{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:40:05Z","timestamp":1751496005856,"version":"3.41.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030773915"},{"type":"electronic","value":"9783030773922"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77392-2_13","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:06:05Z","timestamp":1625267165000},"page":"194-211","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Enterprise Data Sharing Requirements: Rich Policy Languages and Intuitive User Interfaces"],"prefix":"10.1007","author":[{"given":"Karsten","family":"Martiny","sequence":"first","affiliation":[]},{"given":"Mark","family":"St. John","sequence":"additional","affiliation":[]},{"given":"Grit","family":"Denker","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Korkos","sequence":"additional","affiliation":[]},{"given":"Linda","family":"Briesemeister","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"13_CR1","unstructured":"Ashley, P., Hafa, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise Policy Authorization Language (2003). https:\/\/www.w3.org\/Submission\/2003\/SUBM-EPAL-20031110\/. Accessed 15 Jun 2020"},{"issue":"4","key":"13_CR2","doi-asserted-by":"publisher","first-page":"619","DOI":"10.3233\/JCS-2009-0364","volume":"18","author":"M Becker","year":"2010","unstructured":"Becker, M., Fournet, C., Gordon, A.: SecPAL: design and semantics of a decentralized authorization language. J. Comput. Sec. 18(4), 619\u2013665 (2010)","journal-title":"J. Comput. Sec."},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-030-22351-9_17","volume-title":"HCI for Cybersecurity, Privacy and Trust","author":"L Briesemeister","year":"2019","unstructured":"Briesemeister, L., et al.: Policy creation for enterprise-level data sharing. In: Moallem, A. (ed.) HCII 2019. LNCS, vol. 11594, pp. 249\u2013265. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22351-9_17"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lupu, E.C., Lobo, J. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18\u201338. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44569-2_2"},{"issue":"1\u20133","key":"13_CR5","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/0001-6918(91)90011-N","volume":"78","author":"PJ Essens","year":"1991","unstructured":"Essens, P.J., McCann, C.A., Hartevelt, M.A.: An experimental study of the interpretation of logical operators in database querying. Acta Psychologica 78(1\u20133), 201\u2013225 (1991)","journal-title":"Acta Psychologica"},{"issue":"3","key":"13_CR6","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/S0020-7373(08)80005-3","volume":"32","author":"SL Greene","year":"1990","unstructured":"Greene, S.L., Devlin, S.J., Cannata, P.E., Gomez, L.M.: No IFs, ANDs, or ORs: a study of database querying. Int. J. Man Mach. Stud. 32(3), 303\u2013326 (1990)","journal-title":"Int. J. Man Mach. Stud."},{"key":"13_CR7","unstructured":"Kagal, L., Finin, T., Joshi, A.: A policy language for a pervasive computing environment. In: Policy 03: 4th International Workshop on Policies for Distributed Systems and Networks (2003)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Kagal, L., Hanson, C., Weitzner, D.: Using dependency tracking to provide explanations for policy management. In: 2008 IEEE Workshop on Policies for Distributed Systems and Networks, pp. 54\u201361 (2008)","DOI":"10.1109\/POLICY.2008.51"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Martiny, K., Elenius, D., Denker, G.: Protecting privacy with a declarative policy framework. In: 12th IEEE International Conference on Semantic Computing (ICSC), Laguna Hills, California, USA (2018)","DOI":"10.1109\/ICSC.2018.00039"},{"key":"13_CR10","unstructured":"OASIS XACML Standard, Version 3.0 (2013). https:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html. Accessed 12 Jun 2020"},{"issue":"2000","key":"13_CR11","first-page":"1","volume":"671","author":"L Sweeney","year":"2000","unstructured":"Sweeney, L.: Simple demographics often identify people uniquely. Health (San Francisco) 671(2000), 1\u201334 (2000)","journal-title":"Health (San Francisco)"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-24747-0_2","volume-title":"Trust Management","author":"A Uszok","year":"2004","unstructured":"Uszok, A., Bradshaw, J.M., Jeffers, R.: KAoS: a policy and domain services framework for grid computing and semantic web services. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 16\u201326. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24747-0_2"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77392-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:10:15Z","timestamp":1751494215000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77392-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030773915","9783030773922"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77392-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}