{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:22:57Z","timestamp":1742980977637,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642392375"},{"type":"electronic","value":"9783642392382"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39238-2_10","type":"book-chapter","created":{"date-parts":[[2013,7,1]],"date-time":"2013-07-01T09:28:12Z","timestamp":1372670892000},"page":"85-94","source":"Crossref","is-referenced-by-count":1,"title":["Safety of Natural Disasters"],"prefix":"10.1007","author":[{"given":"Lamiaa F.","family":"Ibrahim","sequence":"first","affiliation":[]},{"given":"Reem","family":"Albatati","sequence":"additional","affiliation":[]},{"given":"Samah","family":"Batweel","sequence":"additional","affiliation":[]},{"given":"Rudainah","family":"Shilli","sequence":"additional","affiliation":[]},{"given":"Mai","family":"Bakeer","sequence":"additional","affiliation":[]},{"given":"Tsneem","family":"Abo Al Laban","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"IBM, Caltrans, and UC Berkeley Aim to Help Commuters Avoid Congested Roadways Before their Trip Begins, press release, IBM (April 13, 2011), \n                    \n                      http:\/\/www-03.ibm.com\/press\/us\/en\/pressrelease\/34261.wss"},{"key":"10_CR2","unstructured":"Youssef, M., Atluri, V., Adam, N.: Preserving Mobile Customer Privacy: An Access Control System for Moving Objects and Customer Profiles. In: Proc. 6th Int\u2019l Conf. Mobile Data Management (MDM 2005), pp. 67\u201376. ACM, 2005"},{"key":"10_CR3","unstructured":"More Americans Using Social Media and Technology in Emergencies, Public Affairs Desk, Am. Red Cross (August 24, 2011), \n                    \n                      http:\/\/tinyurl.com\/9bylh55"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Adam, N., et al.: Social Media Alert and Response to Threats to Citizens (SMART-C). In: Proc. 8th IEEE Int\u2019l Conf. Collaborative Computing: Networking, Applications, and Worksharing (ColCom 2012) (2012) (to be published)","DOI":"10.4108\/icst.collaboratecom.2012.250713"},{"issue":"2","key":"10_CR5","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/1540276.1540279","volume":"10","author":"Bin Zhou","year":"2008","unstructured":"Zhou, B., Pei, J., Luk, W.: A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data. SIGKDD Explorations Newsletter\u00a010(2) (2008)","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-0-387-70992-5_2","volume":"34","author":"C. Aggarwal","year":"2008","unstructured":"Aggarwal, C., Yu, P.S.: A General Survey of Privacy-Preserving Data Mining Models and Algorithms. Privacy-Preserving Data Mining\u00a034, 11\u201352 (2008)","journal-title":"Privacy-Preserving Data Mining"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Wang, C., et al.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: IEEE Conf. Computer Communications (INFOCOM 2010), pp. 525\u2013533. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"issue":"4","key":"10_CR9","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/1108906.1108908","volume":"8","author":"X. Zhang","year":"2005","unstructured":"Zhang, X., et al.: Formal Model and Policy Specification of Usage Control. ACM Trans. Information and Systems Security\u00a08(4), 351\u2013387 (2005)","journal-title":"ACM Trans. Information and Systems Security"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Wickramasuriya, J., et al.: Privacy Protecting Data Collection in Media Spaces. In: Proc. 12th Ann. ACM Int\u2019l Conf. Multimedia (MULTIMEDIA 2004), pp. 48\u201355. ACM (2004)","DOI":"10.1145\/1027527.1027537"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Golle, P., McSherry, F., Mironov, I.: Data Collection with Self-Enforcing Privacy. In: Proc. 13th ACM Conf. Computer and Communications Security (CCS 2006), pp. 69\u201378. ACM (2006)","DOI":"10.1145\/1180405.1180416"},{"issue":"8","key":"10_CR12","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1016\/j.adhoc.2009.04.009","volume":"7","author":"N. Li","year":"2009","unstructured":"Li, N., et al.: Privacy Preservation in Wireless Sensor Networks: A State-of the- Art Survey. Ad Hoc Networks\u00a07(8), 1501\u20131514 (2009)","journal-title":"Ad Hoc Networks"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Chen, R., et al.: Differentially Private Transit Data Publication: A Case Study on the Montreal Transportation System. In: Proc. 18th ACM SIGKDD Int\u2019l Conf. Knowledge Discovery and Data Mining (KDD 2012), pp. 213\u2013221. ACM (2012)","DOI":"10.1145\/2339530.2339564"},{"issue":"5","key":"10_CR14","doi-asserted-by":"crossref","first-page":"795","DOI":"10.3233\/JCS-2010-0416","volume":"19","author":"H. Shin","year":"2011","unstructured":"Shin, H., Vaidya, J., Atluri, V.: