{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T09:11:36Z","timestamp":1685351496731},"reference-count":0,"publisher":"National Library of Serbia","issue":"4","license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ComSIS","COMPUT SCI INF SYST","COMPUT SCI INFORM SY","COMPUTER SCI INFORM","COMSIS J"],"published-print":{"date-parts":[[2011]]},"abstract":"<jats:p>In this paper, we adopt the classification of personal information and\n   hierarchy of services to build a privacy system, in which one communicates\n   with each other via pipes with different security levels. In each level, one\n   has the corresponding rights to access each other. The requesters are not\n   able to be infringed based on the personal information that service obtains\n   from service providers. Privacy system can decrease the interaction, while in\n   other circumstance the system strengthens and enhances the privacy\n   preserving. Thus we strike a balance between two goals of Ubiquitous\n   Computing: interaction and privacy preserving.<\/jats:p>","DOI":"10.2298\/csis110315055m","type":"journal-article","created":{"date-parts":[[2011,10,13]],"date-time":"2011-10-13T06:59:22Z","timestamp":1318489162000},"page":"1185-1206","source":"Crossref","is-referenced-by-count":2,"title":["Privacy preserving in ubiquitous computing: Classification &amp; hierarchy"],"prefix":"10.2298","volume":"8","author":[{"given":"Tinghuai","family":"Ma","sequence":"first","affiliation":[{"name":"Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing, China"}]},{"given":"Sen","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Computer & Software, Nanjing University of Information Science & Technology, Nanjing, China"}]},{"given":"Jin","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Kyung Hee University, Suwon, South Korea"}]},{"given":"Sungyoung","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Kyung Hee University, Suwon, South Korea"}]}],"member":"1078","container-title":["Computer Science and Information Systems"],"original-title":[],"language":"en","deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T08:30:27Z","timestamp":1685349027000},"score":1,"resource":{"primary":{"URL":"https:\/\/doiserbia.nb.rs\/Article.aspx?ID=1820-02141100055M"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"references-count":0,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011]]}},"URL":"https:\/\/doi.org\/10.2298\/csis110315055m","relation":{},"ISSN":["1820-0214","2406-1018"],"issn-type":[{"value":"1820-0214","type":"print"},{"value":"2406-1018","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}