{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:35:11Z","timestamp":1725600911788},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642232992"},{"type":"electronic","value":"9783642233005"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23300-5_25","type":"book-chapter","created":{"date-parts":[[2011,8,17]],"date-time":"2011-08-17T08:34:23Z","timestamp":1313570063000},"page":"321-329","source":"Crossref","is-referenced-by-count":0,"title":["A Study on Context Services Model with Location Privacy"],"prefix":"10.1007","author":[{"given":"Hoon","family":"Ko","sequence":"first","affiliation":[]},{"given":"Goreti","family":"Marreiros","sequence":"additional","affiliation":[]},{"given":"Zita","family":"Vale","sequence":"additional","affiliation":[]},{"given":"Jongmyung","family":"Choi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","volume":"13","author":"J. Krumm","year":"2009","unstructured":"Krumm, J.: A survey of computational location privacy. Pervasive Ubiquitous Computing\u00a0(13), 391\u2013399 (2009)","journal-title":"Pervasive Ubiquitous Computing"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Hulsebosch, R.J., Salden, A.H., Bargh, M.S., Ebben, P.W.G., Reitsma, J.: Context sensitive access control. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, SACMAT 2005, pp. 111\u2013119 (2005)","DOI":"10.1145\/1063979.1064000"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Brown, G., Howe, T., Ihbe, M., Prakash, A., Borders, K.: Social Networks and Context-Aware Spam. In: CSCW 2008, San Diego, California, USA, November 8-12 (2008)","DOI":"10.1145\/1460563.1460628"},{"issue":"1","key":"25_CR4","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"A.K. Dey","year":"2001","unstructured":"Dey, A.K.: Understanding and Using Context. Journal Personal and Ubiquitous Computing\u00a05(1), 4\u20137 (2001)","journal-title":"Journal Personal and Ubiquitous Computing"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Sadok, D.H., Souto, E., Feitosa, E., Kelner, J., Westberg, L.: RIP-A robust IP access architecture. Computer & Security, 1\u201322 (February 2009)","DOI":"10.1016\/j.cose.2009.02.002"},{"key":"25_CR6","unstructured":"Yoneki, E.: Evolution of Ubiquitous computing with Sensor Networks in Urban Environments. In: Ubiquitous Computing Conference, Metapolis and Urban Life Workshop Proceedings, pp. 56\u201359 (September 2005)"},{"key":"25_CR7","unstructured":"Fetzer, A.: Recontextualizing context. In: Proceedings of Context Organiser Workshop, Manchester, UK, April 9-1 (1997)"},{"issue":"1","key":"25_CR8","first-page":"75","volume":"2","author":"W. Pieters","year":"2011","unstructured":"Pieters, W.: Representing Humans in System Security Models: An Actor-Network Approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications\u00a02(1), 75\u201392 (2011)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"issue":"1","key":"25_CR9","first-page":"93","volume":"2","author":"P. Nobles","year":"2011","unstructured":"Nobles, P., Ali, S., Chivers, H.: Improved Estimation of Trilateration Distances for Indoor Wireless, Intrusion Detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications\u00a02(1), 93\u2013102 (2011)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"25_CR10","unstructured":"Bunt, H.: Context and aialogue control. In: Proceedings of CONTEX 1997 (1997)"},{"key":"25_CR11","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/3-540-44607-9_9","volume-title":"Modeling and Using Context","author":"J.H. Connolly","year":"2001","unstructured":"Connolly, J.H.: Context in the study of human languages and computer programming languages: A comparison. In: Akman, V., Bouquet, P., Thomason, R.H., Young, R.A. (eds.) CONTEXT 2001. LNCS (LNAI), vol.\u00a02116, p. 116. Springer, Heidelberg (2001)"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Coutaz, J., Rey, G.: Recovering foundations for a theory of contextors. Presentation delivered at the 4th International Conference on Computer-Aided Design of User Interfaces, Valenciennes, France (May 2002)","DOI":"10.1007\/978-94-010-0421-3_2"},{"key":"25_CR13","unstructured":"One-Time Password (OTP), http:\/\/en.wikipedia.org\/wiki\/One-time_password"},{"key":"25_CR14","unstructured":"jContext, http:\/\/sourceforge.net\/projects\/jmcontext\/"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Choi, J.: jContext: A Toolkit for Context-aware Systems Using Java Reflection and Method Overloading. Journal of KIISE (April 2011) (submitted, in Korean)","DOI":"10.5772\/8021"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security for Business, Enterprise and Health Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23300-5_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T22:12:28Z","timestamp":1606169548000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23300-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642232992","9783642233005"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23300-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}