{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:09:06Z","timestamp":1773324546341,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/mobiq.2007.4451030","type":"proceedings-article","created":{"date-parts":[[2008,2,15]],"date-time":"2008-02-15T15:06:51Z","timestamp":1203088011000},"page":"1-8","source":"Crossref","is-referenced-by-count":9,"title":["Privacy Infusion in Ubiquitous Computing"],"prefix":"10.1109","author":[{"given":"Gautham","family":"Pallapa","sequence":"first","affiliation":[]},{"given":"Mohan","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Sajal K.","family":"Das","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/3-540-45809-3_14","article-title":"Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing","author":"jiang","year":"2002","journal-title":"Proceedings of Ubicomp 2002"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IWNA.2001.980828"},{"key":"ref31","author":"cauldwell","year":"2001","journal-title":"Professional XML Web Services"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2002.10033"},{"key":"ref35","year":"0","journal-title":"Sun Java Toolkit for CDC"},{"key":"ref34","year":"2000","journal-title":"Sun Microsystems Java 2 Platform Micro Edition"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281252"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2005.1651848"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872771"},{"key":"ref13","year":"0","journal-title":"Medical Privacy - National Standards to Protect the Privacy of Personal Health Information"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1203752"},{"key":"ref15","first-page":"252","article-title":"Quality of Privacy (QoP) for the Design of Ubiquitous Healthcare Applications","volume":"12","author":"tentori","year":"2006","journal-title":"Journal of Universal Computer Science"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990087"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/967900.968218"},{"key":"ref18","article-title":"Exploring the Relationship between Context and Privacy","author":"timo","year":"2005","journal-title":"Privacy Security and Trust within the Context of Pervasive Computing the Kluwer International Series in Engineering and Computer Science"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1013115.1013129"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/2.237456"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.127"},{"key":"ref27","year":"2006","journal-title":"Object Management Group CORBA Component Model Specification v4 0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2004.1273490"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2006.21"},{"key":"ref29","author":"coyle","year":"2002","journal-title":"XML Web Services and the Data Revolution"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.56"},{"key":"ref8","first-page":"1751","article-title":"Legal Issues for Realizing Ubiquitous Information Society","volume":"2","author":"yasujiro murakami","year":"2004","journal-title":"SICE 2004 Annual Conference"},{"key":"ref7","author":"westin","year":"1967","journal-title":"Privacy and Freedom"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2006.51"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICNICONSMCL.2006.68"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/268092.268108"},{"key":"ref20","article-title":"Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems","volume":"190","author":"toivonen","year":"2006","journal-title":"proceeding of Models of Trust for the Web Workshop (MTW)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2006.9"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1109\/SERA.2006.50","author":"choi","year":"2006","journal-title":"Modeling of Situation-Middleware for TPO metadata based on Event-Condition-Action Rule Fourth International Conference on Software Engineering Research Management and Applications"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2005.2"},{"key":"ref23","article-title":"An ECA rule-based task programming language for ubiquitous environments","volume":"1","author":"lee","year":"2006","journal-title":"2006 8th International Conference Advanced Communication Technology ICACT-06"},{"key":"ref26","author":"demichiel","year":"2002","journal-title":"Enterprise Java Beans Specification Version 2 1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"}],"event":{"name":"2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous)","location":"Philadelphia, PA, USA","start":{"date-parts":[[2007,8,6]]},"end":{"date-parts":[[2007,8,10]]}},"container-title":["2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking &amp; Services (MobiQuitous)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4446615\/4450969\/04451030.pdf?arnumber=4451030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T23:08:39Z","timestamp":1557270519000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4451030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/mobiq.2007.4451030","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}