{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:16Z","timestamp":1750308016002,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,10,30]],"date-time":"2006-10-30T00:00:00Z","timestamp":1162166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,10,30]]},"DOI":"10.1145\/1501434.1501464","type":"proceedings-article","created":{"date-parts":[[2009,2,4]],"date-time":"2009-02-04T13:02:04Z","timestamp":1233752524000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Dynamic inference control in privacy preference enforcement"],"prefix":"10.1145","author":[{"given":"Xiangdong","family":"An","sequence":"first","affiliation":[{"name":"Saint Mary's University, Halifax, NS, Canada"}]},{"given":"Dawn","family":"Jutla","sequence":"additional","affiliation":[{"name":"Saint Mary's University, Halifax, NS, Canada"}]},{"given":"Nick","family":"Cercone","sequence":"additional","affiliation":[{"name":"York University, Toronto, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775241"},{"key":"e_1_3_2_1_2_1","volume-title":"Auditing and inference control in ubiquitous environments. Technical report","author":"An X.","year":"2006","unstructured":"X. An , D. Jutla , and N. Cercone . Auditing and inference control in ubiquitous environments. Technical report , Faculty of Computer Science, Dalhousie University , Halifax, NS , Canada, 2006 . X. An, D. Jutla, and N. Cercone. Auditing and inference control in ubiquitous environments. Technical report, Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada, 2006."},{"key":"e_1_3_2_1_3_1","series-title":"Lecture Notes in Computer Science (LNCS)","doi-asserted-by":"crossref","DOI":"10.1007\/11527886","volume-title":"A comparison of HMMs and dynamic Bayesian networks for recognizing office activities","author":"Ardissono L.","year":"2005","unstructured":"L. Ardissono , P. Brna , and A. Mitrovic , editors . A comparison of HMMs and dynamic Bayesian networks for recognizing office activities , volume 3538 of Lecture Notes in Computer Science (LNCS) , Edinburgh, Scotland, UK , July 24--29 2005 . Springer . L. Ardissono, P. Brna, and A. Mitrovic, editors. A comparison of HMMs and dynamic Bayesian networks for recognizing office activities, volume 3538 of Lecture Notes in Computer Science (LNCS), Edinburgh, Scotland, UK, July 24--29 2005. Springer."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/320613.320617"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(99)00043-9"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/500368.500373"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026106029043"},{"key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.236161"},{"key":"e_1_3_2_1_11_1","unstructured":"J. Clark and S. DeRose. XML Path language (XPath) Version 1.0. Technical report W3C Recommendation http:\/\/www.w3.org\/TR\/xpath November 1999.  J. Clark and S. DeRose. XML Path language (XPath) Version 1.0. Technical report W3C Recommendation http:\/\/www.w3.org\/TR\/xpath November 1999."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1980.10477481"},{"key":"e_1_3_2_1_13_1","unstructured":"L. Cranor M. Langheinrich and M. Marchiori. A P3P preference exchange language 1.0 (APPEL 1.0). Technical report W3C Working Draft http:\/\/www.w3.org\/TR\/P3P-preference April 2002.  L. Cranor M. Langheinrich and M. Marchiori. A P3P preference exchange language 1.0 (APPEL 1.0). Technical report W3C Working Draft http:\/\/www.w3.org\/TR\/P3P-preference April 2002."},{"key":"e_1_3_2_1_14_1","unstructured":"L. Cranor M. Langheinrich M. Marchiori M. Presler-Marshall and J. Reagle. The platform for privacy preferences 1.0 (P3P 1.0) specification. Technical report W3C Recommendation http:\/\/www.w3.org\/TR\/P3P April 2002.  L. Cranor M. Langheinrich M. Marchiori M. Presler-Marshall and J. Reagle. The platform for privacy preferences 1.0 (P3P 1.0) specification. Technical report W3C Recommendation http:\/\/www.w3.org\/TR\/P3P April 2002."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(98)00044-5"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0169-2070(94)02009-E"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0888-613X(00)00067-0"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.993142"},{"key":"e_1_3_2_1_19_1","first-page":"524","volume-title":"Proceedings of the 7th National Conference on Artificial Intelligence (AAAI-1988)","author":"Dean T.","year":"1988","unstructured":"T. Dean and K. Kanazawa . Probabilistic temporal reasoning . In Proceedings of the 7th National Conference on Artificial Intelligence (AAAI-1988) , pages 524 -- 528 , St. Paul, Minnesota , 1988 . AAAI Press. T. Dean and K. Kanazawa. Probabilistic temporal reasoning. In Proceedings of the 7th National Conference on Artificial Intelligence (AAAI-1988), pages 524--528, St. Paul, Minnesota, 1988. AAAI Press."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177698950"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/320613.320616"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/320064.320069"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1983.1654444"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s007790170019"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/571985.572003"},{"key":"e_1_3_2_1_26_1","series-title":"LNCS","first-page":"54","volume-title":"Proceedings of the 2nd Workshop on Privacy Enhancing Technologies (PET'02)","author":"D\u00edaz C.","year":"2002","unstructured":"C. D\u00edaz , S. Seys , J. Claessens , and B. Preneel . Towards measuring anonymity . In H. Federath, editor, Proceedings of the 2nd Workshop on Privacy Enhancing Technologies (PET'02) , volume 2482 of LNCS , pages 54 -- 68 , San Francisco, CA , April 14--15 2002 . Springer-Verlag . C. D\u00edaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In H. Federath, editor, Proceedings of the 2nd Workshop on Privacy Enhancing Technologies (PET'02), volume 2482 of LNCS, pages 54--68, San Francisco, CA, April 14--15 2002. Springer-Verlag."