{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:38:03Z","timestamp":1742380683248},"publisher-location":"Boston","reference-count":16,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"038733405X"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-33406-8_44","type":"book-chapter","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T08:55:55Z","timestamp":1153731355000},"page":"471-482","source":"Crossref","is-referenced-by-count":4,"title":["A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments"],"prefix":"10.1007","author":[{"given":"Siani","family":"Pearson","sequence":"first","affiliation":[]},{"given":"Marco","family":"Casassa-Mont","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","unstructured":"Trusted Computing Group: TCG TPM Specification vl.2. Available via https:\/\/www.trustedcomputinggroup.org\/home (2005)."},{"key":"44_CR2","unstructured":"Laurant, C.: Privacy International-Privacy and Human Rights 2003: an International Survey of Privacy Laws and Developments. Electronic Privacy Information Center (EPIC). Privacy International. http:\/\/www.privacyinternational.org\/survey\/phr2003\/ (2003)."},{"key":"44_CR3","unstructured":"OECD: OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data http:\/\/wwwl.oecd.org\/publications\/e-book\/9302011E.PDF (2001)."},{"key":"44_CR4","unstructured":"Online Privacy Alliance: Guidelines for Online Privacy Policies. Online Privacy Alliance http:\/\/www.privacyalliance.org\/ (2004)."},{"key":"44_CR5","unstructured":"Hewlett-Packard Ltd (HP): Adaptive Enterprise-Overview, Technologies and HP Services http:\/\/www.hp.com\/products1\/promos\/adaptive_enterprise\/us\/adaptive_enterprise.html (2005)."},{"key":"44_CR6","unstructured":"Pearson, S. (ed.): Trusted Computing Platforms. Prentice Hall (2002)."},{"key":"44_CR7","volume-title":"An Identity Based Encryption Scheme based on Quadratic Residues","author":"C. Cocks","year":"2001","unstructured":"Cocks, C: An Identity Based Encryption Scheme based on Quadratic Residues. Communications Electronics Security Group (CESG). UK. http:\/\/www.cesg.gov.uk\/site\/ast\/idpkc\/media\/ciren.pdf (2001)."},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Casassa Mont, M., Pearson, S., Bramhall, P.: Towards Accountable Management of Privacy and Identity Management. Proc. ESORICS (2003).","DOI":"10.1007\/978-3-540-39650-5_9"},{"key":"44_CR9","unstructured":"OASIS: extensible Access Control Markup Language (XACML). http:\/\/www.oasis-open.org (2005)."},{"key":"44_CR10","unstructured":"IBM: The Enterprise Privacy Authorisation Language (EPAL). EPAL 1.2 specification http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/(2004)."},{"key":"44_CR11","unstructured":"IBM Tivoli Privacy Manager: Privacy manager main web page-http:\/\/www-306.ibm.com\/sofrware\/tivoli\/products\/privacy-mgr-e-bus\/."},{"key":"44_CR12","unstructured":"Microsoft Corp.: Methods and systems for context-aware policy determination and enforcement, patent no. EP1220510A2."},{"key":"44_CR13","unstructured":"IBM Corp: Protecting resources in a distributed computer system, patent no. US6658573B1."},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"Casassa Mont, M., Harrison, K., Sadler, M.: The HP Time Vault Service: Exploiting IBE for Timed Release of Confidential Information. WWW2003 (2003).","DOI":"10.1145\/775173.775175"},{"key":"44_CR15","unstructured":"PRIME Project: Privacy and Identity Management for Europe. European RTD Integrated Project under the FP6\/IST Programme http:\/\/www.prime-project.eu.org\/ (2005)."},{"key":"44_CR16","unstructured":"Casassa Mont, M, Pearson, S.: An Adaptive Privacy Management System for Data Repositories, Proc, TrustBus 2005 (2005)."}],"container-title":["IFIP International Federation for Information Processing","Security and Privacy in Dynamic Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-33406-8_44.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:17:25Z","timestamp":1605644245000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-33406-8_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["038733405X"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/0-387-33406-8_44","relation":{},"subject":[]}}