<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Tao Dong</style></author><author><style face="normal" font="default" size="100%">Gifford, Scott</style></author><author><style face="normal" font="default" size="100%">Kim, Jungwoo</style></author><author><style face="normal" font="default" size="100%">Mark W. Newman</style></author><author><style face="normal" font="default" size="100%">Atul Prakash</style></author><author><style face="normal" font="default" size="100%">Qidwai, Sarah</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Simplifying User-Controlled Privacy Policies</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Pervasive Computing</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">location-aware computing</style></keyword><keyword><style  face="normal" font="default" size="100%">location-based computing</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy-enhancing architectures</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy-protective applications</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">09/2009</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">8</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Location-aware computing infrastructures are becoming widely available.&lt;/p&gt;&lt;p&gt;However, a key problem remains: letting users manage their privacy while&lt;/p&gt;&lt;p&gt;also giving them interesting applications that take advantage of location&lt;/p&gt;&lt;p&gt;information.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue><section><style face="normal" font="default" size="100%">2</style></section></record></records></xml>