{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:18Z","timestamp":1750307778348,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,29]],"date-time":"2007-10-29T00:00:00Z","timestamp":1193616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,29]]},"DOI":"10.1145\/1314333.1314349","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"80-83","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Disappearing for a while - using\n            <i>white lies<\/i>\n            in pervasive computing"],"prefix":"10.1145","author":[{"given":"Susana Alcalde","family":"Bag\u00fc\u00e9s","sequence":"first","affiliation":[{"name":"Siemens AG, Munich, Germany"}]},{"given":"Andreas","family":"Zeidler","sequence":"additional","affiliation":[{"name":"Siemens AG, Munich, Germany"}]},{"given":"Carlos Fernandez","family":"Valdivielso","sequence":"additional","affiliation":[]},{"given":"Ignacio R.","family":"Matias","sequence":"additional","affiliation":[{"name":"Public University of Navarra, Navarra, Spain"}]}],"member":"320","published-online":{"date-parts":[[2007,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ETH Zurich","author":"Marc","year":"2002","unstructured":"Marc Langheinrich et al, \"As we may live - Real-world Implications of Ubiquitous Computing,\" Swiss Federal Institute of Technology , ETH Zurich , 2002 . Marc Langheinrich et al, \"As we may live - Real-world Implications of Ubiquitous Computing,\" Swiss Federal Institute of Technology, ETH Zurich, 2002."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.008"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990087"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0304-9"},{"key":"e_1_3_2_1_5_1","unstructured":"Mika Raento and Antti Oulasvirta \"Privacy management for social awareness applications \" In the Proceedings of the workshop on Context Awareness for Proactive Systems 2005.  Mika Raento and Antti Oulasvirta \"Privacy management for social awareness applications \" In the Proceedings of the workshop on Context Awareness for Proactive Systems 2005."},{"key":"e_1_3_2_1_6_1","unstructured":"Online Survey Friends Provident PLC News from 2006 Brits prefer 'techno treachery' when telling white lies"},{"issue":"2","key":"e_1_3_2_1_7_1","first-page":"2007","article-title":"Sentry@Home - Leveraging the Smart Home for Privacy in Pervasive Computing","volume":"1","author":"Bag\u00fc\u00e9s Susana Alcalde","unstructured":"Susana Alcalde Bag\u00fc\u00e9s , \" Sentry@Home - Leveraging the Smart Home for Privacy in Pervasive Computing ,\" International Journal of Smart Home. Vol. 1 No. 2 ., 2007 . Susana Alcalde Bag\u00fc\u00e9s et al, \"Sentry@Home - Leveraging the Smart Home for Privacy in Pervasive Computing,\" International Journal of Smart Home. Vol. 1 No. 2., 2007.","journal-title":"International Journal of Smart Home."}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Privacy in electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314349","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314333.1314349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314349"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,29]]},"references-count":7,"alternative-id":["10.1145\/1314333.1314349","10.1145\/1314333"],"URL":"https:\/\/doi.org\/10.1145\/1314333.1314349","relation":{},"subject":[],"published":{"date-parts":[[2007,10,29]]},"assertion":[{"value":"2007-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}