{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:16:09Z","timestamp":1725560169316},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540282242"},{"type":"electronic","value":"9783540317968"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11537878_24","type":"book-chapter","created":{"date-parts":[[2010,7,19]],"date-time":"2010-07-19T14:07:07Z","timestamp":1279548427000},"page":"236-245","source":"Crossref","is-referenced-by-count":9,"title":["An Adaptive Privacy Management System for Data Repositories"],"prefix":"10.1007","author":[{"given":"Marco Casassa","family":"Mont","sequence":"first","affiliation":[]},{"given":"Siani","family":"Pearson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Rotemberg, M., Laurant, C.: Privacy International - Privacy and Human Rights 2004: an International Survey of Privacy Laws and Developments, Electronic Privacy Information Center (EPIC), Privacy International (2004), http:\/\/www.privacyinternational.org\/survey\/phr2004\/"},{"key":"24_CR2","unstructured":"OECD: OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980), http:\/\/www1.oecd.org\/publications\/e-book\/9302011E.PDF"},{"key":"24_CR3","unstructured":"Wayner, P.: Translucent Databases. Flyzone Press (2002)"},{"key":"24_CR4","unstructured":"IBM: Hippocratic Databases (2004), http:\/\/www.almaden.ibm.com\/software\/quest\/Projects\/hippodb\/"},{"key":"24_CR5","unstructured":"IBM: IBM Tivoli Privacy Manager, online technical documentation (2004), http:\/\/publib.boulder.ibm.com\/tividd\/td\/PrivacyManagerfore-business1.1.html"},{"key":"24_CR6","unstructured":"IBM: The Enterprise Privacy Authorization Language (EPAL), EPAL 1.1 specification (2004), http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Housley, R., Ford, W., Polk, W., Solo, D.: RFC2459: Internet X.509 Public Key Infrastructure Certificate and CRL profile, IETF (1999)","DOI":"10.17487\/rfc2459"},{"key":"24_CR8","unstructured":"RSA\u00a0: PKCS#7, Cryptographic Message Syntax Standard (1997), http:\/\/www.rsasecurity.com\/rsalabs\/pkcs\/pkcs-7\/"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, p. 213. Springer, Heidelberg (2001)"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Cocks, C.: An Identity Based Encryption Scheme based on Quadratic Residues. Communications-Electronics Security Group (CESG), UK (2001)","DOI":"10.1007\/3-540-45325-3_32"},{"volume-title":"Trusted Computing Platforms","year":"2002","key":"24_CR11","unstructured":"Pearson, S. (ed.): Trusted Computing Platforms. Prentice Hall, Englewood Cliffs (2002)"},{"key":"24_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-540-39650-5_9","volume-title":"Computer Security \u2013 ESORICS 2003","author":"M. Casassa Mont","year":"2003","unstructured":"Casassa Mont, M., Pearson, S., Bramhall, P.: Towards Accountable Management of Privacy and Identity Management. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 146\u2013161. Springer, Heidelberg (2003)"},{"key":"24_CR13","unstructured":"EU Framework VI PRIME Project: Privacy and Identity Management for Europe (2004), http:\/\/www.prime-project.eu.org\/"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Bertino, E., Ferrari, E.: Secure and Selective Dissemination of XML Documents. In: ACM TISSEC, pp. 290\u2013331 (2002)","DOI":"10.1145\/545186.545190"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Miklau, G., Suciu, D.: Controlling Access to Published Data Using Cryptography. In: VLDB (2003)","DOI":"10.1016\/B978-012722442-8\/50084-7"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy, and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11537878_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:12:43Z","timestamp":1605625963000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11537878_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540282242","9783540317968"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11537878_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}