{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:34:13Z","timestamp":1761597253367},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,2,3]],"date-time":"2011-02-03T00:00:00Z","timestamp":1296691200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1007\/s11280-011-0114-8","type":"journal-article","created":{"date-parts":[[2011,2,2]],"date-time":"2011-02-02T10:17:44Z","timestamp":1296641864000},"page":"407-430","source":"Crossref","is-referenced-by-count":81,"title":["Privacy-aware access control with trust management in web service"],"prefix":"10.1007","volume":"14","author":[{"given":"Min","family":"Li","sequence":"first","affiliation":[]},{"given":"Xiaoxun","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yanchun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ji","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,2,3]]},"reference":[{"issue":"4","key":"114_CR1","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"NR Adam","year":"1989","unstructured":"Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: a comparative study. CSUR 21(4), 515\u2013556 (1989)","journal-title":"CSUR"},{"key":"114_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Evmievski, A., Srikant, R.: Information sharing across private databases. In: Proc. of the 2003 ACM SIGMOD Int. Conf. on Management of Data. ACM Press (2003)","DOI":"10.1145\/872757.872771"},{"key":"114_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of the 28th International Conference on Very Large Databases (VLDB) (2002)","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"114_CR4","unstructured":"Ashley, P., Powers, C.S., Schunter, M.: Privacy promises, access control, and privacy management. In: Third International Symposium on Electronic Commerce (2002)"},{"issue":"1","key":"114_CR5","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1121995.1121997","volume":"35","author":"JW Byun","year":"2006","unstructured":"Byun, J.W., Bertino, E.: Micro-views, or on how to protect privacy while enhancing data usability: concepts and challenges. SIGMOD Rec. 35(1), 9\u201313 (2006)","journal-title":"SIGMOD Rec."},{"key":"114_CR6","unstructured":"Byun, J.W., Bertino, E., Li, N.: Purpose Based Access Control for Privacy Protection in Relational Database Systems. Technical Report 2004-52, Purdue University (2004)"},{"key":"114_CR7","doi-asserted-by":"crossref","unstructured":"Byun, J.W., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Symposium on Access Control Model And Technologies (SACMAT) (2005)","DOI":"10.1145\/1063979.1063998"},{"key":"114_CR8","doi-asserted-by":"crossref","unstructured":"Dong, X., Madhavan, J., Nemes, E.: Reference reconciliation in complex information spaces. In: ACM International Conference on Management of Data (SIGMOD) (2005)","DOI":"10.1145\/1066157.1066168"},{"issue":"3","key":"114_CR9","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"114_CR10","first-page":"50","volume-title":"ACM International Conference on Management of Data (SIGMOD)","author":"S Jajodia","year":"1991","unstructured":"Jajodia, S., Sandhu, R.: Toward a multilevel secure relational data model. In: ACM International Conference on Management of Data (SIGMOD), pp. 50\u201359. ACM Press, New York (1991)"},{"key":"114_CR11","doi-asserted-by":"crossref","unstructured":"LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D.: Disclosure in hippocratic databases. In: The 30th International Conference on Very Large Databases (VLDB) (2004)","DOI":"10.1016\/B978-012088469-8.50013-9"},{"key":"114_CR12","unstructured":"Lin, C., Varadharajan, V.: Trust enhanced security for mobile agents. In: Proc of the 7th IEEE International Conference on E-Commerce Technology, CEC 2005, Germany, July 2005. ISBN 0-7695-2277-7; ISSN 1530-1354 (2005)"},{"key":"114_CR13","doi-asserted-by":"crossref","unstructured":"Sandhu, R.: Role hierarchies and constraints for lattice-based access controls. In: European Symposium on Research in Security and Privacy (1996)","DOI":"10.1007\/3-540-61770-1_28"},{"issue":"1","key":"114_CR14","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/290163.290171","volume":"1","author":"R Sandhu","year":"1998","unstructured":"Sandhu, R., Chen, F.: The multilevel relational data model. ACM Trans. Inf. Syst. Secur. 1(1), 93\u2013132 (1998)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"2","key":"114_CR15","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role based access control models. IEEE Computer 29(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"114_CR16","doi-asserted-by":"crossref","unstructured":"Sarawagi, S., Bhamidipaty, A.: Interactive deduplication using active learning. In: ACM International conference on Knowledge discovery and data mining (SIGKDD) (2002)","DOI":"10.1145\/775047.775087"},{"key":"114_CR17","unstructured":"Seamons, K., Winslett, M., Yu, T.: Limiting the disclosure of access control policies during automated trust negotiation. In: Proc. of NDSS\u201901, pp. 109\u2013125. IEEE Press (2001)"},{"issue":"2","key":"114_CR18","first-page":"53","volume":"1","author":"X Sun","year":"2008","unstructured":"Sun, X., Wang, H., Li, J., Truta, T.M.: Enhanced P-sensitive K-anonymity models for privacy preserving data publishing. Transactions on Data Privacy (TDP) 1(2), 53\u201366 (2008)","journal-title":"Transactions on Data Privacy (TDP)"},{"key":"114_CR19","first-page":"461","volume":"2008","author":"X Sun","year":"2008","unstructured":"Sun, X., Wang, H., Li, J.: L-diversity based dynamic update for large time-evolving microdata. Australasian Conference on Artificial Intelligence (AI) 2008, 461\u2013469 (2008)","journal-title":"Australasian Conference on Artificial Intelligence (AI)"},{"issue":"5","key":"114_CR20","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems (IJUFKS) 10(5), 571\u2013588 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems (IJUFKS)"},{"key":"114_CR21","unstructured":"Tumer, A., Dogac, A., Toroslu, H.: A semantic based privacy framework for web services. In: Proc. of ESSW\u201903 (2003)"},{"key":"114_CR22","unstructured":"Wang, Y., Vassileva, J.: Trust and reputation model in collaborative networks. In: Proc. 3rd IEEE Int. Conf. Collaborative Computing, pp. 150\u2013157 (2003)"},{"key":"114_CR23","unstructured":"Westin, A.: E-Commerce and Privacy: What Net Users Want. Technical Report, Louis Harris & Associates (1998)"},{"key":"114_CR24","unstructured":"Westin, A.: Freebies and Privacy: What Net Users Think. Technical Report, Opinion Research Corporation (1999)"},{"key":"114_CR25","unstructured":"World Wide Web Consortium (W3C). A P3P Preference Exchange Language 1.0 (APPEL 1.0). Available at www.w3.org\/TR\/P3P-preferences"},{"key":"114_CR26","unstructured":"World Wide Web Consortium (W3C). Platform for Privacy Preferences (P3P). Available at www.w3.org\/P3P"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-011-0114-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-011-0114-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-011-0114-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T08:41:25Z","timestamp":1559983285000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-011-0114-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,3]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,7]]}},"alternative-id":["114"],"URL":"https:\/\/doi.org\/10.1007\/s11280-011-0114-8","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2,3]]}}}