iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/EEE.2005.90
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T12:28:14Z","timestamp":1725625694534},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/eee.2005.90","type":"proceedings-article","created":{"date-parts":[[2005,4,12]],"date-time":"2005-04-12T10:25:58Z","timestamp":1113301558000},"page":"536-541","source":"Crossref","is-referenced-by-count":3,"title":["Maturing e-Privacy with P3P and Context Agents"],"prefix":"10.1109","author":[{"given":"D.","family":"Jutla","sequence":"first","affiliation":[]},{"family":"Yanjun Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/PDCAT.2003.1236265"},{"key":"14","first-page":"74","article-title":"Anytime belief revision","author":"williams","year":"1997","journal-title":"Proc of the Fifteenth Int Joint Conf on Artificial Intelligence"},{"year":"2005","author":"jutla","journal-title":"Information Systems","article-title":"PeCAN: An architecture for privacy-aware user contexts for electronic commerce on the semantic web","key":"11"},{"year":"2004","key":"12"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/952532.952653"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1109\/ICDE.2003.1260824","article-title":"Implementing P3P using database technology","author":"agrawal","year":"2003","journal-title":"Proc 19th Int l Conf Data Eng"},{"year":"0","author":"aggarwal","journal-title":"VLDB 2004","article-title":"Vision paper: Enabling privacy for the paranoids","key":"1"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1007\/978-3-540-30073-1_8"},{"key":"7","first-page":"11","article-title":"Usability meets security - The identity-manager as your personal security agent for the internet","author":"jendricke","year":"2000","journal-title":"16th Annual Computer Security Applications Conference"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1086\/209250"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1007\/s00779-003-0253-8"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/634067.634346"},{"year":"2004","author":"jutla","journal-title":"IEEE International Conference on E-Commerce","article-title":"Evaluation of the impact of user intervention mechanisms for privacy on online SME trust","key":"9"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/MSP.2005.50"}],"event":{"name":"2005 IEEE International Conference on e-Technology, e-Commerce and e-Service","location":"Hong Kong, China"},"container-title":["2005 IEEE International Conference on e-Technology, e-Commerce and e-Service"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9634\/30444\/01402354.pdf?arnumber=1402354","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T14:13:23Z","timestamp":1497622403000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1402354\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":14,"URL":"http:\/\/dx.doi.org\/10.1109\/eee.2005.90","relation":{},"subject":[]}}