{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:46:36Z","timestamp":1725475596439},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540687900"},{"type":"electronic","value":"9783540687931"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11957454_6","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T04:15:43Z","timestamp":1165810543000},"page":"99-117","source":"Crossref","is-referenced-by-count":9,"title":["Privacy Injector \u2014 Automated Privacy Enforcement Through Aspects"],"prefix":"10.1007","author":[{"given":"Chris Vanden","family":"Berghe","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Matthias","family":"Schunter","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of the 28th Int\u2019l Conf. on Very Large Databases (VLDB), Hong Kong (2002)","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Backes, M., Bagga, W., Karjoth, G., Schunter, M.: Efficient comparison of enterprise privacy policies. In: 19th ACM Symposium on Applied Computing, Special Track Security, Nicosia, Cyprus (2004)","DOI":"10.1145\/967900.967983"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-39650-5_10","volume-title":"Computer Security \u2013 ESORICS 2003","author":"M. Backes","year":"2003","unstructured":"Backes, M., Pfitzmann, B., Schunter, M.: A toolkit for managing enterprise privacy policies. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 162\u2013180. Springer, Heidelberg (2003)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Bettini, C., Jajodia, S., Wang, X.S., Wijesekerat, D.: Obligation monitoring in policy management. In: Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), pp. 2\u201312 (2002)","DOI":"10.1109\/POLICY.2002.1011288"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Bonatti, P.A., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: A component-based architecture for secure data publication. In: Proceedings of the 17th Annual Computer Security Applications Conference, pp. 309\u2013318 (2001)","DOI":"10.1109\/ACSAC.2001.991546"},{"key":"6_CR6","volume-title":"The Unified Modeling Language User Guide","author":"G. Booch","year":"1998","unstructured":"Booch, G., Rumbaugh, J., Jacobson, I.: The Unified Modeling Language User Guide. Addison-Wesley, Reading (1998)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N. Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupo, E., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, pp. 18\u201339. Springer, Heidelberg (2001)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Egelman, S., Cranor, L., Chowdhury, A.: An analysis of p3p-enabled web sites among top-20 search results. In: Proceedings of the Eighth International Conference on Electronic Commerce (2006)","DOI":"10.1145\/1151454.1151492"},{"key":"6_CR9","volume-title":"Aspect-Oriented Software Development","author":"R. Filman","year":"2004","unstructured":"Filman, R., Elrad, T., Clarke, S., Ak\u015fit, M.: Aspect-Oriented Software Development. Addison-Wesley, Reading (2004)"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"IT-Security and Privacy","year":"2001","unstructured":"Fischer-H\u00fcbner, S. (ed.): IT-Security and Privacy. LNCS, vol.\u00a01958. Springer, Heidelberg (2001)"},{"key":"6_CR11","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"E. Gamma","year":"1995","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Reading (1995)"},{"key":"6_CR12","unstructured":"IBM. Declarative privacy monitoring. Web page at: http:\/\/alphaworks.ibm.com\/tech\/dpm"},{"key":"6_CR13","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-1-4615-1467-1_8","volume-title":"Proceedings of the E-commerce Security and Privacy","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Kudo, M., Subrahmanian., V.S.: Provisional authorization. In: Proceedings of the E-commerce Security and Privacy, pp. 133\u2013159. Kluwer Academic Publishers, Dordrecht (2001)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Karjoth, G., Schunter, M.: A privacy policy model for enterprises. In: Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW), pp. 271\u2013281 (2002)","DOI":"10.1109\/CSFW.2002.1021821"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Karjoth, G., Schunter, M., Van Herreweghen, E.: Enterprise privacy practices vs. privacy promises - how to promise what you can keep. In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy 2003), Lake Como, Italy, pp. 135\u2013146 (2003)","DOI":"10.1109\/POLICY.2003.1206967"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-36467-6_6","volume-title":"Privacy Enhancing Technologies","author":"G. Karjoth","year":"2003","unstructured":"Karjoth, G., Schunter, M., Waidner, M.: The platform for enterprise privacy practices \u2013 privacy-enabled management of customer data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 69\u201384. Springer, Heidelberg (2003)"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/3-540-45337-7_18","volume-title":"ECOOP 2001 - Object-Oriented Programming","author":"G. Kiczales","year":"2001","unstructured":"Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An overview of AspectJ. In: Knudsen, J.L. (ed.) ECOOP 2001. LNCS, vol.\u00a02072, pp. 327\u2013355. Springer, Heidelberg (2001)"},{"key":"6_CR18","first-page":"220","volume-title":"Proceedings of the European Conference on Object-Oriented Programming","author":"G. Kiczales","year":"1997","unstructured":"Kiczales, G., Lamping, J., Menhdhekar, A., Maeda, C., Lopes, C., Loingtier, J.-M., Irwin, J.: Aspect-oriented programming. In: Ak\u015fit, M., Matsuoka, S. (eds.) Proceedings of the European Conference on Object-Oriented Programming, vol.\u00a01241, pp. 220\u2013242. Springer, Berlin, Heidelberg, and New York (1997)"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Myers, A., Liskov, B.: Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology, 410\u2013442 (2000)","DOI":"10.1145\/363516.363526"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: JFlow: Practical mostly-static information flow control. In: Proceedings of the Symposium on Principles of Programming Languages, pp. 228\u2013241 (1999)","DOI":"10.1145\/292540.292561"},{"key":"6_CR21","unstructured":"Oasis. eXtensible Access Control Markup Language (XACML). Web page at: http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml"},{"key":"6_CR22","unstructured":"Platform for Privacy Preferences (P3P). W3C Recommendation (April 2002), http:\/\/www.w3.org\/TR\/2002\/REC-P3P-20020416\/"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Parnas, D.L.: On the criteria to be used in decomposing systems into modules (1972)","DOI":"10.21236\/AD0773837"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Pietraszek, T., Venden Berghe, C.: Defending against injection attacks through context-sensitive string evaluation. In: Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID 2005), pp. 124\u2013145 (2005)","DOI":"10.1007\/11663812_7"},{"key":"6_CR25","unstructured":"AspectJ Project. The AspectJ home page, Web page at: http:\/\/eclipse.org\/aspectj\/"},{"key":"6_CR26","unstructured":"Hibernate Project. Hibernate, Web page at: http:\/\/hibernate.org\/"},{"key":"6_CR27","unstructured":"Ribeiro, C., Zuquete, A., Ferreira, P., Guedes, P.: SPL: An access control language for security policies with complex constraints. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2001)"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Myers, A.: Language-based information-flow security (2003)","DOI":"10.1109\/JSAC.2002.806121"},{"issue":"5","key":"6_CR29","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweene","year":"2002","unstructured":"Sweene, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"6_CR30","unstructured":"Watchfire. Watchfire, Web page at: http:\/\/watchfire.com\/"},{"key":"6_CR31","unstructured":"De Win, B., Piessens, F., Joosen, W., Verhanneman, T.: On the importance of the separation-of-concerns principle in secure software engineering. In: Proceedings of the ACSA Workshop on the Application of Engineering Principles to System Security Design, pp. 1\u201310 (2003)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11957454_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:21:40Z","timestamp":1619493700000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11957454_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687900","9783540687931"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/11957454_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}