{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T19:26:31Z","timestamp":1758396391159,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030003043"},{"type":"electronic","value":"9783030003050"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00305-0_23","type":"book-chapter","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T06:55:57Z","timestamp":1536216957000},"page":"329-344","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["YaPPL - A Lightweight Privacy Preference Language for Legally Sufficient and Automated Consent Provision in IoT Scenarios"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7134-4351","authenticated-orcid":false,"given":"Max-R.","family":"Ulbricht","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5543-0265","authenticated-orcid":false,"given":"Frank","family":"Pallas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"23_CR1","unstructured":"Serializing data speed comparison: Marshal vs. JSON vs. Eval vs. YAML. \n                      http:\/\/www.pauldix.net\/2008\/08\/serializing-dat.html"},{"key":"23_CR2","unstructured":"OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980)"},{"key":"23_CR3","unstructured":"Online, Privacy: A Report to Congress. Technical report, FTC, June 1998"},{"key":"23_CR4","unstructured":"ISO\/IEC 29100:2011 - Information technology - Security techniques - Privacy framework (2011)"},{"key":"23_CR5","unstructured":"eXtensible Access Control Markup Language (XACML) Version 3.0. OASIS Standard (2013)"},{"key":"23_CR6","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official J. Eur. Union L 119\/1, pp. 1\u201388, April 2016"},{"issue":"5","key":"23_CR7","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1016\/j.comnet.2005.01.004","volume":"48","author":"R Agrawal","year":"2005","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: XPref: a preference language for P3P. Comput. Networks 48(5), 809\u2013827 (2005)","journal-title":"Comput. Networks"},{"key":"23_CR8","unstructured":"Article 29 Data Protection Working Party: Opinion 15\/2011 on the definition of consent. Technical report, July 2011"},{"key":"23_CR9","unstructured":"Article 29 Data Protection Working Party: Opinion 8\/2014 on the on Recent Developments on the Internet of Things. Technical report 14\/EN WP 223, September 2014"},{"key":"23_CR10","unstructured":"Article 29 Data Protection Working Party: Guidelines on Consent under Regulation 2016\/679. Technical report WP259 rev.01 (2018)"},{"key":"23_CR11","doi-asserted-by":"publisher","unstructured":"Byun, J.W., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, SACMAT 2005, pp. 102\u2013110. ACM, New York, NY, USA (2005). \n                      https:\/\/doi.org\/10.1145\/1063979.1063998","DOI":"10.1145\/1063979.1063998"},{"key":"23_CR12","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M.: A P3P preference exchange language 1.0 (APPEL1.0). Technical report, World Wide Web Consortium (2002)"},{"key":"23_CR13","volume-title":"Web Pivacy with P3P","author":"LF Cranor","year":"2002","unstructured":"Cranor, L.F.: Web Pivacy with P3P. O\u2019Reilly Media, Sebastopol (2002)"},{"key":"23_CR14","unstructured":"Eriksson, M., Hallberg, V.: Comparison between JSON and YAML for data serialization. Technical report, The School of Computer Science and Engineering Royal Institute of Technology (2011)"},{"issue":"3&4","key":"23_CR15","first-page":"346","volume":"14","author":"NA Ghani","year":"2015","unstructured":"Ghani, N.A., Selamat, H., Sidek, Z.M.: Credential purpose-based access control for personal data protection. J. Web Eng. 14(3&4), 346\u2013360 (2015)","journal-title":"J. Web Eng."},{"key":"23_CR16","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-19157-2_5","volume-title":"Architecting the Internet of Things","author":"D Guinard","year":"2011","unstructured":"Guinard, D., Trifa, V., Mattern, F., Wilde, E.: From the Internet of Things to the web of things: resource-oriented architecture and best practices. In: Uckelmann, D., Harrison, M., Michahelles, F. (eds.) Architecting the Internet of Things, pp. 97\u2013129. Springer, Heidelberg (2011). \n                      https:\/\/doi.org\/10.1007\/978-3-642-19157-2_5"},{"key":"23_CR17","doi-asserted-by":"publisher","unstructured":"Henze, M., Hiller, J., Schmerling, S., Ziegeldorf, J.H., Wehrle, K.: CPPL: compact privacy policy language. In: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, WPES 2016, pp. 99\u2013110. ACM, New York(2016). \n                      https:\/\/doi.org\/10.1145\/2994620.2994627","DOI":"10.1145\/2994620.2994627"},{"issue":"3","key":"23_CR18","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1007\/s10796-011-9305-1","volume":"14","author":"ME Kabir","year":"2012","unstructured":"Kabir, M.E., Wang, H., Bertino, E.: A role-involved purpose-based access control model. Inf. Syst. Front. 14(3), 809\u2013822 (2012)","journal-title":"Inf. Syst. Front."},{"key":"23_CR19","unstructured":"Kasem-Madani, S., Meier, M.: Security and privacy policy languages: a survey, categorization and gap identification (2015)"},{"issue":"4","key":"23_CR20","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1145\/1118890.1118892","volume":"37","author":"M Mernik","year":"2005","unstructured":"Mernik, M., Heering, J., Sloane, A.M.: When and how to develop domain-specific languages. ACM Comput. Surv. (CSUR) 37(4), 316\u2013344 (2005)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"23_CR21","unstructured":"Nurseitov, N., Paulson, M., Reynolds, R., Izurieta, C.: Comparison of JSON and XML data interchange formats: a case study. In: Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, CAINE 2009, pp. 157\u2013162, San Francisco, California, USA (2009)"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Reinfurt, L., Breitenb\u00fccher, U., Falkenthal, M., Leymann, F., Riegg, A.: Internet of Things patterns, pp. 1\u201321. ACM Press (2016)","DOI":"10.1145\/3011784.3011789"},{"issue":"1","key":"23_CR23","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2017.9","volume":"50","author":"M Satyanarayanan","year":"2017","unstructured":"Satyanarayanan, M.: The emergence of edge computing. Computer 50(1), 30\u201339 (2017). \n                      https:\/\/doi.org\/10.1109\/MC.2017.9","journal-title":"Computer"},{"issue":"5","key":"23_CR24","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MC.2016.145","volume":"49","author":"W Shi","year":"2016","unstructured":"Shi, W., Dustdar, S.: The promise of edge computing. Computer 49(5), 78\u201381 (2016). \n                      https:\/\/doi.org\/10.1109\/MC.2016.145","journal-title":"Computer"},{"key":"23_CR25","doi-asserted-by":"publisher","unstructured":"Trabelsi, S., Sendor, J., Reinicke, S.: PPL: primelife privacy policy engine. In: 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, pp. 184\u2013185, June 2011. \n                      https:\/\/doi.org\/10.1109\/POLICY.2011.24","DOI":"10.1109\/POLICY.2011.24"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Ulbricht, M.-R., Pallas, F.: CoMaFeDS - consent management for federated data sources. In: Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshops, pp. 106\u2013111. IEEE, Berlin (2016). \n                      https:\/\/doi.org\/10.1109\/IC2EW.2016.30","DOI":"10.1109\/IC2EW.2016.30"},{"key":"23_CR27","volume-title":"Privacy and Freedom","author":"AF Westin","year":"1967","unstructured":"Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00305-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T02:46:06Z","timestamp":1583203566000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00305-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030003043","9783030003050"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00305-0_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"7 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Data Privacy Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dpm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}