
{  
   "types" : {
      "Bookmark" : {
         "pluralLabel" : "Bookmarks"
      },
      "Publication" : {
         "pluralLabel" : "Publications"
      },
      "GoldStandardPublication" : {
         "pluralLabel" : "GoldStandardPublications"
      },
      "GoldStandardBookmark" : {
         "pluralLabel" : "GoldStandardBookmarks"
      },
      "Tag" : {
         "pluralLabel" : "Tags"
      },
      "User" : {
         "pluralLabel" : "Users"
      },
      "Group" : {
         "pluralLabel" : "Groups"
      },
      "Sphere" : {
         "pluralLabel" : "Spheres"
      }
   },
   
   "properties" : {
      "count" : {
         "valueType" : "number"
      },
      "date" : {
         "valueType" : "date"
      },
      "changeDate" : {
         "valueType" : "date"
      },
      "url" : {
         "valueType" : "url"
      },
      "id" : {
         "valueType" : "url"
      },
      "tags" : {
         "valueType" : "item"
      },
      "user" : {
         "valueType" : "item"
      }      
   },
   
   "items" : [
   	  
      {
         "type" : "Publication",
         "id"   : "https://puma.ub.uni-stuttgart.de/bibtex/229482e95a9cbd13bb7a1762d7a0b2013/christophstach",         
         "tags" : [
            "access_control","complex_event_processing","databases","pattern_concealing","privacy","stream_processing"
         ],
         
         "intraHash" : "29482e95a9cbd13bb7a1762d7a0b2013",
         "interHash" : "5a0424aefb2e6d7dc76587b78766c211",
         "label" : "How a Pattern-based Privacy System Contributes to Improve Context Recognition",
         "user" : "christophstach",
         "description" : "",
         "date" : "2020-09-21 11:45:55",
         "changeDate" : "2020-09-21 09:45:55",
         "count" : 2,
         "pub-type": "inproceedings",
         "booktitle": "Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops","series": "CoMoRea '18","publisher":"IEEE","address":"Athens",
         "year": "2018", 
         "url": "", 
         
         "author": [ 
            "Christoph Stach","Frank Dürr","Kai Mindermann","Saravana Murthy Palanisamy","Stefan Wagner"
         ],
         "authors": [
         	
            	{"first" : "Christoph",	"last" : "Stach"},
            	{"first" : "Frank",	"last" : "Dürr"},
            	{"first" : "Kai",	"last" : "Mindermann"},
            	{"first" : "Saravana Murthy",	"last" : "Palanisamy"},
            	{"first" : "Stefan",	"last" : "Wagner"}
         ],
         
         "editor": [ 
            "George Roussos","Achilles Kameas","Pascal Hirmer","Timo Sztyler","Jadwiga Indulska"
         ],
         "editors": [
         	
            	{"first" : "George",	"last" : "Roussos"},
            	{"first" : "Achilles",	"last" : "Kameas"},
            	{"first" : "Pascal",	"last" : "Hirmer"},
            	{"first" : "Timo",	"last" : "Sztyler"},
            	{"first" : "Jadwiga",	"last" : "Indulska"}
         ],
         "pages": "238\u2013243","abstract": "As Smart Devices have access to a lot of user-preferential data, they come in handy in any situation. Although such data\u2014as well as the knowledge which can be derived from it\u2014is highly beneficial as apps are able to adapt their services appropriate to the respective context, it also poses a privacy threat. Thus, a lot of research work is done regarding privacy. Yet, all approaches obfuscate certain attributes which has a negative impact on context recognition and thus service quality. Therefore, we introduce a novel access control mechanism called PATRON. The basic idea is to control access to information patterns. For instance, a person suffering from diabetes might not want to reveal his or her unhealthy eating habit, which can be derived from the pattern \"rising blood sugar level\" → \"adding bread units\". Such a pattern which must not be discoverable by some parties (e.g., insurance companies) is called private pattern whereas a pattern which improves an app's service quality is labeled as public pattern. PATRON employs different techniques to conceal private patterns and, in case of available alternatives, selects the one with the least negative impact on service quality, such that the recognition of public patterns is supported as good as possible.",
         "isbn" : "978-1-5386-3228-4",
         
         "doi" : "10.1109/PERCOMW.2018.8480227",
         
         "bibtexKey": "comorea_18_patron"

      }
	  
   ]
}
