{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T16:03:48Z","timestamp":1771949028726,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030763510","type":"print"},{"value":"9783030763527","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-76352-7_42","type":"book-chapter","created":{"date-parts":[[2021,5,29]],"date-time":"2021-05-29T06:07:29Z","timestamp":1622268449000},"page":"457-471","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Data Centered and Usage-Based Security Service"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9853-7118","authenticated-orcid":false,"given":"Jingya","family":"Yuan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6908-6103","authenticated-orcid":false,"given":"Fr\u00e9d\u00e9rique","family":"Biennier","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1911-5524","authenticated-orcid":false,"given":"Nabila","family":"Benharkat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,30]]},"reference":[{"issue":"7","key":"42_CR1","doi-asserted-by":"publisher","first-page":"9203","DOI":"10.1007\/s11042-017-5301-x","volume":"77","author":"BB Gupta","year":"2018","unstructured":"Gupta, B.B., Yamaguchi, S., Agrawal, D.P.: Advances in security and privacy of multimedia big data in mobile and cloud computing. Multimedia Tools Appl. 77(7), 9203\u20139208 (2018)","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"42_CR2","doi-asserted-by":"publisher","first-page":"71","DOI":"10.3724\/SP.J.1001.2011.03958","volume":"22","author":"DG Feng","year":"2011","unstructured":"Feng, D.G., Zhang, M., Zhang, Y., Xu, Z.: Study on cloud computing security. J. Softw. 22(1), 71\u201383 (2011)","journal-title":"J. Softw."},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Suo, H., Liu, Z., Wan, J.F., Zhou, K.: Security and privacy in mobile cloud computing. In: 9th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 655\u2013659 (2013)","DOI":"10.1109\/IWCMC.2013.6583635"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Patil, D., Mohapatra, R.K., Babu, K.S.: Evaluation of generalization based K-anonymization algorithms. In: 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS), pp. 171\u2013175 (2017)","DOI":"10.1109\/SSPS.2017.8071586"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Jain, P., Gyanchandani, M., Khare, N.: Big data privacy: a technological perspective and review. J. Big Data 3(1), 25 (2016)","DOI":"10.1186\/s40537-016-0059-y"},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"Smith, M., Szongott, C., Henne, B., Voigt, G.V.: Big data privacy issues in public social media. In: 6th IEEE International Conference on Digital Ecosystems and Technologies (DEST), pp. 1\u20136 (2012)","DOI":"10.1109\/DEST.2012.6227909"},{"key":"42_CR7","unstructured":"GDPR, Art.4. http:\/\/www.privacy-regulation.eu\/en\/article-4-definitions-GDPR.html"},{"key":"42_CR8","unstructured":"Acquisto, G.D., Ferrer, J.D., Kikiras, P., Torra, V., Montjoye, Y.A., Bourka, A.: Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics, pp. 1\u201380 (2015)"},{"key":"42_CR9","unstructured":"Sullivan, K.M.: Under a watchful eye: incursions on personal privacy. In: The War on Our Freedoms: Civil Liberties in an Age of Terrorism, vol. 128, pp. 131(2003)"},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Kuner, C., Cate, F.H., Millard, C., Svantesson, D.J.B.: The challenge of \u2018big data\u2019 for data protection (2012)","DOI":"10.1093\/idpl\/ips003"},{"key":"42_CR11","doi-asserted-by":"crossref","unstructured":"Burmeister, F., Drews, P., Schirmer, I.: A privacy-driven enterprise architecture meta-model for supporting compliance with the general data protection regulation. In: Proceedings of the 52nd Hawaii International Conference on System Sciences (2019)","DOI":"10.24251\/HICSS.2019.729"},{"key":"42_CR12","doi-asserted-by":"publisher","first-page":"50510","DOI":"10.1109\/ACCESS.2018.2868726","volume":"6","author":"SC Cha","year":"2018","unstructured":"Cha, S.C., Yeh, K.H.: A data-driven security risk assessment scheme for personal data protection. IEEE Access 6, 50510\u201350517 (2018)","journal-title":"IEEE Access"},{"key":"42_CR13","unstructured":"Di Francesco Maesa, D., Mori, P., Ricci, L.: Distributed access control through Blockchain technology (2017)"},{"key":"42_CR14","unstructured":"Wirth, C., Kolain, M.: Privacy by Blockchain design: a Blockchain-enabled GDPR-compliant approach for handling personal data. In: Proceedings of 1st ERCIM Blockchain Workshop 2018. European Society for Socially Embedded Technologies (EUSSET) (2018)"},{"key":"42_CR15","doi-asserted-by":"publisher","first-page":"1746","DOI":"10.1109\/TIFS.2019.2948287","volume":"15","author":"NB Truong","year":"2019","unstructured":"Truong, N.B., Sun, K., Lee, G.M., Guo, Y.: GDPR-compliant personal data management: a blockchain-based solution. IEEE Trans. Inf. Forens. Secur. 15, 1746\u20131761 (2019)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"42_CR16","doi-asserted-by":"crossref","unstructured":"Neisse, R., Steri, G., Nai-Fovino, I.: A blockchain-based approach for data accountability and provenance tracking. