{"id":"https://openalex.org/W2029743649","doi":"https://doi.org/10.1145/2457317.2457346","title":"A privacy preserving model bridging data provider and collector preferences","display_name":"A privacy preserving model bridging data provider and collector preferences","publication_year":2013,"publication_date":"2013-03-18","ids":{"openalex":"https://openalex.org/W2029743649","doi":"https://doi.org/10.1145/2457317.2457346","mag":"2029743649"},"language":"en","primary_location":{"id":"doi:10.1145/2457317.2457346","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2457317.2457346","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Joint EDBT/ICDT 2013 Workshops","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076308324","display_name":"Kambiz Ghazinour","orcid":"https://orcid.org/0000-0002-6816-2968"},"institutions":[{"id":"https://openalex.org/I153718931","display_name":"University of Ottawa","ror":"https://ror.org/03c4mmv16","country_code":"CA","type":"education","lineage":["https://openalex.org/I153718931"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Kambiz Ghazinour","raw_affiliation_strings":["University of Ottawa, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Ottawa, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I153718931"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103259319","display_name":"Ken Barker","orcid":"https://orcid.org/0000-0001-5452-3825"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ken Barker","raw_affiliation_strings":["University of Calgary, Calgary, AB, Canada","University of Calgary; Calgary; AB; Canada"],"affiliations":[{"raw_affiliation_string":"University of Calgary, Calgary, AB, Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"University of Calgary; Calgary; AB; Canada","institution_ids":["https://openalex.org/I168635309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076308324"],"corresponding_institution_ids":["https://openalex.org/I153718931"],"apc_list":null,"apc_paid":null,"fwci":1.4827,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.85923835,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"174","last_page":"178"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.7409082055091858},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.7188135981559753},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.6933056712150574},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.6755282282829285},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6604641675949097},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.6180107593536377},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.574366569519043},{"id":"https://openalex.org/keywords/personalization","display_name":"Personalization","score":0.48519137501716614},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.4782201945781708},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.46525484323501587},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45598745346069336},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.42382967472076416},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.30743131041526794},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.23717817664146423},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19406038522720337},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.10116484761238098}],"concepts":[{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.7409082055091858},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.7188135981559753},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.6933056712150574},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.6755282282829285},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6604641675949097},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.6180107593536377},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.574366569519043},{"id":"https://openalex.org/C183003079","wikidata":"https://www.wikidata.org/wiki/Q1000371","display_name":"Personalization","level":2,"score":0.48519137501716614},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.4782201945781708},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.46525484323501587},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45598745346069336},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.42382967472076416},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.30743131041526794},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.23717817664146423},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19406038522720337},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.10116484761238098},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2457317.2457346","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2457317.2457346","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Joint EDBT/ICDT 2013 Workshops","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.428.5277","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.428.5277","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.edbt.org/Proceedings/2013-Genova/papers/workshops/a25-ghazinour.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W24519797","https://openalex.org/W1505601678","https://openalex.org/W1505817364","https://openalex.org/W1566853478","https://openalex.org/W1967221886","https://openalex.org/W2041779882","https://openalex.org/W2100719963","https://openalex.org/W2102781484","https://openalex.org/W2103317919","https://openalex.org/W2129481183","https://openalex.org/W2154524064","https://openalex.org/W2482778789","https://openalex.org/W2914418376","https://openalex.org/W4234598713","https://openalex.org/W6675844770"],"related_works":["https://openalex.org/W2116878667","https://openalex.org/W3042284153","https://openalex.org/W2994243660","https://openalex.org/W2118333568","https://openalex.org/W2132024542","https://openalex.org/W2154524064","https://openalex.org/W576625533","https://openalex.org/W2187353989","https://openalex.org/W2549995367","https://openalex.org/W4381737504"],"abstract_inverted_index":{"With":[0],"the":[1,30,57,85,90,138,143,151],"increasing":[2],"amount":[3],"of":[4,32,75,88,113,119,145,155],"data":[5,14,19,91,121],"collected":[6],"by":[7,42],"service":[8,26,123],"providers,":[9],"privacy":[10,31,45,51,69,86,109,114,134,147],"concerns":[11],"increase":[12],"for":[13],"owners":[15],"who":[16],"provide":[17,142],"private":[18],"to":[20,28,47],"receive":[21],"services.":[22],"Legislative":[23],"acts":[24],"require":[25],"providers":[27],"protect":[29],"customers.":[33],"Privacy":[34,101],"policy":[35,52],"frameworks,":[36],"such":[37],"as":[38],"P3P,":[39],"assist":[40],"them":[41],"describing":[43],"their":[44],"policies":[46,58],"customers":[48],"(e.g.":[49],"publishing":[50],"on":[53],"websites).":[54],"Unfortunately,":[55],"providing":[56],"alone":[59],"does":[60],"not":[61,71],"guarantee":[62],"that":[63,107,149],"they":[64],"are":[65],"actually":[66],"enforced":[67],"because":[68],"is":[70],"a":[72,99],"key":[73],"feature":[74],"conventional":[76],"access":[77],"control":[78],"models.":[79],"A":[80],"privacy-preserving":[81],"model":[82],"should":[83],"consider":[84],"preferences":[87,118],"both":[89,120],"provider":[92],"and":[93,116,122,130,140,153],"collector.":[94],"This":[95],"paper":[96],"briefly":[97],"develops":[98],"Lattice-based":[100],"Aware":[102],"Access":[103],"Control":[104],"(LPAAC)":[105],"Model":[106],"enforces":[108],"policies,":[110],"facilitates":[111],"customization":[112],"agreements,":[115],"accommodates":[117],"providers.":[124],"We":[125],"demonstrate":[126],"our":[127,146,156],"model's":[128],"design":[129],"feasibility":[131],"with":[132],"corresponding":[133],"catalogues.":[135],"Examples":[136],"clarify":[137],"usability,":[139],"we":[141],"implementation":[144],"catalogues":[148],"show":[150],"efficiency":[152],"scalability":[154],"model.":[157]},"counts_by_year":[{"year":2020,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
