{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:47:50Z","timestamp":1725544070274},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540346401"},{"type":"electronic","value":"9783540346425"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11766155_10","type":"book-chapter","created":{"date-parts":[[2006,5,31]],"date-time":"2006-05-31T19:35:00Z","timestamp":1149104100000},"page":"130-144","source":"Crossref","is-referenced-by-count":10,"title":["An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction"],"prefix":"10.1007","author":[{"given":"Dominik","family":"Raub","sequence":"first","affiliation":[]},{"given":"Rainer","family":"Steinwandt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","first-page":"103","volume-title":"WPES 2002","author":"P. Ashley","year":"2002","unstructured":"Ashley, P., et al.: E-P3P privacy policies and privacy authorization. In: WPES 2002, pp. 103\u2013109. ACM Press, New York (2002)"},{"key":"10_CR2","first-page":"375","volume-title":"SAC 2004","author":"M. Backes","year":"2004","unstructured":"Backes, M., et al.: Efficient Comparison of Enterprise Priv. Policies. In: SAC 2004, pp. 375\u2013382. ACM Press, New York (2004)"},{"key":"10_CR3","volume-title":"POLICY 2004","author":"M. Backes","year":"2004","unstructured":"Backes, M., et al.: Unification in Priv. Policy Evaluation \u2013 Translating EPAL into Prolog. In: POLICY 2004. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-30108-0_3","volume-title":"Computer Security \u2013 ESORICS 2004","author":"M. Backes","year":"2004","unstructured":"Backes, M., D\u00fcrmuth, M., Steinwandt, R.: An Algebra for Composing Enterprise Privacy Policies. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 33\u201352. Springer, Heidelberg (2004)"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-39650-5_10","volume-title":"Computer Security \u2013 ESORICS 2003","author":"M. Backes","year":"2003","unstructured":"Backes, M., Pfitzmann, B., Schunter, M.: A Toolkit for Managing Enterprise Privacy Policies. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 162\u2013180. Springer, Heidelberg (2003)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Bettini, C., et al.: Obligation monitoring in policy management. In: POLICY 2002, pp. 2\u201312 (2002)","DOI":"10.1109\/POLICY.2002.1011288"},{"key":"10_CR7","series-title":"Colloquium Publications","volume-title":"Lattice Theory","author":"G. Birkhoff","year":"1973","unstructured":"Birkhoff, G.: Lattice Theory. Colloquium Publications, vol.\u00a025. AMS, Providence (1973)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Bonatti, P.A., et al.: A Component-Based Architecture for Secure Data Publication. In: ACSAC 2001, pp. 309\u2013318 (2001)","DOI":"10.1109\/ACSAC.2001.991546"},{"key":"10_CR9","first-page":"164","volume-title":"CCS 2000","author":"P.A. Bonatti","year":"2000","unstructured":"Bonatti, P.A., et al.: A modular approach to composing access control policies. In: CCS 2000, pp. 164\u2013173. ACM Press, New York (2000)"},{"issue":"1","key":"10_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/504909.504910","volume":"5","author":"P.A. Bonatti","year":"2002","unstructured":"Bonatti, P.A., et al.: An algebra for composing access control policies. ACM Trans. on Inf. and Syst. Sec.\u00a05(1), 1\u201335 (2002)","journal-title":"ACM Trans. on Inf. and Syst. Sec."},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/3-540-61770-1_30","volume-title":"Computer Security - ESORICS 1996","author":"S.D.C. Vimercati di","year":"1996","unstructured":"di Vimercati, S.D.C., Samarati, P.: An authorization model for federated systems. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 99\u2013117. Springer, Heidelberg (1996)"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-44569-2_3","volume-title":"Policies for Distributed Systems and Networks","author":"Z. Fu","year":"2001","unstructured":"Fu, Z., Wu, S.F., Huang, H., Loh, K., Gong, F., Baldine, I., Xu, C.: IPSec\/VPN Security Policy: Correctness, Conflict Detection, and Resolution. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, pp. 39\u201356. Springer, Heidelberg (2001)"},{"key":"10_CR13","unstructured":"Gallier, J.H.: Logic for Comp. Science: Found. of Automatic Theorem Proving, Ch.