{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:58:30Z","timestamp":1730285910183,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/noms.2008.4575254","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T15:17:28Z","timestamp":1221578248000},"page":"947-950","source":"Crossref","is-referenced-by-count":1,"title":["An ontology for privacy policy management in ubiquitous environments"],"prefix":"10.1109","author":[{"given":"Luciana Andreia","family":"Fondazzi Martimiano","sequence":"first","affiliation":[]},{"given":"Muller Roberto","family":"Pereira Goncalves","sequence":"additional","affiliation":[]},{"given":"Edson","family":"dos Santos Moreira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"pocket switched networks: real-world mobility and its consequences for opportunistic forwarding","year":"2005","author":"chaintreau","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1080139.1080142"},{"key":"10","article-title":"swrl: a semantic web rule language combining owl and ruleml","volume":"w3c","author":"horrocks","year":"0","journal-title":"Submission"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1060"},{"article-title":"ontology development 101: a guide to create your first ontology","year":"0","author":"noy","key":"7"},{"year":"0","key":"6"},{"key":"5","first-page":"105","article-title":"dohand: an ontology to support building services to exploit handover information in mobile heterogeneous networks","volume":"1","author":"vanni","year":"2006","journal-title":"Proceedings of 5th International Information and Telecommunication Technologies Symposium"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIM.2007.4444273"},{"year":"0","key":"9"},{"key":"8","first-page":"99","article-title":"trust requirements in identity management","author":"josang","year":"2005","journal-title":"Proceedings of the 2005 Australasian Workshop on Grid Computing and E-research"},{"journal-title":"OWL Web Ontology Language Reference","year":"2004","author":"bechhofer","key":"11"}],"event":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","start":{"date-parts":[[2008,4,7]]},"location":"Salvador, Bahia, Brazil","end":{"date-parts":[[2008,4,11]]}},"container-title":["NOMS 2008 - 2008 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4567164\/4575087\/04575254.pdf?arnumber=4575254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T15:15:15Z","timestamp":1489677315000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4575254\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/noms.2008.4575254","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}