{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T21:40:02Z","timestamp":1746222002518,"version":"3.40.4"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319062563"},{"type":"electronic","value":"9783319062570"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06257-0_40","type":"book-chapter","created":{"date-parts":[[2014,5,9]],"date-time":"2014-05-09T11:51:54Z","timestamp":1399636314000},"page":"513-519","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Short Paper: A Framework for the Privacy Access Control Model"],"prefix":"10.1007","author":[{"given":"Sandugash","family":"Askarova","sequence":"first","affiliation":[]},{"given":"Darkhan","family":"Mukhatov","sequence":"additional","affiliation":[]},{"given":"Altynbek","family":"Sharipbayev","sequence":"additional","affiliation":[]},{"given":"Dina","family":"Satybaldina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,10]]},"reference":[{"key":"40_CR1","doi-asserted-by":"crossref","unstructured":"Barth, A., Datta, A., Mitchell, J.C., Sundaram, S.: Privacy and utility in business processes. In: Proceedings\u00a0of 20th IEEE Computer Security Foundations Symposium, pp. 279\u2013294 (2007)","DOI":"10.1109\/CSF.2007.26"},{"key":"40_CR2","doi-asserted-by":"crossref","unstructured":"Anton, A.I., Earp, J.B., Potts, C., Alspaugh, T.A.: The role of policy and privacy values in requirements engineering. In: Proceedings of the 5th IEEE International Symposium on Requirements Engineering (RE\u201901), Toronto, Canada, pp.138\u2013145 (2001)","DOI":"10.1109\/ISRE.2001.948553"},{"issue":"9","key":"40_CR3","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"R Sandhu","year":"1994","unstructured":"Sandhu, R., Samarati, R.: Access control: principles and practice. IEEE Commun. Mag. 32(9), 40\u201348 (1994)","journal-title":"IEEE Commun. Mag."},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"Ni, Q., Trombetta, A., Bertino, E., Lobo, J.: Privacy-aware role based access control. In: Proceedings of SACMAT\u201907, Sophia Antipolis, France (2007)","DOI":"10.1145\/1266840.1266848"},{"key":"40_CR5","volume-title":"Role-Based Access Control","author":"DF Ferraiolo","year":"2007","unstructured":"Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control, 2nd edn. Artech House, London (2007)","edition":"2"},{"key":"40_CR6","unstructured":"Law of the Republic of Kazakhstan \u201cOn informatization\u201d, Astana (2007)"},{"key":"40_CR7","unstructured":"Lu, C.: Powerful Privacy Potential: P3P in the Context of Legislation and Education (2003)"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Stufflebeam, W., Ant\u00f3n, A.I., He, Q., Jain, N.: Specifying privacy policies with P3P and EPAL: lessons learned. In: Proceedings of the Workshop on Privacy in the Electronic Society, Washington (2004)","DOI":"10.1145\/1029179.1029190"},{"issue":"2","key":"40_CR9","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MSECP.2004.1281243","volume":"2","author":"AI Anton","year":"2003","unstructured":"Anton, A.I., Earp, B., Bolchini, D., He, Q., Jensen, C., Stufflebeam, W.: The lack of clarity in financial privacy policies and the need for standardization. IEEE Secur. Priv. 2(2), 36\u201345 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Ashley, P., Hada, S., Karjoth, G., Schunter, M.: E-P3P privacy policies and privacy authorization. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES\u201902), Washington (2002)","DOI":"10.1145\/644527.644538"},{"key":"40_CR11","series-title":"LNCS","first-page":"69","volume-title":"PET 2002","author":"G Karjoth","year":"2003","unstructured":"Karjoth, G., Schunter, M., Waidner, M.: Platform for enterprise privacy practices: privacy-enabled management of customer data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 69\u201384. Springer, Heidelberg (2003)"},{"key":"40_CR12","doi-asserted-by":"crossref","unstructured":"Liu, L., Yu, E.S.K., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: Proceedings of 11th IEEE International Conference on Requirements Engineering (RE\u201903), Monterrey, USA, pp. 151\u201361 (2003)","DOI":"10.1109\/ICRE.2003.1232746"},{"key":"40_CR13","unstructured":"He, Q., Anton, A.I.: A framework for modelling privacy requirements in role engineering. In: Proceedings of 9th International Workshop on Requirements Engineering \u2013 Foundation for Software Quality (REFSQ\u201903), pp. 137\u2013146, Klagenfurt\/Velden, Austria (2003)"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Crook, R., Ince, D., Nuseibeh, B.: On modelling access policies: relating roles to their organisational context. In: Proceedings of 13th IEEE International Requirements Engineering Conference (RE\u201905), Paris, France (2005)","DOI":"10.1109\/RE.2005.48"},{"key":"40_CR15","volume-title":"Requirements Engineering: From System Goals to UML Models to Software Specifications","author":"A van Lamsweerde","year":"2009","unstructured":"van Lamsweerde, A.: Requirements Engineering: From System Goals to UML Models to Software Specifications. Wiley, England (2009)"},{"key":"40_CR16","unstructured":"ISO\/IEC 13568:2002. Information Technology \u2013 Z Formal Specification Notation \u2013 Syntax, Type System and Semantics (2002)"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06257-0_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T21:26:29Z","timestamp":1746221189000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-06257-0_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319062563","9783319062570"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06257-0_40","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"10 May 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}