Reasoning about the Appropriate Use of Private Data through Computational workflow. Gil, Y. & Fritz, C. In AAAI Spring Symposium on Privacy Management, Stanford, CA, March 23-25, 2010. Paper bibtex @INPROCEEDINGS{gil-fritz-aaaisss10,
author = {Gil, Yolanda and Fritz, Christian},
title = {{Reasoning about the Appropriate Use of Private Data through Computational
workflow}},
booktitle = {AAAI Spring Symposium on Privacy Management, Stanford, CA, March
23-25},
year = {2010},
keywords = {\#prov-xg,\#trust,\#use},
mendeley-tags = {\#prov-xg,\#trust,\#use},
url = {http://www.isi.edu/\~{}gil/papers/gil-fritz-aaaisss10.pdf}
}
Downloads: 0
{"_id":{"_str":"51f6ae0a59ced8df44000f57"},"__v":21,"authorIDs":["5456e1c68b01c81930000021"],"author_short":["Gil, Y.","Fritz, C."],"bibbaseid":"gil-fritz-reasoningabouttheappropriateuseofprivatedatathroughcomputationalworkflow-2010","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"propositions":[],"lastnames":["Gil"],"firstnames":["Yolanda"],"suffixes":[]},{"propositions":[],"lastnames":["Fritz"],"firstnames":["Christian"],"suffixes":[]}],"title":"Reasoning about the Appropriate Use of Private Data through Computational workflow","booktitle":"AAAI Spring Symposium on Privacy Management, Stanford, CA, March 23-25","year":"2010","keywords":"#prov-xg,#trust,#use","mendeley-tags":"#prov-xg,#trust,#use","url":"http://www.isi.edu/̃gil/papers/gil-fritz-aaaisss10.pdf","bibtex":"@INPROCEEDINGS{gil-fritz-aaaisss10,\r\n author = {Gil, Yolanda and Fritz, Christian},\r\n title = {{Reasoning about the Appropriate Use of Private Data through Computational\r\n\tworkflow}},\r\n booktitle = {AAAI Spring Symposium on Privacy Management, Stanford, CA, March\r\n\t23-25},\r\n year = {2010},\r\n keywords = {\\#prov-xg,\\#trust,\\#use},\r\n mendeley-tags = {\\#prov-xg,\\#trust,\\#use},\r\n url = {http://www.isi.edu/\\~{}gil/papers/gil-fritz-aaaisss10.pdf}\r\n}\r\n\r\n","author_short":["Gil, Y.","Fritz, C."],"key":"gil-fritz-aaaisss10","id":"gil-fritz-aaaisss10","bibbaseid":"gil-fritz-reasoningabouttheappropriateuseofprivatedatathroughcomputationalworkflow-2010","role":"author","urls":{"Paper":"http://www.isi.edu/̃gil/papers/gil-fritz-aaaisss10.pdf"},"keyword":["#prov-xg","#trust","#use"],"downloads":0,"html":""},"bibtype":"inproceedings","biburl":"http://delicias.dia.fi.upm.es/prov-xgCURATED.bib","downloads":0,"keywords":["#prov-xg","#trust","#use"],"search_terms":["reasoning","appropriate","use","private","data","through","computational","workflow","gil","fritz"],"title":"Reasoning about the Appropriate Use of Private Data through Computational workflow","title_words":["reasoning","appropriate","use","private","data","through","computational","workflow"],"year":2010,"dataSources":["drTBSwRdnSo2Wujnd"]}