{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T10:10:29Z","timestamp":1755598229291,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,16]],"date-time":"2012-09-16T00:00:00Z","timestamp":1347753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,16]]},"DOI":"10.1145\/2371316.2371344","type":"proceedings-article","created":{"date-parts":[[2012,9,18]],"date-time":"2012-09-18T14:51:58Z","timestamp":1347979918000},"page":"142-149","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Privacy aware eLearning environments based on hippocratic database principles"],"prefix":"10.1145","author":[{"given":"Jasmin","family":"Azemovi\u0107","sequence":"first","affiliation":[{"name":"University \"D\u017eemal Bijedi\u0107\", Mostar, Bosnia and Herzegovina"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2012,9,16]]},"reference":[{"volume-title":"Professor Emeritus of Public Law and Government","author":"Westin Alan","key":"e_1_3_2_1_1_1","unstructured":"Alan Westin , Professor Emeritus of Public Law and Government , Columbia University Alan Westin, Professor Emeritus of Public Law and Government, Columbia University"},{"key":"e_1_3_2_1_2_1","unstructured":"P. Ashley and D. Moore. Enforcing privacy within an enterprise using IBM Tivoli Privacy Manager for e-business  P. Ashley and D. Moore. Enforcing privacy within an enterprise using IBM Tivoli Privacy Manager for e-business"},{"volume-title":"The 28th International Conference on Very Large Databases (VLDB)","author":"Agrawal R.","key":"e_1_3_2_1_3_1","unstructured":"R. Agrawal , J. Kiernan , R. Srikant , and Y. Xu . Hippocratic databases . In The 28th International Conference on Very Large Databases (VLDB) R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In The 28th International Conference on Very Large Databases (VLDB)"},{"volume-title":"2009 The 2nd IEEE International Conference on Computer Science and Information Technology","author":"Mu\u0161i\u0107 D.","key":"e_1_3_2_1_4_1","unstructured":"D. Mu\u0161i\u0107 , J. Azemovi\u0107 , Mohamed El-Zayat , \"Component of the efficient eUniversity system \", 2009 The 2nd IEEE International Conference on Computer Science and Information Technology D.Mu\u0161i\u0107, J. Azemovi\u0107, Mohamed El-Zayat, \"Component of the efficient eUniversity system\", 2009 The 2nd IEEE International Conference on Computer Science and Information Technology"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/BCI.2009.20"},{"key":"e_1_3_2_1_6_1","volume-title":"ICCEA","author":"Azemovi\u0107 J.","year":"2009","unstructured":"J. Azemovi\u0107 , D. Mu\u0161i\u0107 , \"Efficient model for detection data and data scheme tempering with purpose of valid forensic analysis \", ICCEA 2009 , Manila, Philippines. J.Azemovi\u0107, D. Mu\u0161i\u0107, \"Efficient model for detection data and data scheme tempering with purpose of valid forensic analysis\", ICCEA 2009, Manila, Philippines."},{"key":"e_1_3_2_1_7_1","volume-title":"ICCDA","author":"Mu\u0161i\u0107 D.","year":"2009","unstructured":"D. Mu\u0161i\u0107 , J. Azemovi\u0107 , \"Applying Case-based reasoning for mobile support in diagnosing infective diseases \", ICCDA 2009 , Singapore. D.Mu\u0161i\u0107, J. Azemovi\u0107, \"Applying Case-based reasoning for mobile support in diagnosing infective diseases\", ICCDA 2009, Singapore."},{"key":"e_1_3_2_1_8_1","volume-title":"India ICSTE","author":"Mu\u0161i\u0107 D.","year":"2009","unstructured":"D. Mu\u0161i\u0107 , J. Azemovic . E. \u010catrnja , \"Influence of learning communities and collaborative learning on students' success\", Chennai , India ICSTE 2009 . D.Mu\u0161i\u0107, J. Azemovic. E. \u010catrnja, \"Influence of learning communities and collaborative learning on students' success\", Chennai, India ICSTE 2009."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2004.09.006"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1273730.1273734"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1316689.1316701"},{"key":"e_1_3_2_1_12_1","first-page":"2070","article-title":"Hippocratic Database: A Privacy- Aware Database, Proceedings of World Adademy Of Science","volume":"32","author":"Ghani Norjihan Abdul","year":"2008","unstructured":"Norjihan Abdul Ghani , Zailani Mohd Sidek : Hippocratic Database: A Privacy- Aware Database, Proceedings of World Adademy Of Science , Engineering and Technology Volume 32 , August 2008 , ISSN: 2070 -- 3740 Norjihan Abdul Ghani, Zailani Mohd Sidek: Hippocratic Database: A Privacy- Aware Database, Proceedings of World Adademy Of Science, Engineering and Technology Volume 32, August 2008, ISSN: 2070--3740","journal-title":"Engineering and Technology"},{"issue":"6","key":"e_1_3_2_1_13_1","first-page":"404","article-title":"Hippocratic XML Databases: A Model and an Access Control Mechanism","volume":"21","author":"Leey Jae-Gil","year":"2006","unstructured":"Jae-Gil Leey , Kyu-Young Whangy , Wook-Shin Hanz , Il-Yeol Songx : Hippocratic XML Databases: A Model and an Access Control Mechanism , Journal of Computer Systems Science and Engineering , Vol. 21 , No. 6 , pp. 395 ~ 404 , Nov. 2006 Jae-Gil Leey, Kyu-Young Whangy, Wook-Shin Hanz, Il-Yeol Songx: Hippocratic XML Databases: A Model and an Access Control Mechanism, Journal of Computer Systems Science and Engineering, Vol. 21, No. 6, pp. 395 ~ 404, Nov. 2006","journal-title":"Journal of Computer Systems Science and Engineering"},{"key":"e_1_3_2_1_14_1","unstructured":"Office of the Information and Privacy Commissioner. Data Mining: Staking a Claim on Your Privacy  Office of the Information and Privacy Commissioner. Data Mining: Staking a Claim on Your Privacy"},{"key":"e_1_3_2_1_15_1","volume-title":"Mikro knjiga","author":"Pleskonji\u0107 Dragan","year":"2007","unstructured":"Dragan Pleskonji\u0107 , Nemanja Ma\u010dek , Borislav &Dstrok;or \u0111evi\u0107 , Marko Cari\u0107: Sigurnost ra\u010dunarskih sistema i mre\u017ea , Mikro knjiga 2007 , ISBN 978-86-7555-305-2 Dragan Pleskonji\u0107, Nemanja Ma\u010dek, Borislav &Dstrok;or\u0111evi\u0107, Marko Cari\u0107: Sigurnost ra\u010dunarskih sistema i mre\u017ea, Mikro knjiga 2007, ISBN 978-86-7555-305-2"}],"event":{"name":"BCI '12: Balkan Conference in Informatics, 2012","sponsor":["MSTD Ministry of Education, Science and Technological Development - Serbia","Novi Sad Faculty of Technical Sciences, University of Novi Sad"],"location":"Novi Sad Serbia","acronym":"BCI '12"},"container-title":["Proceedings of the Fifth Balkan Conference in Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2371316.2371344","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2371316.2371344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:12Z","timestamp":1750239252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2371316.2371344"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,16]]},"references-count":15,"alternative-id":["10.1145\/2371316.2371344","10.1145\/2371316"],"URL":"https:\/\/doi.org\/10.1145\/2371316.2371344","relation":{},"subject":[],"published":{"date-parts":[[2012,9,16]]},"assertion":[{"value":"2012-09-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}