{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:48Z","timestamp":1750307328893,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,5,25]],"date-time":"2011-05-25T00:00:00Z","timestamp":1306281600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,5,25]]},"DOI":"10.1145\/2141622.2141684","type":"proceedings-article","created":{"date-parts":[[2012,2,14]],"date-time":"2012-02-14T13:21:44Z","timestamp":1329225704000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Access controls for privacy protection in pervasive environments"],"prefix":"10.1145","author":[{"given":"Hauke","family":"Vagts","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"given":"Erik","family":"Krempel","sequence":"additional","affiliation":[{"name":"Fraunhofer IOSB, Karlsruhe, Germany"}]},{"given":"Yvonne","family":"Fischer","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2011,5,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"A. Anderson. extensible access control markup language (xacml) version 2.0 hierarchical resource profile of xacml v2.0 2005.  A. Anderson. extensible access control markup language (xacml) version 2.0 hierarchical resource profile of xacml v2.0 2005."},{"key":"e_1_3_2_1_2_1","first-page":"339","volume-title":"Future Security: 4th Security Research Conference","author":"Bauer A.","year":"2009"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775437"},{"key":"e_1_3_2_1_4_1","unstructured":"ContentGuard Inc. Xrml version 2.0 technical overview March 2002.  ContentGuard Inc. Xrml version 2.0 technical overview March 2002."},{"key":"e_1_3_2_1_5_1","unstructured":"L. Cranor B. Dobbs S. Egelman G. Hogben J. Humphrey M. Langheinrich M. Marchiori M. Presler-Marshall J. Reagle M. Schunter D. A. Stampley and R. Wenning. The platform for privacy preferences 1.1 (p3p1.1) specification November 2006.  L. Cranor B. Dobbs S. Egelman G. Hogben J. Humphrey M. Langheinrich M. Marchiori M. Presler-Marshall J. Reagle M. Schunter D. A. Stampley and R. Wenning. The platform for privacy preferences 1.1 (p3p1.1) specification November 2006."},{"volume-title":"John Wiley & Sons","year":"2001","author":"Cuppens F.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/WSSC.2010.5730244"},{"volume-title":"Karlsruher Institut f\u00fcr Technologie","year":"2010","author":"Krempel E.","key":"e_1_3_2_1_9_1"},{"volume-title":"UbiComp 2002: ubiquitous computing: 4th International Conference, page 237","year":"2002","author":"Langheinrich M.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"volume-title":"Massachusetts Institute of Technology","year":"2007","author":"Montangero C.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.102"},{"key":"e_1_3_2_1_14_1","unstructured":"OECD editor. OECD guidelines on the protection of privacy and transborder flows of personal data. OECD Publishing 268 edition March 2003.  OECD editor. OECD guidelines on the protection of privacy and transborder flows of personal data . OECD Publishing 268 edition March 2003."},{"key":"e_1_3_2_1_15_1","unstructured":"Open Digital Rights Language ODRL Initiative. ODRL 1.1 specifications August 2002.  Open Digital Rights Language ODRL Initiative. ODRL 1.1 specifications August 2002."},{"volume-title":"SRI International","year":"1998","author":"Samarati P.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"A. Schmidt M. Beigl and H. Gellersen. There is more to context than location. Computers & Graphics 23(6):893--901 1999.  A. Schmidt M. Beigl and H. Gellersen. There is more to context than location. Computers & Graphics 23(6):893--901 1999.","DOI":"10.1016\/S0097-8493(99)00120-X"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA389851"},{"key":"e_1_3_2_1_19_1","first-page":"10","volume-title":"In Policy Management for Web workshop in conjunction with WWW2005 Conference","author":"Syukur E.","year":"2005"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2010.73"},{"key":"e_1_3_2_1_21_1","first-page":"94","volume-title":"Future Security: 4th Security Research Conference","author":"Vagts H.","year":"2009"},{"key":"e_1_3_2_1_22_1","first-page":"1","volume-title":"Mobility and Security (NTMS), 2011 4th IFIP International Conference on","author":"Vagts H.","year":"2011"},{"key":"e_1_3_2_1_23_1","first-page":"11","volume":"1","author":"Yag\u00fce M.","year":"2006","journal-title":"Journal of Information Assurance and Security"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"R. Yavatkar D. Pendarakis and R. Guerin. A Framework for Policy-based Admission Control. RFC 2753 (Informational) Jan. 2000.   R. Yavatkar D. Pendarakis and R. Guerin. A Framework for Policy-based Admission Control. RFC 2753 (Informational) Jan. 2000.","DOI":"10.17487\/rfc2753"}],"event":{"name":"PETRA '11: The 4th International Conference on PErvasive Technologies Related to Assistive Environments","sponsor":["NSF National Science Foundation","Foundation of the Hellenic World","ICS-FORTH Institute of Computer Science, Foundation for Research and Technology - Hellas","U of Tex at Arlington U of Tex at Arlington","UCG University of Central Greece","Didaskaleio Konstantinos Karatheodoris, University of the Aegean","Fulbrigh, Greece Fulbright Foundation, Greece","Ionian Ionian University, GREECE"],"location":"Heraklion Crete Greece","acronym":"PETRA '11"},"container-title":["Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2141622.2141684","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2141622.2141684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:04Z","timestamp":1750244764000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2141622.2141684"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,25]]},"references-count":24,"alternative-id":["10.1145\/2141622.2141684","10.1145\/2141622"],"URL":"https:\/\/doi.org\/10.1145\/2141622.2141684","relation":{},"subject":[],"published":{"date-parts":[[2011,5,25]]},"assertion":[{"value":"2011-05-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}