{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:51Z","timestamp":1750307691332,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,31]],"date-time":"2008-10-31T00:00:00Z","timestamp":1225411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,31]]},"DOI":"10.1145\/1456424.1456427","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"9-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Proposal of privacy policy matching engine"],"prefix":"10.1145","author":[{"given":"Takao","family":"Kojima","sequence":"first","affiliation":[{"name":"INSTITUTE of INFORMATION SECURITY, Yokohama, Japan"}]},{"given":"Yukio","family":"Itakura","sequence":"additional","affiliation":[{"name":"INSTITUTE of INFORMATION SECURITY, Yokohama, Japan"}]}],"member":"320","published-online":{"date-parts":[[2008,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Jinkou chinou no kiso {Basic of Artificial Intelligence}","author":"Babaguchi N.","year":"1999","unstructured":"Babaguchi , N. and S. Yamada . Jinkou chinou no kiso {Basic of Artificial Intelligence} . Shokodo Co., Ltd , 1999 . Babaguchi, N. and S. Yamada. Jinkou chinou no kiso {Basic of Artificial Intelligence}. Shokodo Co., Ltd, 1999."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165734.1165735"},{"key":"e_1_3_2_1_3_1","unstructured":"DEN Yasuharu YAMADA Atsushi OGURA Hideki KOISO Hanae and OGISO Toshinobu \"UniDic-chasen http:\/\/www.tokuteicorpus.jp\/dist\/.  DEN Yasuharu YAMADA Atsushi OGURA Hideki KOISO Hanae and OGISO Toshinobu \"UniDic-chasen http:\/\/www.tokuteicorpus.jp\/dist\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Doc Searls \"ProjectVRM\" http:\/\/cyber.law.harvard.edu\/projectvrm\/Main_Page.Bowman.  Doc Searls \"ProjectVRM\" http:\/\/cyber.law.harvard.edu\/projectvrm\/Main_Page.Bowman."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151454.1151492"},{"key":"e_1_3_2_1_6_1","unstructured":"Google Google Search Engine http:\/\/www.google.co.jp\/.  Google Google Search Engine http:\/\/www.google.co.jp\/."},{"key":"e_1_3_2_1_7_1","unstructured":"goto Ebot Lite http:\/\/www.listbrowser.com\/.  goto Ebot Lite http:\/\/www.listbrowser.com\/."},{"key":"e_1_3_2_1_8_1","volume-title":"Saishin netto koukoku no shikumi {System of Latest Net Advertisement}","author":"Hayashi K.","year":"2007","unstructured":"Hayashi , K. Saishin netto koukoku no shikumi {System of Latest Net Advertisement} . Nippon Jitsugyo Publishing , 2007 . Hayashi, K. Saishin netto koukoku no shikumi {System of Latest Net Advertisement}. Nippon Jitsugyo Publishing, 2007."},{"key":"e_1_3_2_1_9_1","unstructured":"hishida xdoc2txt http:\/\/www31.ocn.ne.jp\/~h_ishida\/xdoc2txt.html.  hishida xdoc2txt http:\/\/www31.ocn.ne.jp\/~h_ishida\/xdoc2txt.html."},{"key":"e_1_3_2_1_10_1","volume-title":"Japan, Jan. 22--25","author":"Itakura Y.","year":"2008","unstructured":"Itakura , Y. , T. Kojima , and I. Miyaki . \" A Proposal of an Architecture for Effective Utilization of Personal Information\" (written in Japanese) The 2008 Symposium on Cryptography and Information Security Miyazaki , Japan, Jan. 22--25 , 2008 , The Institute of Electronics , Information and Communication Engineers. Itakura, Y., T. Kojima, and I. Miyaki. \"A Proposal of an Architecture for Effective Utilization of Personal Information\" (written in Japanese) The 2008 Symposium on Cryptography and Information Security Miyazaki, Japan, Jan. 22--25, 2008, The Institute of Electronics, Information and Communication Engineers."},{"key":"e_1_3_2_1_11_1","unstructured":"ITmedia Inc. \"Insider's Computer Dictionary P3P \" http:\/\/www.atmarkit.co.jp\/icd\/root\/03\/15245403.html.  ITmedia Inc. \"Insider's Computer Dictionary P3P \" http:\/\/www.atmarkit.co.jp\/icd\/root\/03\/15245403.html."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"e_1_3_2_1_13_1","volume-title":"Iwanami Shoten","author":"Nagao M.","year":"1981","unstructured":"Nagao , M. and M. Iri . Iwanami jouhou kagaku 23 -- Kazu to siki no bun no syori {Iwanami Lecture of Information Sciences 23 -- Processing of sentence of number and expression} . Iwanami Shoten , 1981 . Nagao, M. and M. Iri. Iwanami jouhou kagaku 23 -- Kazu to siki no bun no syori {Iwanami Lecture of Information Sciences 23 -- Processing of sentence of number and expression}. Iwanami Shoten, 1981."},{"key":"e_1_3_2_1_14_1","volume-title":"Maruchi eijento to hukuzatukei {Multiagent and Complex System}","author":"Namatame A.","year":"1998","unstructured":"Namatame , A. Maruchi eijento to hukuzatukei {Multiagent and Complex System} . Morikita Publishing Co., Ltd. , 1998 Namatame, A. Maruchi eijento to hukuzatukei {Multiagent and Complex System}. Morikita Publishing Co., Ltd., 1998"},{"key":"e_1_3_2_1_15_1","volume-title":"SOFTBANK Creative","author":"Oda K.","year":"2007","unstructured":"Oda , K. , N. Takahiro , S. Suda , and T. Yukawa . Jisedai koukoku tekunorozi {Next-generation Advertising Technology} . SOFTBANK Creative , 2007 . Oda, K., N. Takahiro, S. Suda, and T. Yukawa. Jisedai koukoku tekunorozi {Next-generation Advertising Technology}. SOFTBANK Creative, 2007."},{"key":"e_1_3_2_1_16_1","volume-title":"White Paper on the Privacy in Japan 2007 (written in Japanese)","author":"Privacy Rating Jimukyoku A.F.","year":"2006","unstructured":"Privacy Rating Jimukyoku , A.F. Westin , ed., White Paper on the Privacy in Japan 2007 (written in Japanese) . Yano Research Institute Ltd ., 2006 . Privacy Rating Jimukyoku, A.F. Westin, ed., White Paper on the Privacy in Japan 2007 (written in Japanese). Yano Research Institute Ltd., 2006."},{"key":"e_1_3_2_1_17_1","unstructured":"W3C \"Platform for Privacy Preferences(P3P) \" http:\/\/www.w3c.org\/P3P\/.  W3C \"Platform for Privacy Preferences(P3P) \" http:\/\/www.w3c.org\/P3P\/."}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 4th ACM workshop on Digital identity management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456424.1456427","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456424.1456427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:54Z","timestamp":1750253394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456424.1456427"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,31]]},"references-count":17,"alternative-id":["10.1145\/1456424.1456427","10.1145\/1456424"],"URL":"https:\/\/doi.org\/10.1145\/1456424.1456427","relation":{},"subject":[],"published":{"date-parts":[[2008,10,31]]},"assertion":[{"value":"2008-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}