{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:16:09Z","timestamp":1725560169713},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540282242"},{"type":"electronic","value":"9783540317968"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11537878_23","type":"book-chapter","created":{"date-parts":[[2010,7,19]],"date-time":"2010-07-19T18:07:07Z","timestamp":1279562827000},"page":"226-235","source":"Crossref","is-referenced-by-count":4,"title":["Privacy Enforcement for IT Governance in Enterprises: Doing It for Real"],"prefix":"10.1007","author":[{"given":"Marco Casassa","family":"Mont","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robert","family":"Thyne","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pete","family":"Bramhall","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Rotemberg, M., Laurant, C.: Privacy International: Privacy and Human Rights 2004: an International Survey of Privacy Laws and Developments, Electronic Privacy Information Center (EPIC), Privacy International (2004), http:\/\/www.privacyinternational.org\/survey\/phr2004\/"},{"key":"23_CR2","unstructured":"OECD: OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980), http:\/\/www1.oecd.org\/publications\/e-book\/9302011E.PDF"},{"key":"23_CR3","unstructured":"Online Privacy Alliance: Guidelines for Online Privacy Policies. Online Privacy Alliance (2004), http:\/\/www.privacyalliance.org\/"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Karjoth, G., Schunter, M.: A Privacy Policy Model for Enterprises. IBM Research, Zurich. In: 15th IEEE Computer Foundations Workshop (2002)","DOI":"10.1109\/CSFW.2002.1021821"},{"key":"23_CR5","unstructured":"IBM: The Enterprise Privacy Authorization Language (EPAL), EPAL 1.1 specification. IBM (2004), http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic Databases IBM Almaden Research Center (2002), http:\/\/www.almaden.ibm.com\/cs\/people\/srikant\/papers\/vldb02.pdf","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"23_CR7","unstructured":"IBM Tivoli Privacy Manager: online technical documentation, http:\/\/publib.boulder.ibm.com\/tividd\/td\/PrivacyManagerfore-business1.1.html"},{"key":"23_CR8","unstructured":"HP: HP Openview Select Access - Overview and Features, http:\/\/www.openview.hp.com\/products\/select\/"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-540-30079-3_13","volume-title":"Trust and Privacy in Digital Business","author":"M. Casassa Mont","year":"2004","unstructured":"Casassa Mont, M.: Dealing with privacy obligations: Important aspects and technical approaches. In: Katsikas, S.K., L\u00f3pez, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol.\u00a03184, pp. 120\u2013131. Springer, Heidelberg (2004)"},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-540-24747-0_24","volume-title":"Trust Management","author":"A. Baldwin","year":"2004","unstructured":"Baldwin, A.: Enhanced accountability for electronic processes. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol.\u00a02995, pp. 319\u2013332. Springer, Heidelberg (2004)"},{"key":"23_CR11","unstructured":"Salle, M.: IT Service Management and IT Governance: Review, Comparative Analysis and their impact on Utility Computing, HP Labs (2004), http:\/\/www.hpl.hp.com\/techreports\/2004\/HPL-2004-98.html"},{"key":"23_CR12","unstructured":"Casassa Mont, M.: On Adaptive Identity Management: The Next Generation of Identity Management Solutions, HP Labs (2003), http:\/\/www.hpl.hp.com\/techreports\/2003\/HPL-2003-149.pdf"},{"key":"23_CR13","unstructured":"Casassa Mont, M., Thyne, R., Bramhall, P.: Privacy Enforcement with HP Select Access for Regulatory Compliance, HP Labs (2005), http:\/\/www.hpl.hp.com\/techreports\/2005\/HPL-2005-10.html"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy, and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11537878_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:12:42Z","timestamp":1605643962000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11537878_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540282242","9783540317968"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11537878_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}