2019s privacy policies in a mobile social networking application. Personal and Ubiquitous Computing\u00a013(6), 401\u2013412 (2009)","journal-title":"Personal and Ubiquitous Computing"},{"issue":"5","key":"41_CR14","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MWC.2002.1043849","volume":"9","author":"A. Smailagic","year":"2002","unstructured":"Smailagic, A., Kogan, D.: Location sensing and privacy in a context-aware computing environment. IEEE Wireless Communications\u00a09(5), 10\u201317 (2002)","journal-title":"IEEE Wireless Communications"},{"key":"41_CR15","doi-asserted-by":"crossref","unstructured":"Snekkenes, E.: Concepts for personal location privacy policies. In: Proceedings of the 3rd ACM Conference on Electronic Commerce, pp. 48\u201357 (2001)","DOI":"10.1145\/501158.501164"},{"key":"41_CR16","unstructured":"OASIS Standard. Extensible access control markup language (XACML). version 2.0 (2005)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34129-8_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:23:12Z","timestamp":1566764592000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34129-8_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341281","9783642341298"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34129-8_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}