{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:30:51Z","timestamp":1725471051180},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540377504"},{"type":"electronic","value":"9783540377528"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11824633_10","type":"book-chapter","created":{"date-parts":[[2006,9,18]],"date-time":"2006-09-18T15:23:09Z","timestamp":1158592989000},"page":"91-102","source":"Crossref","is-referenced-by-count":11,"title":["A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises"],"prefix":"10.1007","author":[{"given":"Marco Casassa","family":"Mont","sequence":"first","affiliation":[]},{"given":"Siani","family":"Pearson","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Thyne","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Casassa Mont, M., Thyne, R., Bramhall, P.: Privacy Enforcement with HP Select Access for Regulatory Compliance, HP Labs Technical Report, HPL-2005-10 (2005)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Casassa Mont, M.: Dealing with Privacy Obligations in Enterprises, HPL-2004-109 (2004)","DOI":"10.1007\/978-3-322-84984-7_20"},{"key":"10_CR3","unstructured":"Casassa Mont, M., Thyne, R., Chan, K., Bramhall, P.: Extending HP Identity Management Solutions to Enforce Privacy Policies and Obligations for Regulatory Compliance by Enterprises - HPL-2005-110 (2005)"},{"key":"10_CR4","unstructured":"Hewlett-Packard (HP): HP Openview Select Access: Overview and Features (2005), http:\/\/www.openview.hp.com\/products\/select\/"},{"key":"10_CR5","unstructured":"Hewlett-Packard (HP): HP OpenView Select Identity: Overview and Features (2005), http:\/\/www.openview.hp.com\/products\/slctid\/index.html"},{"key":"10_CR6","unstructured":"IBM Tivoli Privacy Manager: Privacy manager main web page (2005), http:\/\/www-306.ibm.com\/software\/tivoli\/products\/privacy-mgr-e-bus\/"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic Databases, IBM Almaden Research Center (2002), http:\/\/www.almaden.ibm.com\/cs\/people\/srikant\/papers\/vldb02.pdf","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"10_CR8","unstructured":"IBM: The Enterprise Privacy Authorization Language (EPAL), EPAL 1.2 specification, IBM (2004), http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/"},{"key":"10_CR9","unstructured":"Synomos: Synomos Align 3.0 (2005), http:\/\/www.synomos.com\/"},{"key":"10_CR10","unstructured":"SenSage: SenSage Web site (2005), http:\/\/www.sensage.com\/"},{"key":"10_CR11","unstructured":"PRIME Project: Privacy and Identity Management for Europe, European RTD Integrated Project under the FP6\/IST Programme (2006), http:\/\/www.prime-project.eu\/"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Casassa Mont, M.: Dealing with Privacy Obligations: Important Aspects and Technical Approaches, TrustBus 2004 (2004)","DOI":"10.1007\/978-3-322-84984-7_20"},{"key":"10_CR13","unstructured":"Laurant, C.: Privacy International: Privacy and Human Rights 2004: an International Survey of Privacy Laws and Developments, Electronic Privacy Information Center (EPIC), Privacy International (2004), http:\/\/www.privacyinternational.org\/survey\/phr2004\/"},{"key":"10_CR14","unstructured":"OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980), http:\/\/www1.oecd.org\/publications\/e-book\/9302011E.PDF"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Casassa Mont, M., Thyne, R., Bramhall, P.: Privacy Enforcement for IT Governance in Enterprises: Doing it for Real, TrustBus 2005 (2005)","DOI":"10.1007\/11537878_23"},{"key":"10_CR16","unstructured":"Casassa Mont, M., Bramhall, P., Pato, J.: On Adaptive Identity Management: The Next Generation of Identity Management Technologies, HPL-2003-149 (2003)"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Casassa Mont, M., Thyne, R.: Privacy Policy Enforcement in Enterprises with Identity Management Solutions, HP Labs Technical Report, HPL-2006-72 (2006)","DOI":"10.1145\/1501434.1501465"},{"key":"10_CR18","unstructured":"Karjoth, G., Schunter, M., Waidner, M.: Privacy-enabled Services for Enterprises, IBM Zurich Research Laboratory, TrustBus 2002 (2002)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Byun, J., Bertino, E., Li, N.: Purpose based access control for privacy protection in Database Systems, Technical Report 2004-52, Purdue University (2004)","DOI":"10.1145\/1063979.1063998"}],"container-title":["Lecture Notes in Computer Science","Trust and Privacy in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11824633_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:17:34Z","timestamp":1605644254000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11824633_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540377504","9783540377528"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11824633_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}