{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:47:06Z","timestamp":1742914026401,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030587925"},{"type":"electronic","value":"9783030587932"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58793-2_27","type":"book-chapter","created":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T23:04:02Z","timestamp":1598828642000},"page":"332-342","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Accountability in the A Posteriori Access Control: A Requirement and a Mechanism"],"prefix":"10.1007","author":[{"given":"Farah","family":"Dernaika","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nora","family":"Cuppens-Boulahia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Olivier","family":"Raynaud","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,8,31]]},"reference":[{"key":"27_CR1","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.entcs.2015.04.006","volume":"312","author":"S Alves","year":"2015","unstructured":"Alves, S., Fern\u00e1ndez, M.: A framework for the analysis of access control policies with emergency management. Electron. Notes Theor. Comput. Sci. 312, 89\u2013105 (2015)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Azkia, H., Cuppens-Boulahia, N., Cuppens, F., Coatrieux, G.: Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment. In: 2010 Sixth International Conference on Information Assurance and Security, pp. 197\u2013203. IEEE (2010)","DOI":"10.1109\/ISIAS.2010.5604060"},{"key":"27_CR3","first-page":"746","volume":"180","author":"H Azkia","year":"2012","unstructured":"Azkia, H., Cuppens-Boulahia, N., Cuppens, F., Coatrieux, G.: Ontology based log content extraction engine for a posteriori security control. Stud. Health Technol. Inform. 180, 746\u2013750 (2012)","journal-title":"Stud. Health Technol. Inform."},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Bartolini, C., Daoudagh, S., Lenzini, G., Marchetti, E.: Towards a lawful authorized access: a preliminary GDPR-based authorized access. In: 14th International Conference on Software Technologies (ICSOFT 2019), Prague, Czech Republic, pp. 26\u201328 (2019)","DOI":"10.5220\/0007978703310338"},{"issue":"4","key":"27_CR5","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/s00778-006-0023-0","volume":"17","author":"JW Byun","year":"2008","unstructured":"Byun, J.W., Li, N.: Purpose based access control for privacy protection in relational database systems. VLDB J. 17(4), 603\u2013619 (2008)","journal-title":"VLDB J."},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Cholvy, L., Cuppens, F., Saurel, C.: Towards a logical formalization of responsibility. In: Proceedings of the 6th International Conference on Artificial Intelligence and Law, pp. 233\u2013242 (1997)","DOI":"10.1145\/261618.261658"},{"key":"27_CR7","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/0-387-24098-5_14","volume-title":"Formal Aspects in Security and Trust","author":"R Corin","year":"2005","unstructured":"Corin, R., Etalle, S., den Hartog, J., Lenzini, G., Staicu, I.: A logic for auditing accountability in decentralized systems. In: Dimitrakos, T., Martinelli, F. (eds.) Formal Aspects in Security and Trust. IIFIP, vol. 173, pp. 187\u2013201. Springer, Boston, MA (2005). https:\/\/doi.org\/10.1007\/0-387-24098-5_14"},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.entcs.2006.08.028","volume":"168","author":"MAC Dekker","year":"2007","unstructured":"Dekker, M.A.C., Etalle, S.: Audit-based access control for electronic health records. Electron. Notes Theor. Comput. Sci. 168, 221\u2013236 (2007)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"27_CR9","first-page":"30","volume":"1","author":"AA El Kalam","year":"2003","unstructured":"El Kalam, A.A., et al.: Or-bac: un mod\u00e8le de contr\u00f4le d\u2019acc\u00e8s bas\u00e9 sur les organisations. Cahiers francophones de la recherche en s\u00e9curit\u00e9 de l\u2019information 1, 30\u201343 (2003)","journal-title":"Cahiers francophones de la recherche en s\u00e9curit\u00e9 de l\u2019information"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Essaouini, N., Cuppens, F., Cuppens-Boulahia, N., El Kalam, A.A.: Specifying and enforcing constraints in dynamic access control policies. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, pp. 290\u2013297. IEEE (2014)","DOI":"10.1109\/PST.2014.6890951"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Etalle, S., Winsborough, W.H.: A posteriori compliance control categories and subject descriptors, pp. 11\u201320 (2007)","DOI":"10.1145\/1266840.1266843"},{"key":"27_CR12","unstructured":"Feigenbaum, J.: Accountability as a driver of innovative privacy solutions. In: Privacy and Innovation Symposium (2010)"},{"key":"27_CR13","unstructured":"Ferraiolo, D., Cugini, J., Kuhn, D.R.: Role-based access control (RBAC): features and motivations. In: Proceedings of 11th Annual Computer Security Application Conference, pp. 241\u201348 (1995)"},{"issue":"2","key":"27_CR14","doi-asserted-by":"publisher","first-page":"399","DOI":"10.4284\/0038-4038-2011.152","volume":"79","author":"L Friesen","year":"2012","unstructured":"Friesen, L.: Certainty of punishment versus severity of punishment: an experimental investigation. South. Econ. J. 79(2), 399\u2013421 (2012)","journal-title":"South. Econ. J."},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Hu, V.C., et\u00a0al.: Guide to attribute based access control (ABAC) definition and considerations (draft). NIST special publication 800-162 (2013)","DOI":"10.6028\/NIST.SP.800-162"},{"key":"27_CR16","first-page":"489","volume":"32","author":"M Jouini","year":"2014","unstructured":"Jouini, M., Rabai, L.B.A., Aissa, A.B.: Classification of security threats in information systems. ANT\/SEIT 32, 489\u2013496 (2014)","journal-title":"ANT\/SEIT"},{"key":"27_CR17","unstructured":"Lampson, B.: Accountability and freedom. In: Cambridge Computer Seminar, Cambridge, UK, pp. 1\u201326 (2005)"},{"issue":"10","key":"27_CR18","doi-asserted-by":"publisher","first-page":"1264","DOI":"10.1177\/0956797612443835","volume":"23","author":"S Shalvi","year":"2012","unstructured":"Shalvi, S., Eldar, O., Bereby-Meyer, Y.: Honesty requires time (and lack of justifications). Psychol. Sci. 23(10), 1264\u20131270 (2012)","journal-title":"Psychol. Sci."},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.future.2013.05.010","volume":"31","author":"WW Smari","year":"2014","unstructured":"Smari, W.W., Clemente, P., Lalande, J.F.: An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system. Future Gener. Comput. Syst. 31, 147\u2013168 (2014)","journal-title":"Future Gener. Comput. Syst."},{"issue":"4","key":"27_CR20","doi-asserted-by":"publisher","first-page":"263","DOI":"10.2753\/MIS0742-1222290410","volume":"29","author":"A Vance","year":"2013","unstructured":"Vance, A., Lowry, P.B., Eggett, D.: Using accountability to reduce access policy violations in information systems. J. Manag. Inf. Syst. 29(4), 263\u2013290 (2013)","journal-title":"J. Manag. Inf. Syst."},{"key":"27_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7","volume-title":"The EU General Data Protection Regulation (GDPR). A Practical Guide","author":"P Voigt","year":"2017","unstructured":"Voigt, P., Von dem Bussche, A.: The EU General Data Protection Regulation (GDPR). A Practical Guide. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57959-7"}],"container-title":["Communications in Computer and Information Science","Quality of Information and Communications Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58793-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T00:28:38Z","timestamp":1619224118000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58793-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030587925","9783030587932"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58793-2_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"31 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"QUATIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Quality of Information and Communications Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Faro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"quatic2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2020.quatic.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}