{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:24:25Z","timestamp":1743006265575,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030898106"},{"type":"electronic","value":"9783030898113"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-89811-3_5","type":"book-chapter","created":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T06:24:53Z","timestamp":1637907893000},"page":"62-72","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Automating Normative Control for\u00a0Healthcare Research"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4790-7024","authenticated-orcid":false,"given":"Milen G.","family":"Kebede","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,27]]},"reference":[{"key":"5_CR1","unstructured":"2018 reform of eu data protection rules. https:\/\/ec.europa.eu\/commission\/sites\/beta-political\/files\/data-protection-factsheet-changes_en.pdf"},{"key":"5_CR2","unstructured":"Anderson, A., et al.: Extensible access control markup language (XACML) version 1.0. OASIS (2003)"},{"key":"5_CR3","first-page":"31","volume":"30","author":"P Ashley","year":"2003","unstructured":"Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (EPAL). IBM Res. 30, 31 (2003)","journal-title":"IBM Res."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Athan, T., Boley, H., Governatori, G., Palmirani, M., Paschke, A., Wyner, A.: Oasis legalruleml. In: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Law, pp. 3\u201312 (2013)","DOI":"10.1145\/2514601.2514603"},{"issue":"3","key":"5_CR5","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1145\/293910.293151","volume":"23","author":"E Bertino","year":"1998","unstructured":"Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. Database Syst. (TODS) 23(3), 231\u2013285 (1998)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"van Binsbergen, L.T., Liu, L.C., van Doesburg, R., van Engers, T.: eFLINT: a domain-specific language for executable norm specifications. In: Proceedings of the 19th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, pp. 124\u2013136 (2020)","DOI":"10.1145\/3425898.3426958"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Crampton, J., Sellwood, J.: Path conditions and principal matching: a new approach to access control. In: Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, pp. 187\u2013198 (2014)","DOI":"10.1145\/2613087.2613094"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Damen, S., den Hartog, J., Zannone, N.: CollAC: collaborative access control. In: 2014 International Conference on Collaboration Technologies and Systems (CTS), pp. 142\u2013149. IEEE (2014)","DOI":"10.1109\/CTS.2014.6867557"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-030-31095-0_3","volume-title":"Rules and Reasoning","author":"M De Vos","year":"2019","unstructured":"De Vos, M., Kirrane, S., Padget, J., Satoh, K.: ODRL policy modelling and compliance checking. In: Fodor, P., Montali, M., Calvanese, D., Roman, D. (eds.) RuleML+RR 2019. LNCS, vol. 11784, pp. 36\u201351. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-31095-0_3"},{"key":"5_CR10","unstructured":"Gates, C.: Access control requirements for web 2.0 security and privacy. IEEE Web 2, 12\u201315 (2007)"},{"key":"5_CR11","unstructured":"Griffo, C., Almeida, J.P.A., Guizzardi, G.: A pattern for the representation of legal relations in a legal core ontology. In: JURIX, pp. 191\u2013194 (2016)"},{"key":"5_CR12","unstructured":"Hadziselimovic, E., Fatema, K., Pandit, H.J., Lewis, D.: Linked data contracts to support data protection and data ethics in the sharing of scientific data. In: SemSci@ ISWC, pp. 55\u201362 (2017)"},{"key":"5_CR13","first-page":"43","volume":"321","author":"R Hoekstra","year":"2007","unstructured":"Hoekstra, R., Breuker, J., Di Bello, M., Boer, A., et al.: The LKIF core ontology of basic legal concepts. LOAIT 321, 43\u201363 (2007)","journal-title":"LOAIT"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Hu, H., Ahn, G.J., Zhao, Z., Yang, D.: Game theoretic analysis of multiparty access control in online social networks. In: Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, pp. 93\u2013102 (2014)","DOI":"10.1145\/2613087.2613097"},{"issue":"2","key":"5_CR15","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MC.2015.33","volume":"48","author":"VC Hu","year":"2015","unstructured":"Hu, V.C., Kuhn, D.R., Ferraiolo, D.F., Voas, J.: Attribute-based access control. Computer 48(2), 85\u201388 (2015)","journal-title":"Computer"},{"key":"5_CR16","unstructured":"Iannella, R., Villata, S.: ODRL information model 2.2. W3C Recommendation (2018)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Karafili, E., Lupu, E.C.: Enabling data sharing in contextual environments: policy representation and analysis. In: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, pp. 231\u2013238 (2017)","DOI":"10.1145\/3078861.3078876"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Leicht, J., Heisel, M.: A survey on privacy policy languages: expressiveness concerning data protection regulations. In: 2019 12th CMI Conference on Cybersecurity and Privacy (CMI), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/CMI48017.2019.8962144"},{"key":"5_CR19","unstructured":"Li, M.: DSAP: data sharing agreement privacy ontology. Ph.D. thesis (2018)"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-319-41483-6_15","volume-title":"Data and Applications Security and Privacy XXX","author":"R Mahmudlu","year":"2016","unstructured":"Mahmudlu, R., den Hartog, J., Zannone, N.: Data governance and transparency for collaborative systems. In: Ranise, S., Swarup, V. (eds.) DBSec 2016. LNCS, vol. 9766, pp. 199\u2013216. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41483-6_15"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-28879-1_3","volume-title":"Data Privacy Management and Autonomous Spontaneus Security","author":"I Matteucci","year":"2011","unstructured":"Matteucci, I., Petrocchi, M., Sbodio, M.L., Wiegand, L.: A design phase for data sharing agreements. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM\/SETOP-2011. LNCS, vol. 7122, pp. 25\u201341. