{"id":"https://openalex.org/W2013328030","doi":"https://doi.org/10.1007/s10207-009-0088-z","title":"Uncertain inference control in privacy protection","display_name":"Uncertain inference control in privacy protection","publication_year":2009,"publication_date":"2009-08-05","ids":{"openalex":"https://openalex.org/W2013328030","doi":"https://doi.org/10.1007/s10207-009-0088-z","mag":"2013328030"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-009-0088-z","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-009-0088-z","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100736327","display_name":"Xiangdong An","orcid":"https://orcid.org/0000-0003-3873-6884"},"institutions":[{"id":"https://openalex.org/I192455969","display_name":"York University","ror":"https://ror.org/05fq50484","country_code":"CA","type":"education","lineage":["https://openalex.org/I192455969"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Xiangdong An","raw_affiliation_strings":["Department of Computer Science and Engineering, York University, Toronto, ON, M3J 1P3, Canada","York University, Department of Computer Science and Engineering, M3J 1P3, Toronto, ON, Canada#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, York University, Toronto, ON, M3J 1P3, Canada","institution_ids":["https://openalex.org/I192455969"]},{"raw_affiliation_string":"York University, Department of Computer Science and Engineering, M3J 1P3, Toronto, ON, Canada#TAB#","institution_ids":["https://openalex.org/I192455969"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018256500","display_name":"Dawn Jutla","orcid":"https://orcid.org/0000-0001-5102-0368"},"institutions":[{"id":"https://openalex.org/I66890659","display_name":"Saint Mary's University","ror":"https://ror.org/010zh7098","country_code":"CA","type":"education","lineage":["https://openalex.org/I66890659"]},{"id":"https://openalex.org/I290929228","display_name":"University of Saint Mary","ror":"https://ror.org/04x94xw62","country_code":"US","type":"education","lineage":["https://openalex.org/I290929228"]}],"countries":["CA","US"],"is_corresponding":false,"raw_author_name":"Dawn Jutla","raw_affiliation_strings":["Department of Finance, Information Systems, and Management Science, Saint Mary\u2019s University, Halifax, NS, B3H 3C3, Canada","Saint Mary\u2019s University, Department of Finance, Information Systems, and Management Science, B3H 3C3, Halifax, NS, Canada#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Finance, Information Systems, and Management Science, Saint Mary\u2019s University, Halifax, NS, B3H 3C3, Canada","institution_ids":["https://openalex.org/I66890659"]},{"raw_affiliation_string":"Saint Mary\u2019s University, Department of Finance, Information Systems, and Management Science, B3H 3C3, Halifax, NS, Canada#TAB#","institution_ids":["https://openalex.org/I290929228"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105530330","display_name":"Nick Cercone","orcid":null},"institutions":[{"id":"https://openalex.org/I192455969","display_name":"York University","ror":"https://ror.org/05fq50484","country_code":"CA","type":"education","lineage":["https://openalex.org/I192455969"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Nick Cercone","raw_affiliation_strings":["Department of Computer Science and Engineering, York University, Toronto, ON, M3J 1P3, Canada","York University, Department of Computer Science and Engineering, M3J 1P3, Toronto, ON, Canada#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, York University, Toronto, ON, M3J 1P3, Canada","institution_ids":["https://openalex.org/I192455969"]},{"raw_affiliation_string":"York University, Department of Computer Science and Engineering, M3J 1P3, Toronto, ON, Canada#TAB#","institution_ids":["https://openalex.org/I192455969"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114257696","display_name":"Charnyote Pluempitiwiriyawej","orcid":null},"institutions":[{"id":"https://openalex.org/I25399158","display_name":"Mahidol University","ror":"https://ror.org/01znkr924","country_code":"TH","type":"education","lineage":["https://openalex.org/I25399158"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Charnyote Pluempitiwiriyawej","raw_affiliation_strings":["Faculty of Information and Communication Technology, Mahidol University, Salaya, Nakhon Pathom, 73170, Thailand","Mahidol University, Faculty of Information and Communication Technology, Salaya, 73170, Nakhon Pathom, Thailand#TAB#"],"affiliations":[{"raw_affiliation_string":"Faculty of Information and Communication Technology, Mahidol University, Salaya, Nakhon Pathom, 73170, Thailand","institution_ids":["https://openalex.org/I25399158"]},{"raw_affiliation_string":"Mahidol University, Faculty of Information and Communication Technology, Salaya, 73170, Nakhon Pathom, Thailand#TAB#","institution_ids":["https://openalex.org/I25399158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100452497","display_name":"Hai Wang","orcid":"https://orcid.org/0000-0002-2860-1954"},"institutions":[{"id":"https://openalex.org/I290929228","display_name":"University of Saint Mary","ror":"https://ror.org/04x94xw62","country_code":"US","type":"education","lineage":["https://openalex.org/I290929228"]},{"id":"https://openalex.org/I66890659","display_name":"Saint Mary's University","ror":"https://ror.org/010zh7098","country_code":"CA","type":"education","lineage":["https://openalex.org/I66890659"]}],"countries":["CA","US"],"is_corresponding":false,"raw_author_name":"Hai