A Profile Anonymization Model for Location-Based Services. J. Computer Security\u00a019(5), 795\u2013833 (2011)","journal-title":"J. Computer Security"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Hoh, B., et al.: Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking. In: Proc. 14th ACM Conf. Computer and Communications Security (CCS 2007), pp. 161\u2013171. ACM (2007)","DOI":"10.1145\/1315245.1315266"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1007\/978-3-642-23822-2_30","volume-title":"Computer Security \u2013 ESORICS 2011","author":"M. Jadliwala","year":"2011","unstructured":"Jadliwala, M., Bilogrevic, I., Hubaux, J.-P.: Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol.\u00a06879, pp. 548\u2013567. Springer, Heidelberg (2011)"},{"key":"10_CR17","unstructured":"From GPS and Virtual Globes to Spatial Computing\u20142020: The Next Transformative Technology. US Nat\u2019l Science Foundation\/Computing Community Consortium workshop proposal (September 2012)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Adam, N., et al.: Approach for Discovering and Handling Crisis in a Service-Oriented Environment. In: Proc. Intelligence and Security Informatics (ISI 2007), pp. 16\u201324. IEEE (2007)","DOI":"10.1109\/ISI.2007.379523"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Christensen, J.: Using RESTful Web Services and Cloud Computing to Create Next-Generation Mobile Applications. In: Companion to the 24th Ann. ACM SIGPLAN Conf. Object-Oriented Programming, Systems, Languages, and Applications, pp. 627\u2013634. ACM (2009)","DOI":"10.1145\/1639950.1639958"},{"issue":"1","key":"10_CR20","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/TSC.2010.49","volume":"5","author":"H. Artail","year":"2012","unstructured":"Artail, H., Fawaz, K., Ghandour, A.: A Proxy-Based Architecture for Dynamic Discov-ery and Invocation of Web Services from Mobile Devices. IEEE Trans. Services Computing\u00a05(1), 99\u2013115 (2012)","journal-title":"IEEE Trans. Services Computing"},{"issue":"5","key":"10_CR21","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MC.2011.128","volume":"44","author":"J. Garc\u00eda-Mac\u00edas","year":"2011","unstructured":"Garc\u00eda-Mac\u00edas, J., et al.: Browsing the Internet of Things with Sentient Visors. Computer\u00a044(5), 46\u201352 (2011)","journal-title":"Computer"},{"key":"10_CR22","unstructured":"Gaia GPS, \n                    \n                      https:\/\/play.google.com\/store\/apps\/details?id=com.trailbehind.android.gaiagps.pro&feature=search_result#?t=W251bGwsMSwxLDEsImNvbS50cmFpbGJlaGluZC5hbmRyb2lkLmdhaWFncHMucHJvIl0"},{"key":"10_CR23","unstructured":"ubAlert- Disaster Alert Network, \n                    \n                      http:\/\/itunes.apple.com\/us\/app\/ubalert-disaster-alert-network\/id455647397?mt=8"},{"key":"10_CR24","unstructured":"Disaster Alert, \n                    \n                      https:\/\/play.google.com\/store\/apps\/details?id=disasterAlert.PDC"},{"key":"10_CR25","unstructured":"EB2A Internet Services (2006), \n                    \n                      https:\/\/www.eb2a.com\/en\/"},{"key":"10_CR26","unstructured":"Patil, S.: Android Project structure (December 2009), \n                    \n                      http:\/\/www.mobisoftinfotech.com\/blog\/android\/android-project-structure\/"},{"key":"10_CR27","unstructured":"Intent Structure (December 2012), \n                    \n                      http:\/\/developer.android.com\/reference\/android\/content\/Intent.html"},{"key":"10_CR28","unstructured":"Launcher Icons (December 2012), \n                    \n                      http:\/\/developer.android.com\/guide\/practices\/ui_guidelines\/icon_design_launcher.html"},{"key":"10_CR29","unstructured":"Obtaining a Google Maps Android v1 API Key (December 2012), \n                    \n                      https:\/\/developers.google.com\/maps\/documentation\/android\/v1\/mapkey?hl=ar-SA"},{"key":"10_CR30","unstructured":"Knowledge base (December 2012), \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Knowledge_base"}],"container-title":["Lecture Notes in Computer Science","Design, User Experience, and Usability. User Experience in Novel Technological Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39238-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T22:35:38Z","timestamp":1582410938000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39238-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642392375","9783642392382"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39238-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}