{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:46:36Z","timestamp":1725475596164},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540687900"},{"type":"electronic","value":"9783540687931"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11957454_7","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T04:15:43Z","timestamp":1165810543000},"page":"118-134","source":"Crossref","is-referenced-by-count":15,"title":["A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises"],"prefix":"10.1007","author":[{"given":"Marco Casassa","family":"Mont","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robert","family":"Thyne","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Laurant, C.: Privacy International: Privacy and Human Rights 2003: an International Survey of Privacy Laws and Developments, Electronic Privacy Information Center (EPIC), Privacy International (2003), \n                    \n                      http:\/\/www.privacyinternational.org\/survey\/phr2003\/"},{"key":"7_CR2","unstructured":"Online Privacy Alliance: Guidelines for Online Privacy Policies, Online Privacy Alliance (2004), \n                    \n                      http:\/\/www.privacyalliance.org\/"},{"key":"7_CR3","unstructured":"OECD: OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980), \n                    \n                      http:\/\/www1.oecd.org\/publications\/e-book\/9302011E.PDF"},{"key":"7_CR4","unstructured":"Karjoth, G., Schunter, M.: A Privacy Policy Model for Enterprises, IBM Research, Zurich. In: 15th IEEE Computer Foundations Workshop (2002)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","volume-title":"2nd Workshop on Privacy Enhancing Technologies","author":"G. Karjoth","year":"2002","unstructured":"Karjoth, G., Schunter, M., Waidner, M.: Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data. In: 2nd Workshop on Privacy Enhancing Technologies. LNCS, Springer, Heidelberg (2002)"},{"key":"7_CR6","unstructured":"Schunter, M., Ashley, P.: The Platform for Enterprise Privacy Practices. IBM Zurich Research Laboratory (2002)"},{"key":"7_CR7","unstructured":"Karjoth, G., Schunter, M., Waidner, M.: Privacy-enabled Services for Enterprises. IBM Zurich Research Laboratory, TrustBus (2002)"},{"key":"7_CR8","unstructured":"IBM: The Enterprise Privacy Authorization Language (EPAL), EPAL 1.1 specification, IBM (2004), \n                    \n                      http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic Databases. IBM Almaden Research Center (2002), \n                    \n                      http:\/\/www.almaden.ibm.com\/cs\/people\/srikant\/papers\/vldb02.pdf","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"7_CR10","unstructured":"IBM Tivoli Privacy Manager: Privacy manager main web page (2005), \n                    \n                      http:\/\/www-306.ibm.com\/software\/tivoli\/products\/privacy-mgr-e-bus\/"},{"key":"7_CR11","unstructured":"IBM Tivoli Privacy Manager: online technical documentation (2005), \n                    \n                      http:\/\/publib.boulder.ibm.com\/tividd\/td\/PrivacyManagerfore-business1.1.html"},{"key":"7_CR12","unstructured":"HP: HP Select Federation - Product and Solution Overview (2005), \n                    \n                      http:\/\/www.managementsoftware.hp.com\/products\/slctfed\/"},{"key":"7_CR13","unstructured":"ePok: identity management solution - Trusted Data Exchange Server (2005), \n                    \n                      http:\/\/www.epokinc.com\/"},{"key":"7_CR14","unstructured":"HP: HP OpenView SelectAccess - Overview and Features (2005), \n                    \n                      http:\/\/www.openview.hp.com\/products\/select"},{"key":"7_CR15","unstructured":"IBM: IBM Tivoli Storage Manager for Data Retention (2004)"},{"key":"7_CR16","unstructured":"Bettini, C., Jajodia, S., Sean Wang, X., Wijesekera, D.: Obligation Monitoring in Policy Management (2002)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language (2001)","DOI":"10.1007\/3-540-44569-2_2"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Security \u2013 ESORICS 2003","author":"M. Casassa Mont","year":"2003","unstructured":"Casassa Mont, M., Pearson, S., Bramhall, P.: Towards Accountable Management of Privacy and Identity Information. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, Springer, Heidelberg (2003)"},{"key":"7_CR19","unstructured":"Casassa Mont, M., Thyne, R., Bramhall, P.: Privacy Enforcement with HP Select Access for Regulatory Compliance, HPL-2005-10 (2005)"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Casassa Mont, M.: Dealing with Privacy Obligations: Important Aspects and Technical Approaches, TrustBus 2004 (2004)","DOI":"10.1007\/978-3-322-84984-7_20"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Casassa Mont, M.: Dealing with Privacy Obligations in Enterprises. In: ISSE 2004 (2004)","DOI":"10.1007\/978-3-322-84984-7_20"},{"key":"7_CR22","unstructured":"PRIME: Privacy and Identity Management for Europe, European RTD Integrated Project under the FP6\/IST Programme (2006), \n                    \n                      http:\/\/www.prime-project.eu\/"},{"key":"7_CR23","unstructured":"HP: HP OpenView Select Identity \u2013 Overview and Features (2005), \n                    \n                      http:\/\/www.openview.hp.com\/products\/slctid\/index.html"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_7","volume-title":"Computer Security \u2013 ESORICS 2005","author":"M. Hilty","year":"2005","unstructured":"Hilty, M., Basin, D., Pretschner, A.: On Obligations. In: de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11957454_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:10:36Z","timestamp":1558271436000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11957454_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687900","9783540687931"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11957454_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}