Wang","raw_affiliation_strings":["Department of Finance, Information Systems, and Management Science, Saint Mary\u2019s University, Halifax, NS, B3H 3C3, Canada","Saint Mary\u2019s University, Department of Finance, Information Systems, and Management Science, B3H 3C3, Halifax, NS, Canada#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Finance, Information Systems, and Management Science, Saint Mary\u2019s University, Halifax, NS, B3H 3C3, Canada","institution_ids":["https://openalex.org/I66890659"]},{"raw_affiliation_string":"Saint Mary\u2019s University, Department of Finance, Information Systems, and Management Science, B3H 3C3, Halifax, NS, Canada#TAB#","institution_ids":["https://openalex.org/I290929228"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100736327"],"corresponding_institution_ids":["https://openalex.org/I192455969"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":null,"fwci":0.3275,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.58424434,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"8","issue":"6","first_page":"423","last_page":"431"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.7868553400039673},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7782590389251709},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.7221207022666931},{"id":"https://openalex.org/keywords/enabling","display_name":"Enabling","score":0.6742520332336426},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6133713126182556},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.6117252111434937},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.556284487247467},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44347521662712097},{"id":"https://openalex.org/keywords/context-awareness","display_name":"Context awareness","score":0.4371919333934784},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4250238835811615},{"id":"https://openalex.org/keywords/context-management","display_name":"Context management","score":0.421196311712265},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.33986249566078186},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.33513832092285156},{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.330625057220459},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.1823689341545105},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.145220547914505},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.13540369272232056}],"concepts":[{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.7868553400039673},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7782590389251709},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.7221207022666931},{"id":"https://openalex.org/C22607594","wikidata":"https://www.wikidata.org/wiki/Q5375150","display_name":"Enabling","level":2,"score":0.6742520332336426},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6133713126182556},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.6117252111434937},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.556284487247467},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44347521662712097},{"id":"https://openalex.org/C2781368080","wikidata":"https://www.wikidata.org/wiki/Q501688","display_name":"Context awareness","level":3,"score":0.4371919333934784},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4250238835811615},{"id":"https://openalex.org/C2776285913","wikidata":"https://www.wikidata.org/wiki/Q5165183","display_name":"Context management","level":3,"score":0.421196311712265},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.33986249566078186},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.33513832092285156},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.330625057220459},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.1823689341545105},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.145220547914505},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.13540369272232056},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-009-0088-z","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-009-0088-z","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5699999928474426,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1557915535","https://openalex.org/W1954820475","https://openalex.org/W1967661515","https://openalex.org/W1969789681","https://openalex.org/W1978930785","https://openalex.org/W1981263713","https://openalex.org/W2021851523","https://openalex.org/W2028907859","https://openalex.org/W2036265926","https://openalex.org/W2045709548","https://openalex.org/W2046955691","https://openalex.org/W2080828514","https://openalex.org/W2081578468","https://openalex.org/W2104270762","https://openalex.org/W2134374724","https://openalex.org/W2152318637","https://openalex.org/W2156505055","https://openalex.org/W2159080219","https://openalex.org/W2164441047","https://openalex.org/W2911823491","https://openalex.org/W4285719527","https://openalex.org/W4312675197","https://openalex.org/W4313729847","https://openalex.org/W6602499392"],"related_works":["https://openalex.org/W2059592812","https://openalex.org/W4232025056","https://openalex.org/W2392958972","https://openalex.org/W2153812024","https://openalex.org/W2436001314","https://openalex.org/W57335507","https://openalex.org/W1656433004","https://openalex.org/W1553902753","https://openalex.org/W2116169104","https://openalex.org/W2023497434"],"abstract_inverted_index":null,"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