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/320064.320068"},{"key":"e_1_3_2_1_28_1","first-page":"7","article-title":"Applying dynamic Bayesian networks to perturbed gene expression data","author":"Dojer N.","year":"2006","unstructured":"N. Dojer , A. Gambin , A. Mizera , B. Wilczynski , and J. Tiuryn . Applying dynamic Bayesian networks to perturbed gene expression data . BMC Bioinformatics , 7 , 2006 . N. Dojer, A. Gambin, A. Mizera, B. Wilczynski, and J. Tiuryn. Applying dynamic Bayesian networks to perturbed gene expression data. BMC Bioinformatics, 7, 2006.","journal-title":"BMC Bioinformatics"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.273026"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1972.10481199"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence (UAI-1998)","author":"Friedman N.","year":"1998","unstructured":"N. Friedman , K. Murphy , and S. Russell . Learning the structure of dynamic probabilistic networks. In G. F. Cooper and S. Moral, editors , Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence (UAI-1998) , Madison, WI, USA , 1998 . Morgan Kaufmann Publishers. N. Friedman, K. Murphy, and S. Russell. Learning the structure of dynamic probabilistic networks. In G. F. Cooper and S. Moral, editors, Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence (UAI-1998), Madison, WI, USA, 1998. Morgan Kaufmann Publishers."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2003.07.008"},{"key":"e_1_3_2_1_33_1","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/BFb0053999","volume-title":"Adaptive Processing of Sequences and Data Structures","author":"Ghahramani Z.","year":"1998","unstructured":"Z. Ghahramani . Learning dynamic Bayesian networks . In Adaptive Processing of Sequences and Data Structures , volume 1387 of Lecture Notes in Artificial Intelligence , pages 168 -- 197 . Springer-Verlag , 1998 . Z. Ghahramani. Learning dynamic Bayesian networks. In Adaptive Processing of Sequences and Data Structures, volume 1387 of Lecture Notes in Artificial Intelligence, pages 168--197. Springer-Verlag, 1998."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the Second International Conference on Pervasive Computing (Pervasive'04)","author":"Gu T.","year":"2004","unstructured":"T. Gu , H. K. Peng , and D. Q. Zhang . A Bayesian approach for dealing with uncertain contexts . In Proceedings of the Second International Conference on Pervasive Computing (Pervasive'04) , Vienna, Austria , April 2004 . Austrian Computer Society. T. Gu, H. K. Peng, and D. Q. Zhang. A Bayesian approach for dealing with uncertain contexts. In Proceedings of the Second International Conference on Pervasive Computing (Pervasive'04), Vienna, Austria, April 2004. Austrian Computer Society."},{"issue":"2","key":"e_1_3_2_1_35_1","first-page":"11","article-title":"An overview of some recent developments in Bayesian problem solving techniques","volume":"20","author":"Haddawy P.","year":"1999","unstructured":"P. Haddawy . An overview of some recent developments in Bayesian problem solving techniques . AI Magazine , 20 ( 2 ): 11 -- 19 , 1999 . P. Haddawy. An overview of some recent developments in Bayesian problem solving techniques. AI Magazine, 20(2):11--19, 1999.","journal-title":"AI Magazine"},{"key":"e_1_3_2_1_36_1","unstructured":"G. Hogben. P3P using the semantic web (OWL ontology RDF policy and RDQL rules). Technical report W3C Working Group Note http:\/\/www.w3.org\/P3P\/2004\/040920_p3p-sw.html September 3 2004.  G. Hogben. P3P using the semantic web (OWL ontology RDF policy and RDQL rules). Technical report W3C Working Group Note http:\/\/www.w3.org\/P3P\/2004\/040920_p3p-sw.html September 3 2004."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2004.1263065"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63843"},{"key":"e_1_3_2_1_39_1","volume-title":"An introduction to Bayesian networks","author":"Jensen F. V.","year":"1996","unstructured":"F. V. Jensen . An introduction to Bayesian networks . UCL Press , London, UK , 1996 . F. V. Jensen. An introduction to Bayesian networks. UCL Press, London, UK, 1996."},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'03)","author":"Kagal L.","year":"2003","unstructured":"L. Kagal , T. Finin , and A. Joshi . A policy language for pervasive systems . In Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'03) , Lake Como, June 4--6 2003 . L. Kagal, T. Finin, and A. Joshi. A policy language for pervasive systems. In Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'03), Lake Como, June 4--6 2003."},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the W3C Workshop on Constraints and Capabilities for Web Services","author":"Kagal L.","year":"2004","unstructured":"L. Kagal , T. Finin , and A. Joshi . Declarative policies for describing web services capabilities and constraints . In Proceedings of the W3C Workshop on Constraints and Capabilities for Web Services , Redwood Shores, CA, USA, October 12--14 2004 . L. Kagal, T. Finin, and A. Joshi. Declarative policies for describing web services capabilities and constraints. In Proceedings of the W3C Workshop on Constraints and Capabilities for Web Services, Redwood Shores, CA, USA, October 12--14 2004."