{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:46:06Z","timestamp":1725471966538},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540478423"},{"type":"electronic","value":"9783540478454"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11907503_26","type":"book-chapter","created":{"date-parts":[[2006,10,24]],"date-time":"2006-10-24T10:15:53Z","timestamp":1161684953000},"page":"255-258","source":"Crossref","is-referenced-by-count":5,"title":["Balancing Smartness and Privacy for the Ambient Intelligence"],"prefix":"10.1007","author":[{"given":"Harold","family":"van Heerde","sequence":"first","affiliation":[]},{"given":"Nicolas","family":"Anciaux","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Peter M. G.","family":"Apers","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45427-6_23","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"M. Langheinrich","year":"2001","unstructured":"Langheinrich, M.: Privacy by design - principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol.\u00a02201, pp. 273\u2013291. Springer, Heidelberg (2001)"},{"unstructured":"Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. Technical Report 92.1, ORL, 24a Trumpington Street, Cambridge CB2 1QA (1992)","key":"26_CR2"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/3-540-45809-3_14","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"X. Jiang","year":"2002","unstructured":"Jiang, X., Hong, J.I., Landay, J.A.: Approximate information flows: Socially-based modeling of privacy in ubiquitous computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 176\u2013193. Springer, Heidelberg (2002)"},{"unstructured":"Little, L., Briggs, P.: Tumult and turmoil: privacy in an ambient world. In: Workshop on Privacy, Trust and Identity Issues for Ambient Intelligence (Pervasive 2006) (2006)","key":"26_CR4"},{"unstructured":"W3C: Platform for privacy preferences (P3P) project (2005), http:\/\/www.w3.org\/P3P\/","key":"26_CR5"},{"unstructured":"Byun, J.W., Bertino, E.: Micro-views, or on how to protect privacy while enhancing data usability. Vision paper CERIAS Tech Report 2005-25, Center for Education and Research in Information Assurance and Security, West Lafayette, IN 47907-2086 (2005)","key":"26_CR6"},{"doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: 28th Int\u2019l Conf. on Very Large Databases (VLDB), Hong Kong (2002)","key":"26_CR7","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1145\/990064.990087","volume-title":"MobiSys 2004: Proceedings of the 2nd international conference on Mobile systems, applications, and services","author":"J.I. Hong","year":"2004","unstructured":"Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: MobiSys 2004: Proceedings of the 2nd international conference on Mobile systems, applications, and services, pp. 177\u2013189. ACM Press, New York (2004)"},{"doi-asserted-by":"crossref","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal on Uncertainty Fuzziness and Knowledge-based Systems, 557\u2013570 (2002)","key":"26_CR9","DOI":"10.1142\/S0218488502001648"},{"doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: CLDB (2006)","key":"26_CR10","DOI":"10.1109\/ICDE.2006.1"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-540-30576-7_20","volume-title":"Theory of Cryptography","author":"S. Chawla","year":"2005","unstructured":"Chawla, S., Dwork, C., McSherry, F., Smith, A., Wee, H.M.: Toward privacy in public databases. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 363\u2013385. Springer, Heidelberg (2005)"},{"doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: Personalized privacy preservation. In: ACM Conference on Management of Data (SIGMOD) (2006)","key":"26_CR12","DOI":"10.1145\/1142473.1142500"},{"unstructured":"Doom, C.: Get smart: How intelligent technology will enhance our world. Technical report, Computer Sciences Corporation: Leading Edge Forum (2001), A report available from: www.csc.com","key":"26_CR13"},{"unstructured":"Anciaux, N., van Heerde, H., Feng, L., Apers, P.: Implanting life-cycle privacy policies in a context database. Technical Report TR-CTIT-06-03, University of Twente, P.O. Box 217 (2006)","key":"26_CR14"}],"container-title":["Lecture Notes in Computer Science","Smart Sensing and Context"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11907503_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T19:53:20Z","timestamp":1555876400000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11907503_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540478423","9783540478454"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11907503_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}