{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:12:56Z","timestamp":1743135176761,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031846168"},{"type":"electronic","value":"9783031846175"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-84617-5_12","type":"book-chapter","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T06:59:23Z","timestamp":1740034763000},"page":"146-151","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SafeAR: Privacy-Maintenance in\u00a0Augmented Reality Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2306-7585","authenticated-orcid":false,"given":"Rog\u00e9rio Lu\u00eds","family":"de C. Costa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6005-288X","authenticated-orcid":false,"given":"Anabela","family":"Marto","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6883-7996","authenticated-orcid":false,"given":"Leonel","family":"Santos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5966-3218","authenticated-orcid":false,"given":"Alexandrino","family":"Gon\u00e7alves","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7332-4397","authenticated-orcid":false,"given":"Carlos","family":"Rabad\u00e3o","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,21]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1162\/pres.1997.6.4.355","volume":"6","author":"R Azuma","year":"1997","unstructured":"Azuma, R.: A survey of augmented reality. Presence: Teleoperators Virtual Environ. 6, 355\u2013385 (1997)","journal-title":"Presence: Teleoperators Virtual Environ."},{"issue":"3","key":"12_CR2","doi-asserted-by":"publisher","first-page":"519","DOI":"10.3390\/jcp1030026","volume":"1","author":"F B\u00f6hm","year":"2021","unstructured":"B\u00f6hm, F., Dietz, M., Preindl, T., Pernul, G.: Augmented reality and the digital twin: state-of-the-art and perspectives for cybersecurity. J. Cybersecur. Priv. 1(3), 519\u2013538 (2021)","journal-title":"J. Cybersecur. Priv."},{"issue":"6","key":"12_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3359626","volume":"52","author":"JA De Guzman","year":"2019","unstructured":"De Guzman, J.A., Thilakarathna, K., Seneviratne, A.: Security and privacy approaches in mixed reality: a literature survey. ACM Comput. Surv. (CSUR) 52(6), 1\u201337 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"12_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106833","volume":"122","author":"D Harborth","year":"2021","unstructured":"Harborth, D., Pape, S.: Investigating privacy concerns related to mobile augmented reality apps - a vignette based online experiment. Comput. Hum. Behav. 122, 106833 (2021)","journal-title":"Comput. Hum. Behav."},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Jana, S., Narayanan, A., Shmatikov, V.: A scanner darkly: protecting user privacy from perceptual applications. In: 2013 IEEE Symposium on Security and Privacy, pp. 349\u2013363. IEEE (2013)","DOI":"10.1109\/SP.2013.31"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"King, A., Kaleem, F., Rabieh, K.: A survey on privacy issues of augmented reality applications. In: 2020 IEEE Conference on Application, Information and Network Security (AINS), pp. 32\u201340. IEEE (2020)","DOI":"10.1109\/AINS50155.2020.9315127"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Lebeck, K., Ruth, K., Kohno, T., Roesner, F.: Towards security and privacy for multi-user augmented reality: foundations with end users. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 392\u2013408. IEEE (2018)","DOI":"10.1109\/SP.2018.00051"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., et al.: Microsoft coco: common objects in context (2015). https:\/\/doi.org\/10.48550\/arXiv.1405.0312","DOI":"10.1007\/978-3-319-10602-1_48"},{"issue":"4","key":"12_CR9","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/2580723.2580730","volume":"57","author":"F Roesner","year":"2014","unstructured":"Roesner, F., Kohno, T., Molnar, D.: Security and privacy for augmented reality systems. Commun. ACM 57(4), 88\u201396 (2014)","journal-title":"Commun. ACM"},{"issue":"2","key":"12_CR10","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1109\/COMST.2021.3061981","volume":"23","author":"Y Siriwardhana","year":"2021","unstructured":"Siriwardhana, Y., Porambage, P., Liyanage, M., Ylianttila, M.: A survey on mobile augmented reality with 5G mobile edge computing: architectures, applications, and technical aspects. IEEE Commun. Surv. Tutorials 23(2), 1160\u20131192 (2021)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Templeman, R., Korayem, M., Crandall, D.J., Kapadia, A.: Placeavoider: steering first-person cameras away from sensitive spaces. In: NDSS, vol.\u00a014, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23014"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Wang, J., Amos, B., Das, A., Pillai, P., Sadeh, N., Satyanarayanan, M.: A scalable and privacy-aware IoT service for live video analytics. In: Proceedings of the 8th ACM on Multimedia Systems Conference, pp. 38\u201349 (2017)","DOI":"10.1145\/3083187.3083192"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Zarepour, E., Hosseini, M., Kanhere, S.S., Sowmya, A.: A context-based privacy preserving framework for wearable visual lifeloggers. In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp.\u00a01\u20134. IEEE (2016)","DOI":"10.1109\/PERCOMW.2016.7457057"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented and Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-84617-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T06:59:30Z","timestamp":1740034770000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-84617-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031846168","9783031846175"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-84617-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"21 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESOCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Service-Oriented and Cloud Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bolzano","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 February 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 February 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esocc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/esocc-2025","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}