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2004.04.002"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/335168.335210"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2005.15"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/42641.42653"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(85)90042-6"},{"key":"e_1_3_2_1_48_1","volume-title":"Probabilistic Reasoning in Expert Systems: Theory and Algorithms","author":"Neapolitan R. E.","year":"1990","unstructured":"R. E. Neapolitan . Probabilistic Reasoning in Expert Systems: Theory and Algorithms . John Wiley & amp; Sons, Inc., New York, NY, USA, 1990 . R. E. Neapolitan. Probabilistic Reasoning in Expert Systems: Theory and Algorithms. John Wiley &amp; Sons, Inc., New York, NY, USA, 1990."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1155\/S1110865702206083"},{"key":"e_1_3_2_1_50_1","first-page":"470","volume-title":"Proceedings of the 20th Hawaii International Conference on System Science","author":"Nute D.","year":"1987","unstructured":"D. Nute . Defeasible reasoning . In Proceedings of the 20th Hawaii International Conference on System Science , pages 470 -- 477 , Kailua-Kona, HI, USA , 1987 . IEEE Press. D. Nute. Defeasible reasoning. In Proceedings of the 20th Hawaii International Conference on System Science, pages 470--477, Kailua-Kona, HI, USA, 1987. IEEE Press."},{"key":"e_1_3_2_1_51_1","volume-title":"Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference","author":"Pearl J.","year":"1988","unstructured":"J. Pearl . Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference . Morgan Kaufmann Publishers , San Franciso, CA, USA , 1988 . J. Pearl. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann Publishers, San Franciso, CA, USA, 1988."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.04.005"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/348.349"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(80)90014-4"},{"key":"e_1_3_2_1_55_1","first-page":"10","volume-title":"IEEE Personal Communications","author":"Satyanarayanan M.","year":"2001","unstructured":"M. Satyanarayanan . Pervasive computing : vision and challenges . IEEE Personal Communications , pages 10 -- 17 , August 2001 . M. Satyanarayanan. Pervasive computing: vision and challenges. IEEE Personal Communications, pages 10--17, August 2001."},{"key":"e_1_3_2_1_56_1","volume-title":"USA","author":"Shafer G.","year":"1976","unstructured":"G. Shafer . A Mathematical Theory of Evidence . Princeton University Press, Princeton, MA , USA , 1976 . G. Shafer. A Mathematical Theory of Evidence. Princeton University Press, Princeton, MA, USA, 1976."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/319830.319833"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/882082.882103"},{"key":"e_1_3_2_1_59_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/978-3-540-40956-4_3","volume-title":"Proceedings of the 3rd Workshop on Privacy Enhancing Technologies (PET'03)","author":"Steinbrecher S.","year":"2003","unstructured":"S. Steinbrecher and S. K\u00f6psell . Modelling unlinkability . In R. Dingledine, editor, Proceedings of the 3rd Workshop on Privacy Enhancing Technologies (PET'03) , volume 2760 of LNCS , pages 32 -- 47 , Dresden, Germany, March 26--28 2003 . Springer-Verlag . S. Steinbrecher and S. K\u00f6psell. Modelling unlinkability. In R. Dingledine, editor, Proceedings of the 3rd Workshop on Privacy Enhancing Technologies (PET'03), volume 2760 of LNCS, pages 32--47, Dresden, Germany, March 26--28 2003. Springer-Verlag."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/882490.884206"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1994.383392"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.237456"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/159544.159617"},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of the 20th International Conference on Machine Learning (ICML-2003)","author":"Wong W.-K.","year":"2003","unstructured":"W.-K. Wong , G. Cooper , and M. Wagner . Bayesian network anomaly pattern detection for disease outbreaks . In Proceedings of the 20th International Conference on Machine Learning (ICML-2003) , Washington DC, USA , 2003 . W.-K. Wong, G. Cooper, and M. Wagner. Bayesian network anomaly pattern detection for disease outbreaks. In Proceedings of the 20th International Conference on Machine Learning (ICML-2003), Washington DC, USA, 2003."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/794198.795101"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"}],"event":{"name":"PST06: International Conference on Privacy, Security and Trust","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Markham Ontario Canada","acronym":"PST06"},"container-title":["Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1501434.1501464","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1501434.1501464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:40Z","timestamp":1750259200000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1501434.1501464"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10,30]]},"references-count":64,"alternative-id":["10.1145\/1501434.1501464","10.1145\/1501434"],"URL":"https:\/\/doi.org\/10.1145\/1501434.1501464","relation":{},"subject":[],"published":{"date-parts":[[2006,10,30]]},"assertion":[{"value":"2006-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}