{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,22]],"date-time":"2023-07-22T20:14:33Z","timestamp":1690056873744},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2009,8,6]],"date-time":"2009-08-06T00:00:00Z","timestamp":1249516800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1007\/s10207-009-0088-z","type":"journal-article","created":{"date-parts":[[2009,8,5]],"date-time":"2009-08-05T08:36:18Z","timestamp":1249461378000},"page":"423-431","source":"Crossref","is-referenced-by-count":5,"title":["Uncertain inference control in privacy protection"],"prefix":"10.1007","volume":"8","author":[{"given":"Xiangdong","family":"An","sequence":"first","affiliation":[]},{"given":"Dawn","family":"Jutla","sequence":"additional","affiliation":[]},{"given":"Nick","family":"Cercone","sequence":"additional","affiliation":[]},{"given":"Charnyote","family":"Pluempitiwiriyawej","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,8,6]]},"reference":[{"key":"88_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kieman, J., Srikant, R., Xu, Y.: An XPath-based preference language for P3P. In: Proceedings of the 12th International WWW Conference (WWW\u201903), pp. 629\u2013639. Budapest, Hungary (2003)","DOI":"10.1145\/775152.775241"},{"issue":"1","key":"88_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0169-023X(99)00043-9","volume":"33","author":"J. Biskup","year":"2000","unstructured":"Biskup J.: For unknown secrecies refusal is better than lying. Data Knowl. Eng. 33(1), 1\u201324 (2000)","journal-title":"Data Knowl. Eng."},{"issue":"2","key":"88_CR3","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/S0169-023X(01)00024-6","volume":"38","author":"J. Biskup","year":"2001","unstructured":"Biskup J., Bonatti P.A.: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2), 199\u2013222 (2001)","journal-title":"Data Knowl. Eng."},{"issue":"3","key":"88_CR4","first-page":"197","volume":"18","author":"H. Chen","year":"2004","unstructured":"Chen H., Finin T., Joshi A.: An ontology for context-aware pervasive computing environments. Knowl. Eng. Rev. Special Issue Ontol. Distrib. Syst. 18(3), 197\u2013207 (2004)","journal-title":"Knowl. Eng. Rev. Special Issue Ontol. Distrib. Syst."},{"key":"88_CR5","unstructured":"Clark, J., DeRose, S.: XML Path language (XPath) Version 1.0. Tech. Rep., W3C Recommendation. http:\/\/www.w3.org\/TR\/xpath (1999)"},{"key":"88_CR6","doi-asserted-by":"crossref","unstructured":"Cook, S.A.: The complexity of theorem-proving procedure. In: Harrison, M.A., Banerji, R.B., Ullman, J.D. (eds.) Proceedings of the 3rd Annual ACM Symposium on Theory of Computing (STOC\u201971), pp. 151\u2013158. Shaker Heights, OH (1971)","DOI":"10.1145\/800157.805047"},{"key":"88_CR7","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M.: A P3P preference exchange language 1.0 (APPEL 1.0). Tech. Rep., W3C Working Draft, http:\/\/www.w3.org\/TR\/P3P-preference"},{"key":"88_CR8","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall M., Reagle, J.: The platform for privacy preferences 1.0 (P3P 1.0) specification. Tech. Rep., W3C Recommendation, http:\/\/www.w3.org\/TR\/P3P (2002)"},{"issue":"7","key":"88_CR9","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MC.1983.1654444","volume":"16","author":"D.E. Denning","year":"1983","unstructured":"Denning D.E., Schl\u00f6rer J.: Inference control for statistical databases. IEEE Comput. 16(7), 69\u201382 (1983)","journal-title":"IEEE Comput."},{"issue":"1","key":"88_CR10","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"A. Dey","year":"2001","unstructured":"Dey A.: Understanding and using context. Pers. Ubiquitous Comput. 5(1), 4\u20137 (2001)","journal-title":"Pers. Ubiquitous Comput."},{"key":"88_CR11","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/571985.572003","volume-title":"Proceedings of the 15th Annual ACM Symposium on User Interface Software and Technology (UIST\u201902)","author":"A. Dey","year":"2002","unstructured":"Dey A., Mankoff J., Abowd G., Carter S.: Distributed mediation of ambiguous context in aware environments. In: Beaudouin-Lafon, M. (eds) Proceedings of the 15th Annual ACM Symposium on User Interface Software and Technology (UIST\u201902), pp. 121\u2013130. France, Paris (2002)"},{"issue":"337","key":"88_CR12","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/01621459.1972.10481199","volume":"67","author":"I. Fellegi","year":"1972","unstructured":"Fellegi I.: On the question of statistical confidentiality. J. Am. Stat. Assoc. 67(337), 7\u201318 (1972)","journal-title":"J. Am. Stat. Assoc."},{"issue":"3","key":"88_CR13","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.websem.2003.07.008","volume":"1","author":"F.L. Gandon","year":"2004","unstructured":"Gandon F.L., Sadeh N.M.: Semantic web technologies to reconcile privacy and context awareness. J. Web Semant. 