{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:43:29Z","timestamp":1765485809007,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/pst.2014.6890931","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T11:43:34Z","timestamp":1410349414000},"page":"121-128","source":"Crossref","is-referenced-by-count":24,"title":["Enabling privacy through transparency"],"prefix":"10.1109","author":[{"given":"Oshani","family":"Seneviratne","sequence":"first","affiliation":[]},{"given":"Lalana","family":"Kagal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Accountable-ehealth systems : The next step forward for privacy","author":"gajanayake","year":"2012","journal-title":"1st Australian EHealth Informatics and Security Conference"},{"journal-title":"Preserv Provenance Recording for Services","year":"2005","author":"groth","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2012.250607"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17819-1_34"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.1998.709980"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.25.w496"},{"key":"14","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/978-3-642-35173-0_29","article-title":"Reconstructing provenance","author":"magliacane","year":"2012","journal-title":"The Semantic Web-ISWC 2012"},{"journal-title":"The \"Oh Yeah","year":"1997","author":"berners-lee","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMlim035027"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2013.11"},{"key":"20","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/978-3-642-03315-5_5","article-title":"A survey on transparency tools for enhancing privacy","author":"hedbom","year":"2009","journal-title":"The Future of Identity in the Information Society"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1165734.1165735"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1151030.1151052"},{"journal-title":"Transparent Accountable Data Mining New Strategies for Privacy Protection","year":"2006","author":"weitzner","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866346"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1349026.1349043"},{"key":"2","article-title":"Access control is an inadequate framework for privacy protection","author":"kagal","year":"2010","journal-title":"W3C Privacy Workshop"},{"journal-title":"PROV-O The PROV Ontology","year":"2003","author":"lebo","key":"10"},{"key":"1","first-page":"1","volume":"7","author":"staddon","year":"2007","journal-title":"Web-based inference detection"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080102"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2011.48"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188006"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2527031.2527043"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6749"},{"key":"8","article-title":"Extending the webid protocol with access delegation","author":"tramp","year":"2012","journal-title":"Proceedings of the Third International Workshop on Consuming Linked Data (COLD2012)"}],"event":{"name":"2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2014,7,23]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2014,7,24]]}},"container-title":["2014 Twelfth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883276\/6890911\/06890931.pdf?arnumber=6890931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T16:12:51Z","timestamp":1498147971000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6890931\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/pst.2014.6890931","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}