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-28879-1_3"},{"key":"5_CR22","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-642-20769-3_21","volume-title":"Privacy and Identity Management for Life","author":"M Casassa Mont","year":"2010","unstructured":"Casassa Mont, M., Pearson, S., Creese, S., Goldsmith, M., Papanikolaou, N.: A Conceptual Model for Privacy Policies with Consent and Revocation Requirements. In: Fischer-H\u00fcbner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity 2010. IAICT, vol. 352, pp. 258\u2013270. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-20769-3_21"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-030-01713-2_13","volume-title":"Multi-Agent Systems and Agreement Technologies","author":"N Fornara","year":"2018","unstructured":"Fornara, N., Colombetti, M.: Operational semantics of an extension of ODRL able to express obligations. In: Belardinelli, F., Argente, E. (eds.) EUMAS\/AT -2017. LNCS (LNAI), vol. 10767, pp. 172\u2013186. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01713-2_13"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Osborn, S.: Mandatory access control and role-based access control revisited. In: Proceedings of the Second ACM Workshop on Role-Based Access Control, pp. 31\u201340 (1997)","DOI":"10.1145\/266741.266751"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Palmirani, M., Martoni, M., Rossi, A., Bartolini, C., Robaldo, L.: Pronto: privacy ontology for legal compliance. In: Proceedings of the European Conference on e-Government, ECEG 2018, pp. 142\u2013151 (2018)","DOI":"10.1007\/978-3-319-98349-3_11"},{"key":"5_CR26","unstructured":"Pellegrini, T., et al.: A genealogy and classification of rights expression languages - preliminary results. Jusletter IT, pp. 1\u20138 (2018)"},{"key":"5_CR27","unstructured":"Pellegrini, T., et al.: A genealogy and classification of rights expression languages-preliminary results. In: Data Protection\/LegalTech-Proceedings of the 21st International Legal Informatics Symposium IRIS, pp. 243\u2013250 (2018)"},{"issue":"3","key":"5_CR28","doi-asserted-by":"publisher","first-page":"311","DOI":"10.3233\/SW-160215","volume":"7","author":"V Rodr\u00edguez-Doncel","year":"2016","unstructured":"Rodr\u00edguez-Doncel, V., Delgado, J., Llorente, S., Rodr\u00edguez, E., Boch, L.: Overview of the mpeg-21 media contract ontology. Semant. Web 7(3), 311\u2013332 (2016)","journal-title":"Semant. Web"},{"key":"5_CR29","unstructured":"Rodriguez-Doncel, V., Villata, S., G\u00f3mez-P\u00e9rez, A.: A dataset of rdf licenses. In: JURIX. pp. 187\u2013188 (2014)"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Rostad, L., Edsberg, O.: A study of access control requirements for healthcare systems based on audit trails from access logs. In: 2006 22nd Annual Computer Security Applications Conference (ACSAC 2006), pp. 175\u2013186. IEEE (2006)","DOI":"10.1109\/ACSAC.2006.8"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Munawer, Q.: How to do discretionary access control using roles. In: Proceedings of the Third ACM Workshop on Role-Based Access Control, pp. 47\u201354 (1998)","DOI":"10.1145\/286884.286893"},{"issue":"2","key":"5_CR32","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38\u201347 (1996)","journal-title":"Computer"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Shakeri, S., et al.: Modeling and matching digital data marketplace policies. In: Proceedings of the IEEE 15th International Conference on eScience, eScience 2019, pp. 570\u2013577 (2019)","DOI":"10.1109\/eScience.2019.00078"},{"issue":"6","key":"5_CR34","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1007\/s00778-010-0193-7","volume":"19","author":"AC Squicciarini","year":"2010","unstructured":"Squicciarini, A.C., Shehab, M., Wede, J.: Privacy policies for shared content in social network sites. VLDB J. 19(6), 777\u2013796 (2010)","journal-title":"VLDB J."},{"issue":"1","key":"5_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/sdata.2016.18","volume":"3","author":"MD Wilkinson","year":"2016","unstructured":"Wilkinson, M.D., et al.: The fair guiding principles for scientific data management and stewardship. Sci. Data 3(1), 1\u20139 (2016)","journal-title":"Sci. Data"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Xiao, Q., Tan, K.L.: Peer-aware collaborative access control in social networks. In: 8th International Conference on Collaborative Computing: Networking, Applications and Work sharing (CollaborateCom), pp. 30\u201339. IEEE (2012)","DOI":"10.4108\/icst.collaboratecom.2012.250524"},{"issue":"2","key":"5_CR37","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s11060-016-2363-y","volume":"132","author":"SEV van Zanten","year":"2017","unstructured":"van Zanten, S.E.V., et al.: Development of the siope dipg network, registry and imaging repository: a collaborative effort to optimize research into a rare and lethal disease. J. Neuro-Oncol. 132(2), 255\u2013266 (2017)","journal-title":"J. Neuro-Oncol."},{"issue":"4","key":"5_CR38","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/1108906.1108908","volume":"8","author":"X Zhang","year":"2005","unstructured":"Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(4), 351\u2013387 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"}],"container-title":["Lecture Notes in Computer Science","AI Approaches to the Complexity of Legal Systems XI-XII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-89811-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T06:26:32Z","timestamp":1637907992000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-89811-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030898106","9783030898113"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-89811-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"27 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AICOL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on AI Approaches to the Complexity of Legal Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"XII","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aicol2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/aicol.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}