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2017)","DOI":"10.1145\/3098954.3098958"},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"Kelbert, F., Pretschner, A.: Data usage control enforcement in distributed systems. In Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 71\u201382 (2013)","DOI":"10.1145\/2435349.2435358"},{"issue":"1","key":"42_CR18","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"JH Park","year":"2004","unstructured":"Park, J.H., Sandhu, R.: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128\u2013174 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"42_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1483","DOI":"10.1007\/11575801_34","volume-title":"On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE","author":"A Kim","year":"2005","unstructured":"Kim, A., Luo, J., Kang, M.: Security ontology for annotating resources. In: Meersman, R., Tari, Z. (eds.) OTM 2005. LNCS, vol. 3761, pp. 1483\u20131499. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11575801_34"},{"key":"42_CR20","doi-asserted-by":"crossref","unstructured":"Hu, Y.J., Guo, H.Y., Lin, G.D.: Semantic enforcement of privacy protection policies via the combination of ontologies and rules. In: 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2008), pp. 400\u2013407 (2008)","DOI":"10.1109\/SUTC.2008.59"},{"key":"42_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/11431053_20","volume-title":"The Semantic Web: Research and Applications","author":"W Nejdl","year":"2005","unstructured":"Nejdl, W., Olmedilla, D., Winslett, M., Zhang, Charles C.: Ontology-based policy specification and management. In: G\u00f3mez-P\u00e9rez, A., Euzenat, J. (eds.) ESWC 2005. LNCS, vol. 3532, pp. 290\u2013302. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11431053_20"},{"key":"42_CR22","unstructured":"Sodki, C., Badr, Y., Biennier, F.: Enhancing web service selection by QoS-based ontology and WS-policy. In: Proceedings of the 2008 ACM Symposium on Applied Computing, pp. 2426\u20132431 (2008)"},{"issue":"3","key":"42_CR23","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1007\/s11227-013-0980-1","volume":"67","author":"C Choi","year":"2014","unstructured":"Choi, C., Choi, J.H., Kim, P.K.: Ontology-based access control model for security policy reasoning in cloud computing. J. Supercomput. 67(3), 711\u2013722 (2014)","journal-title":"J. Supercomput."},{"key":"42_CR24","doi-asserted-by":"crossref","unstructured":"Garcia, D., et al.: Towards a base ontology for privacy protection in service-oriented architecture. In: IEEE International Conference on Service-Oriented Computing and Applications (SOCA), pp. 1\u20138 (2009)","DOI":"10.1109\/SOCA.2009.5410467"},{"key":"42_CR25","doi-asserted-by":"crossref","unstructured":"Masoumzadeh, A., Joshi, J.: OSNAC: an ontology-based access control model for social networking systems. In: 2010 IEEE Second International Conference on Social Computing, pp. 751\u2013759. IEEE (2010)","DOI":"10.1109\/SocialCom.2010.116"},{"key":"42_CR26","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.advengsoft.2013.12.006","volume":"69","author":"CL Liu","year":"2014","unstructured":"Liu, C.L.: Cloud service access control system based on ontologies. Adv. Eng. Softw. 69, 26\u201336 (2014)","journal-title":"Adv. Eng. Softw."},{"key":"42_CR27","doi-asserted-by":"crossref","unstructured":"Tsai, W.T., Shao, Q.: Role-based access-control using reference ontology in clouds. In: 2011 Tenth International Symposium on Autonomous Decentralized Systems, pp. 121\u2013128. IEEE (2011)","DOI":"10.1109\/ISADS.2011.21"},{"key":"42_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, X., Park, J., Parisi-Presicce, F., Sandhu, R.: A logical specification for usage control. In: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, pp. 1\u201310 (2004)","DOI":"10.1145\/990036.990038"},{"key":"42_CR29","doi-asserted-by":"crossref","unstructured":"Kaaniche, N., Laurent, M.: A Blockchain-based data usage auditing architecture with enhanced privacy and availability. In: 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), pp. 1\u20135. IEEE (2017)","DOI":"10.1109\/NCA.2017.8171384"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing \u2013 ICSOC 2020 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-76352-7_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,29]],"date-time":"2021-05-29T06:32:41Z","timestamp":1622269961000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-76352-7_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030763510","9783030763527"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-76352-7_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"30 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Service-Oriented Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsoc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icsoc2020.connect.rs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conftool","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"137","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, 3 industry papers are included. Due to the COVID-19 pandemic, the conference took place virtually. For the workshops 34 full and 21 short papers were accepted from a total of 125 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}