\u00a02.5 and 10, pp. 448\u2013456, 483\u2013488. John Wiley & Sons, Chichester (1986), http:\/\/www.cis.upenn.edu\/~jean\/gbooks\/logic.html"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Gligor, V.D., et al.: On the Formal Definition of Separation-of-Duty Policies and their Composition. In: Proc. 19th IEEE Symp. on Sec. & Priv., pp. 172\u2013183 (1998)","DOI":"10.1109\/SECPRI.1998.674833"},{"key":"10_CR15","first-page":"133","volume-title":"Proc. of the E-commerce Sec. and Priv.","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., et al.: Provisional authorization. In: Proc. of the E-commerce Sec. and Priv., pp. 133\u2013159. Kluwer Academic Publishers, Dordrecht (2001)"},{"issue":"2","key":"10_CR16","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., et al.: Flexible support for multiple access control policies. ACM Trans. on Database Syst.\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM Trans. on Database Syst."},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-36467-6_6","volume-title":"Privacy Enhancing Technologies","author":"G. Karjoth","year":"2003","unstructured":"Karjoth, G., Schunter, M., Waidner, M.: Platform for enterprise privacy practices: Privacy-enabled management of customer data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 69\u201384. Springer, Heidelberg (2003)"},{"key":"10_CR18","first-page":"51","volume":"23","author":"J. \u0141ukasiewicz","year":"1931","unstructured":"\u0141ukasiewicz, J.: Philosophische Bemerkungen zu mehrwertigen Systemen des Aussagenkalk\u00fcls. C. R. Soc. Sc. Varsovie\u00a023, 51\u201377 (1931)","journal-title":"C. R. Soc. Sc. Varsovie"},{"issue":"9","key":"10_CR19","first-page":"1404","volume":"11","author":"J.D. Moffett","year":"1993","unstructured":"Moffett, J.D., Sloman, M.S.: Policy hierarchies for distributed systems management. IEEE JSAC Special Issue on Network Manag.\u00a011(9), 1404\u20131414 (1993)","journal-title":"IEEE JSAC Special Issue on Network Manag."},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Raub, D., Steinwandt, R.: An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction (full version, 2006), http:\/\/www.crypto.ethz.ch\/~raub\/publications.html","DOI":"10.1007\/11766155_10"},{"key":"10_CR21","unstructured":"Ribeiro, C.N., et al.: SPL: An access control language for security policies and complex constraints. In: NDSS 2001, pp. 89\u2013107. Internet Soc. (2001), http:\/\/www.gsd.inesc-id.pt\/~avz\/pubs\/SPL.pdf"},{"key":"10_CR22","unstructured":"Schmitt, P.H.: Nichtklassische Logiken. Script, Universit\u00e4t Karlsruhe (2004), http:\/\/i12www.ira.uka.de\/studium.htm"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Simon, R.T., Zurko, M.E.: Separation of Duty in Role-based Environments. In: CSFW 1997, pp. 183\u2013194 (1997)","DOI":"10.1109\/CSFW.1997.596811"},{"key":"10_CR24","first-page":"38","volume-title":"CCS 2001","author":"D. Wijesekera","year":"2001","unstructured":"Wijesekera, D., Jajodia, S.: Policy algebras for access control: the propositional case. In: CCS 2001, pp. 38\u201347. ACM Press, New York (2001)"},{"issue":"2","key":"10_CR25","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1145\/762476.762481","volume":"6","author":"D. Wijesekera","year":"2003","unstructured":"Wijesekera, D., Jajodia, S.: A propositional policy algebra for access control. ACM Trans. on Inf. and Syst. Sec.\u00a06(2), 286\u2013325 (2003)","journal-title":"ACM Trans. on Inf. and Syst. Sec."},{"key":"10_CR26","unstructured":"Semilattice. Wikipedia, the free encyclopedia, http:\/\/en.wikipedia.org\/wiki\/Semilattice"},{"key":"10_CR27","unstructured":"eXtensible Access Control Markup Language (XACML). OASIS Committee Specification 1.0 (December 2002), http:\/\/www.oasis-open.org\/committees\/xacml"}],"container-title":["Lecture Notes in Computer Science","Emerging Trends in Information and Communication Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11766155_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T03:38:39Z","timestamp":1555645119000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11766155_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540346401","9783540346425"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/11766155_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}