{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:40Z","timestamp":1750306900969,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,3,18]],"date-time":"2013-03-18T00:00:00Z","timestamp":1363564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,3,18]]},"DOI":"10.1145\/2457317.2457346","type":"proceedings-article","created":{"date-parts":[[2013,3,26]],"date-time":"2013-03-26T12:25:54Z","timestamp":1364300754000},"page":"174-178","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A privacy preserving model bridging data provider and collector preferences"],"prefix":"10.1145","author":[{"given":"Kambiz","family":"Ghazinour","sequence":"first","affiliation":[{"name":"University of Ottawa, Ottawa, ON, Canada"}]},{"given":"Ken","family":"Barker","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]}],"member":"320","published-online":{"date-parts":[[2013,3,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1287369.1287383"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0023-0"},{"key":"e_1_3_2_1_3_1","volume-title":"O'Reilly","author":"Cranor L.","year":"2002","unstructured":"L. Cranor , Web Privacy with P3P , O'Reilly , 2002 . L. Cranor, Web Privacy with P3P, O'Reilly, 2002."},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"Proceedings of the 15th Natioanl Computer Security Conference","author":"Ferraiolo D.","year":"1992","unstructured":"D. Ferraiolo and R. Kuhn . Role-based access control . In Proceedings of the 15th Natioanl Computer Security Conference , pages 1 -- 11 , October 1992 . D. Ferraiolo and R. Kuhn. Role-based access control. In Proceedings of the 15th Natioanl Computer Security Conference, pages 1--11, October 1992."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1971690.1971694"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.356"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.156"},{"key":"e_1_3_2_1_8_1","first-page":"377","article-title":"Extending SQL to Support Privacy Policies. From Sociology to Computing","volume":"2010","author":"Ghazinour K.","unstructured":"K. Ghazinour , S. Pun , M. Majedi , A. H. Chinaei , K. Barker : Extending SQL to Support Privacy Policies. From Sociology to Computing in Social Networks 2010 : 377 -- 393 . K. Ghazinour, S. Pun, M. Majedi, A. H. Chinaei, K. Barker: Extending SQL to Support Privacy Policies. From Sociology to Computing in Social Networks 2010: 377--393.","journal-title":"Social Networks"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/794201.795180"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266848"},{"key":"e_1_3_2_1_11_1","first-page":"5","article-title":"Privacy contracts incorporated in a privacy protection framework","volume":"21","author":"Oberholzer H. J. G.","year":"2006","unstructured":"H. J. G. Oberholzer and M. Olivier , \" Privacy contracts incorporated in a privacy protection framework ,\" International Journal of Computer Systems Science , vol. 21 , 2006 , pp. 5 -- 16 . H. J. G. Oberholzer and M. Olivier, \"Privacy contracts incorporated in a privacy protection framework,\" International Journal of Computer Systems Science, vol. 21, 2006, pp. 5--16.","journal-title":"International Journal of Computer Systems Science"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-59904-804-8","volume-title":"Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions","author":"Subramanian R.","year":"2008","unstructured":"R. Subramanian , Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions , IRM Press , 2008 . R. Subramanian, Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions, IRM Press, 2008."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"W.\n      van Staden\n     and \n      M. S.\n      Olivier\n  . \n  Using purpose lattices to facilitate customisation of privacy agreements\n  . In C. Lambrinoudakis G. Pernul and A. M. Tjoa editors TrustBus volume \n  4657\n   of \n  Lecture Notes in Computer Science pages \n  201\n  --\n  209\n  . \n  Springer-Verlag 2007\n  .   W. van Staden and M. S. Olivier. Using purpose lattices to facilitate customisation of privacy agreements. In C. Lambrinoudakis G. Pernul and A. M. Tjoa editors TrustBus volume 4657 of Lecture Notes in Computer Science pages 201--209. Springer-Verlag 2007.","DOI":"10.1007\/978-3-540-74409-2_22"}],"event":{"name":"EDBT\/ICDT '13: Joint 2013 EDBT\/ICDT Conferences","acronym":"EDBT\/ICDT '13","location":"Genoa Italy"},"container-title":["Proceedings of the Joint EDBT\/ICDT 2013 Workshops"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2457317.2457346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2457317.2457346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:19:12Z","timestamp":1750234752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2457317.2457346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,18]]},"references-count":13,"alternative-id":["10.1145\/2457317.2457346","10.1145\/2457317"],"URL":"https:\/\/doi.org\/10.1145\/2457317.2457346","relation":{},"subject":[],"published":{"date-parts":[[2013,3,18]]},"assertion":[{"value":"2013-03-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}