{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:29:23Z","timestamp":1725708563443},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/pst.2013.6596032","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T15:54:58Z","timestamp":1379606098000},"page":"19-26","source":"Crossref","is-referenced-by-count":11,"title":["Selective cloaking: Need-to-know for location-based apps"],"prefix":"10.1109","author":[{"given":"Benjamin","family":"Henne","sequence":"first","affiliation":[]},{"given":"Christian","family":"Kater","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Brenner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"year":"0","key":"17"},{"key":"18","first-page":"1","article-title":"Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation Ser OSDI'10"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864381"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.COLLABORATECOM2009.8374"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-010-0346-0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653704"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"journal-title":"Myshield Protecting Mobile Device Data Via Security Circles","year":"2012","author":"beede","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.25"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468500"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381943"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"key":"5","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1145\/1240624.1240683","article-title":"Over-exposed?: Privacy patterns and considerations in online and mobile photo sharing","author":"ahern","year":"2007","journal-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Ser CHI '07"},{"key":"4","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/1054972.1054985","article-title":"Location disclosure to social relations: Why, when, & what people want to share","author":"consolvo","year":"2005","journal-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Ser CHI '05"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381945"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41320-9_9"}],"event":{"name":"2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2013,7,10]]},"location":"Tarragona, Spain","end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 Eleventh Annual Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589044\/6596025\/06596032.pdf?arnumber=6596032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T22:11:26Z","timestamp":1498083086000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6596032\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/pst.2013.6596032","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}