1(3), 241\u2013260 (2004)","journal-title":"J. Web Semant."},{"key":"88_CR14","unstructured":"Hogben, G.: P3P using the semantic web (OWL ontology, RDF policy and RDQL rules). Tech. Rep., W3C Working Group Note, http:\/\/www.w3.org\/P3P\/2004\/040920_p3p-sw.html (2004)"},{"key":"88_CR15","first-page":"44","volume-title":"Policy Management for the Web (PM4W): Proceedings of the 14th World Wide Web Conference (WWW\u201905) Workshop","author":"G. Hogben","year":"2005","unstructured":"Hogben G.: Describing the P3P base data schema using OWL. In: Kagal, L., Finin, T., Hendler, J. (eds) Policy Management for the Web (PM4W): Proceedings of the 14th World Wide Web Conference (WWW\u201905) Workshop, pp. 44\u201351. Chiba, Japan (2005)"},{"key":"88_CR16","first-page":"63","volume-title":"Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY\u201903)","author":"L. Kagal","year":"2003","unstructured":"Kagal L., Finin T., Joshi A.: A policy language for pervasive systems. In: Lutfiyya, H., Moffett, J., Garcia, F. (eds) Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY\u201903), pp. 63\u201376. Lake Como, Italy (2003)"},{"key":"88_CR17","unstructured":"Kagal, L., Finin, T., Joshi, A.: Declarative policies for describing web services capabilities and constraints. In: Nottingham, M., H\u00e9garet, P.L. (eds.) Proceedings of the W3C Workshop on Constraints and Capabilities for Web Services. Redwood Shores, CA (2004)"},{"key":"88_CR18","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/POLICY.2005.15","volume-title":"Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY\u201905)","author":"P. Kolari","year":"2005","unstructured":"Kolari P., Ding L., Ganjugunte S., Kagal L., Joshi A., Finin T.: Enhancing web privacy protection through declarative policies. In: Sahai, A., Winsborough, W.H. (eds) Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY\u201905), pp. 57\u201366. Stockholm, Sweden (2005)"},{"key":"88_CR19","unstructured":"Kuenzer, A., Schlick, C., Ohmann, F., Schmidt, L., Luczak, H.: An empirical study of dynamic Bayesian networks for user modeling. In: Proceedings of the UM-2001 Workshop on Machine Learning for User Modeling, pp. 1\u201310. Sonthofen, Germany (2001)"},{"key":"88_CR20","unstructured":"McBride, B., Wenning, R., Cranor, L.: A RDF schema for P3P. Tech. Rep., W3C Note, http:\/\/www.w3.org\/TR\/p3p-rdfschema (2002)"},{"key":"88_CR21","volume-title":"Learning Bayesian Networks","author":"R.E. Neapolitan","year":"2003","unstructured":"Neapolitan R.E.: Learning Bayesian Networks. Prentice Hall, Upper Saddle River (2003)"},{"key":"88_CR22","volume-title":"Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference","author":"J. Pearl","year":"1988","unstructured":"Pearl J.: Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, San Franciso (1988)"},{"key":"88_CR23","first-page":"671","volume-title":"The MIT Encyclopedia of the Cognitive Sciences (MITECS)","author":"E. Shafir","year":"2001","unstructured":"Shafir E.: Probabilistic reasoning. In: Wilson, R.A., Keil, F.C. (eds) The MIT Encyclopedia of the Cognitive Sciences (MITECS), pp. 671\u2013672. MIT, Cambridge (2001)"},{"issue":"1","key":"88_CR24","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/319830.319833","volume":"8","author":"G.L. Sicherman","year":"1983","unstructured":"Sicherman G.L., de Jonge W., van de Riet R.P.: Answering queries without revealing secrets. ACM Trans. Database Syst. 8(1), 41\u201359 (1983)","journal-title":"ACM Trans. Database Syst."},{"key":"88_CR25","doi-asserted-by":"crossref","unstructured":"Staddon, J.: Dynamic inference control. In: Zaki, M.J., Aggarwal, C.C. (eds.) Proceedings of the 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD\u201903), pp. 94\u2013100. San Diego, CA (2003)","DOI":"10.1145\/882082.882103"},{"key":"88_CR26","doi-asserted-by":"crossref","unstructured":"Yip, R.W., Levitt, K.N.: Data level inference detection in database systems. In: Proceedings of the 11th IEEE Computer Security Foundations Workshop, pp. 179\u2013189. Rockport, MA (1998)","DOI":"10.1109\/CSFW.1998.683168"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0088-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-009-0088-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0088-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T11:01:24Z","timestamp":1559127684000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-009-0088-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8,6]]},"references-count":26,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["88"],"URL":"https:\/\/doi.org\/10.1007\/s10207-009-0088-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,8,6]]}}}