{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:32:29Z","timestamp":1726003949620},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017002"},{"type":"electronic","value":"9783030017019"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01701-9_6","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T12:03:08Z","timestamp":1545998588000},"page":"95-111","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Formal Logic Framework for the Automation of the Right to Be Forgotten"],"prefix":"10.1007","author":[{"given":"Abhishek","family":"Tiwari","sequence":"first","affiliation":[]},{"given":"Fabian","family":"Bendun","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Hammer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Basin, D., Klaedtke, F., Samuel, M.: Monitoring security policies with metric first-order temporal logic. In: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, pp. 23\u201334. No. 12 in SACMAT 2010. ACM, New York (2010)","key":"6_CR1","DOI":"10.1145\/1809842.1809849"},{"unstructured":"Giblin, C., Liu, A.Y, M\u00fcller, S., Pfitzmann, B., Zhou, X.: Regulations expressed as logical models (REALM). In: 18th Annual Conference on Legal Knowledge and Information Systems (JURIX), pp. 37\u201348. IOS Press, Amsterdam (2005)","key":"6_CR2"},{"doi-asserted-by":"crossref","unstructured":"Garg, D., Jia, L., Datta, A.: A logical method for policy enforcement over evolving audit logs*. Technical report, CMU-CyLab-11-002 (2011)","key":"6_CR3","DOI":"10.21236\/ADA579934"},{"unstructured":"Agirre, E., Cer, D., Diab, M., Gonzalez Agirre, A., Guo, W.: Semantic textual similarity, including a pilot on typed similarity. In: The Second Joint Conference on Lexical and Computational Semantics (2013)","key":"6_CR4"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-642-04222-5_9","volume-title":"Frontiers of Combining Systems","author":"F Baader","year":"2009","unstructured":"Baader, F., Bauer, A., Lippmann, M.: Runtime verification using a temporal description logic. In: Ghilardi, S., Sebastiani, R. (eds.) FroCoS 2009. LNCS (LNAI), vol. 5749, pp. 149\u2013164. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04222-5_9"},{"unstructured":"Google: European privacy requests for search removals, January 2015. https:\/\/www.google.com\/transparencyreport\/removals\/europeprivacy\/?hl=en","key":"6_CR6"},{"unstructured":"Google: September 2015. https:\/\/support.google.com\/legal\/contact\/lr_eudpa?product=websearch","key":"6_CR7"},{"unstructured":"Google: Word tree, July 2016. https:\/\/developers.google.com\/chart\/interactive\/docs\/gallery\/wordtree?hl=en","key":"6_CR8"},{"doi-asserted-by":"crossref","unstructured":"DeYoung, H., Garg, D., Jia, L., Kaynar, D., Datta, A.: Experiences in the logical specification of the HIPAA and GLBA privacy laws. In: Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society (WPES), Chicago, Illinois, USA, pp. 12\u201320. ACM (2010)","key":"6_CR9","DOI":"10.1145\/1866919.1866930"},{"unstructured":"Max-Planck Institute: SPASS. http:\/\/www.mpi-inf.mpg.de\/departments\/automation-of-logic\/software\/spass-workbench\/ , July 2017","key":"6_CR10"},{"doi-asserted-by":"crossref","unstructured":"Finkel, J.R., Grenager, T., Manning, C.: Incorporating non-local information into information extraction systems by Gibbs sampling. In: Proceedings of the 43rd Annual Meeting of the Association for Computational Linguistics (ACL 2005), pp. 363\u2013370. Association for Computational Linguistics, Stroudsburg (2005)","key":"6_CR11","DOI":"10.3115\/1219840.1219885"},{"unstructured":"Argonne National Laboratory: Otter, August 2004. http:\/\/www.mcs.anl.gov\/research\/projects\/AR\/otter\/","key":"6_CR12"},{"unstructured":"Han, L., Kashyap, A., Finin, T., Mayfield, J., Weese, J.: UMBC EBIQUITY-CORE: semantic textual similarity systems. Technical report. University of Maryland (12)","key":"6_CR13"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-71496-5_5","volume-title":"Advances in Information Retrieval","author":"D Metzler","year":"2007","unstructured":"Metzler, D., Dumais, S., Meek, C.: Similarity measures for short segments of text. In: Amati, G., Carpineto, C., Romano, G. (eds.) ECIR 2007. LNCS, vol. 4425, pp. 16\u201327. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-71496-5_5"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-662-46666-7_18","volume-title":"Principles of Security and Trust","author":"M Backes","year":"2015","unstructured":"Backes, M., Bendun, F., Hoffmann, J., Marnau, N.: PriCL: creating a precedent, a framework for reasoning about privacy case law. In: Focardi, R., Myers, A. (eds.) POST 2015. LNCS, vol. 9036, pp. 344\u2013363. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46666-7_18"},{"unstructured":"Microsoft: Z3 prover, January 2017. http:\/\/rise4fun.com\/z3\/tutorial","key":"6_CR16"},{"doi-asserted-by":"crossref","unstructured":"Simeonovski, M., Bendun, F., Asghar, M.R., Backes, M., Marnau, N., Druschel, P.: Oblivion: mitigating privacy leaks by controlling the discoverability of online information. CoRR abs\/1506.06033, 01 July 2015","key":"6_CR17","DOI":"10.1007\/978-3-319-28166-7_21"},{"unstructured":"Schulz, S.: E theorem prover, July 2017. http:\/\/wwwlehre.dhbw-stuttgart.de\/~sschulz\/E\/E.html","key":"6_CR18"},{"unstructured":"Takale, S.A., Nandgaonkar, S.S.: Measuring semantic similarity between words using web search engines. In: Proceedings of the 16th International Conference on World Wide Web, pp. 757\u2013766. ACM, New York (2007)","key":"6_CR19"},{"unstructured":"Dao, T.N, Simpson, T.: Wordnet-based semantic similarity measurement (2005). www.codeproject.com . (1 Oct 2011)","key":"6_CR20"},{"unstructured":"Voronkov, A.: Vampire, July 2017. http:\/\/www.vprover.org\/","key":"6_CR21"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01701-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T01:13:46Z","timestamp":1573607626000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01701-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017002","9783030017019"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01701-9_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}