{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:31:46Z","timestamp":1740169906992,"version":"3.37.3"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2022,1,1]]},"DOI":"10.1109\/tetc.2020.2996974","type":"journal-article","created":{"date-parts":[[2020,5,25]],"date-time":"2020-05-25T22:44:17Z","timestamp":1590446657000},"page":"199-210","source":"Crossref","is-referenced-by-count":6,"title":["Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8521-6836","authenticated-orcid":false,"given":"Michal","family":"Drozdowicz","sequence":"first","affiliation":[{"name":"Polish Academy of Sciences, Systems Research Institute, Warsaw, Poland"}]},{"given":"Maria","family":"Ganzha","sequence":"additional","affiliation":[{"name":"Polish Academy of Sciences, Systems Research Institute, Warsaw, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8069-2152","authenticated-orcid":false,"given":"Marcin","family":"Paprzycki","sequence":"additional","affiliation":[{"name":"Polish Academy of Sciences, Systems Research Institute, Warsaw, Poland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.12.020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s13132-012-0084-9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0028071"},{"key":"ref5","first-page":"3","article-title":"Constitutional and regulatory: De-identified data and third party data mining: The risk of re-identification of personal information","volume":"5","author":"Porter","year":"2008","journal-title":"Shidler J. Low Commerce Technol."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2016.06.004"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipu004"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0581-7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2011.6146582"},{"year":"2017","key":"ref10","article-title":"Crowdsensing \u2014 Wikipedia, the free encyclopedia."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2387836"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25733-4_2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54472-4_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-162"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39940-9_352"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23356"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2009.4912864"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.06.022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.03.015"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22479-0_10"},{"key":"ref21","first-page":"27","article-title":"Follow my recommendations: A personalized privacy assistant for mobile app permissions","volume-title":"Proc. 12th USENIX Conf. Usable Privacy Secur.","author":"Liu"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568035"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367733"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1006\/knac.1993.1008"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1038\/75556"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican1207-90"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.007"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.127"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542231"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76890-6_14"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.02.046"},{"key":"ref32","first-page":"86","article-title":"OntoPlay \u2013 a flexible user-interface for ontology-based systems","volume-title":"Proc. 1st Int. Conf. Agreement Technol.","author":"Drozdowicz"},{"key":"ref33","first-page":"1047","article-title":"Agent-based resource management in tsunami modeling","volume-title":"Proc. Federated Conf. Comput. Sci. Inf. Syst.","author":"Vazhenin"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1063\/1.5007405"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1063\/1.5064929"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921191"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.5094"},{"issue":"1","key":"ref38","article-title":"OWL 2 web ontology language primer","volume":"27","author":"Hitzler","year":"2009","journal-title":"W3C Recommendation"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00668-6_19"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2013.90"},{"article-title":"A privacy preference ontology (PPO) for linked data","volume-title":"Proc. Linked Data Web Workshop 20th Int. World Wide Web Conf.","author":"Sacco","key":"ref42"},{"author":"Hecker","key":"ref43","article-title":"A generic privacy ontology and its applications to different domains"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98349-3_11"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/9726526\/09099421.pdf?arnumber=9099421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:34:25Z","timestamp":1704839665000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9099421\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":43,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2020.2996974","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"type":"electronic","value":"2168-6750"},{"type":"electronic","value":"2376-4562"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}