{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:30:36Z","timestamp":1725496236871},"publisher-location":"Boston, MA","reference-count":16,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387736549"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73655-6_14","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T06:41:46Z","timestamp":1195800106000},"page":"207-222","source":"Crossref","is-referenced-by-count":0,"title":["Dismantling the Twelve Privacy Purposes"],"prefix":"10.1007","author":[{"given":"Sabah","family":"Al-Fedaghi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Agrawal, R. Kiernan, J. Srikant, R. and Xu, Y. (2002). Hippocratic databases. In The 28th International Conference on Very Large Databases (VLDB), Hong Kong, China, August.","key":"14_CR1","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"unstructured":"Al-Fedaghi, S. (2007). Beyond Purpose-Based Privacy Access Control. The 18th Australasian Database Conference, Ballarat, Australia, January 29th\u20132nd February.","key":"14_CR2"},{"unstructured":"Al-Fedaghi, S. (2006a). Anatomy of Personal Information Processing: Application to the EU Privacy Directive, Inter. Conf. on Business, Law and Technology (IBLT 2006), Copenhagen, December..","key":"14_CR3"},{"key":"14_CR4","volume-title":"7th, The Seventh Annual IEEE Information Assurance Workshop (IEEE-IAW)","author":"S. Al-Fedaghi","year":"2006","unstructured":"Al-Fedaghi, S. (2006b). Aspects of Personal Information Theory, 7th, The Seventh Annual IEEE Information Assurance Workshop (IEEE-IAW), West Point, NY: US Military Academy, June 20\u201323."},{"unstructured":"Al-Fedaghi, S. (2006c). Personal Information Model for P3P, W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, 17 and 18 October 2006, Ispra\/Italy.","key":"14_CR5"},{"unstructured":"Al-Fedaghi, S. (2005). How to Calculate the Information Privacy, The Third Annual Conference on Privacy, Security and Trust, St. Andrews, New Brunswick, Canada.","key":"14_CR6"},{"unstructured":"Ashley P., Hada S., Karjoth G., Powers C., and Schunter, M. Enterprise Privacy Authorization Language, W3C Submission 10 November 2003. http:\/\/www.w3.org\/Submission\/EPAL\/ .","key":"14_CR7"},{"doi-asserted-by":"crossref","unstructured":"Byun, J. Bertino, E. and Li, N. (2005). Purpose Based Access Control of Complex Data for Privacy Protection, SACMAT\u201905, June 1\u20133, 2005, Stockholm, Sweden.","key":"14_CR8","DOI":"10.1145\/1063979.1063998"},{"unstructured":"Cranor, L.F. Web Privacy with P3P, 2002, O\u2019Reilly & Associates http:\/\/p3pbook.com\/examples.html .","key":"14_CR9"},{"unstructured":"Cover, R. (Editor), Extensible Access Control Markup Language (XACML), October 10, 2006. http:\/\/xml.coverpages.org\/xacml.html#v20CD .","key":"14_CR10"},{"unstructured":"EU Directive (1995). DIRECTIVE 95\/46\/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL, 24 October. http:\/\/eurlex.europa.eu\/LexUriServ\/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML .","key":"14_CR11"},{"unstructured":"Hogben, G. A technical analysis of problems with P3P v1.0 and possible solutions, \u201cFuture of P3P\u201d workshop, Virginia, USA, 12\u201313 November, 2002. http:\/\/www.w3.org\/2002\/p3p-ws\/pp\/jrc.html .","key":"14_CR12"},{"unstructured":"OECD (1980). Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, http:\/\/www.oecd.Org\/document\/18\/0,2340,en_2649_34255_l815186_1_1_1_1,00.html .","key":"14_CR13"},{"unstructured":"P3P (2002). The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, The World Wide Web Consortium, April 16, 2002, http:\/\/www.w3.org\/p3p\/ .","key":"14_CR14"},{"unstructured":"Thibadeau, R., A Critique of P3P: Privacy on the Web, Aug 23, 2000 (Postscript, April 20, 2004). http:\/\/dollar.ecom.cmu.edu\/p3pcritique\/#postscript .","key":"14_CR15"},{"unstructured":"W3C Working Draft 10, The Platform for Privacy Preferences 1.1 (P3P1.1) Specification, February 2006. http:\/\/www.w3.org\/TR\/P3P11\/ .","key":"14_CR16"}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:12:38Z","timestamp":1619669558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387736549"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_14","relation":{},"subject":[]}}