{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:12:45Z","timestamp":1746245565232,"version":"3.40.4"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319067483"},{"type":"electronic","value":"9783319067490"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06749-0_11","type":"book-chapter","created":{"date-parts":[[2014,5,15]],"date-time":"2014-05-15T00:43:14Z","timestamp":1400114594000},"page":"154-171","source":"Crossref","is-referenced-by-count":9,"title":["My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data"],"prefix":"10.1007","author":[{"given":"Stefania","family":"Gnesi","sequence":"first","affiliation":[]},{"given":"Ilaria","family":"Matteucci","sequence":"additional","affiliation":[]},{"given":"Corrado","family":"Moiso","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Mori","sequence":"additional","affiliation":[]},{"given":"Marinella","family":"Petrocchi","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Vescovi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E.S., Hamed, H.H.: Firewall policy advisor for anomaly discovery and rule editing. In: IFIP\/IEEE Integrated Network Management, pp. 17\u201330 (2003)","DOI":"10.1007\/978-0-387-35674-7_2"},{"key":"11_CR2","unstructured":"ARTICLE 29 DATA PROTECTION WP136, Opinion 04\/2007 on the concept of Personal Data, http:\/\/goo.gl\/8hO9m (last checked February 21, 2014)"},{"key":"11_CR3","unstructured":"ARTICLE 29 WP191, Opinion 01\/2012 on data protection reform proposals (2012), http:\/\/goo.gl\/9tMKa (last checked February 21, 2014)"},{"key":"11_CR4","unstructured":"ARTICLE 29 WP196, Opinion 05\/2012 on Cloud Computing (2012), http:\/\/goo.gl\/tvKNG (last checked February 21, 2014)"},{"key":"11_CR5","unstructured":"ARTICLE 29 WP199, Opinion 08\/2012 providing further input on the data protection reform discussion (2012), http:\/\/goo.gl\/1AJXB (last checked February 21, 2014)"},{"key":"11_CR6","unstructured":"Brandimarte, L., Acquisti, A., Loewenstein, G., Babcock, L.: Privacy concerns and information disclosure: An illusion of control hypothesis. In: CIST (2010)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Brodie, C., et al.: An Empirical Study of Natural Language Parsingof Privacy Policy Rules using the SPARCLE Policy Workbench. In: SOUPS. ACM (2006)","DOI":"10.1145\/1143120.1143123"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Brodie, C., et al.: The Coalition Policy Management Portal for PolicyAuthoring, Verification, and Deployment. In: POLICY, pp. 247\u2013249 (2008)","DOI":"10.1109\/POLICY.2008.25"},{"key":"11_CR9","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-37282-7_4","volume-title":"Policies and Research in Identity Management","author":"J. Camenisch","year":"2013","unstructured":"Camenisch, J., Dubovitskaya, M., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S.: Concepts and Languages for Privacy-Preserving Attribute-Based Authentication. In: Fischer-H\u00fcbner, S., de Leeuw, E., Mitchell, C. (eds.) IDMAN 2013. IFIP AICT, vol.\u00a0396, pp. 34\u201352. Springer, Heidelberg (2013)"},{"issue":"3","key":"11_CR10","first-page":"199","volume":"82","author":"D. Chaum","year":"1983","unstructured":"Chaum, D.: Blind signatures for untraceable payments. Advances in Cryptology Proceedings of Crypto\u00a082(3), 199\u2013203 (1983)","journal-title":"Advances in Cryptology Proceedings of Crypto"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Conti, R., Matteucci, I., Mori, P., Petrocchi M.: An Expertise-driven Authoring Tool of Privacy Policies for e-Health. Technical Report IIT TR-02\/2014","DOI":"10.1109\/CBMS.2014.86"},{"key":"11_CR12","unstructured":"de Montjoye, Y.A., Wang, S.S., Pentland, A.: On the trusted use of large-scale personal data. IEEE Data Eng. Bull. 35(4), 4, 5\u20138"},{"key":"11_CR13","unstructured":"Directive 95\/46\/EC of the European Parliament and of Council, Official Journal of the European Union, L281\/31 (November 23, 1995)"},{"key":"11_CR14","unstructured":"Directive 2009\/136\/EC of the European Parliament and of the Council. Official Journal of the European Union, L337\/11 (November 25, 2009)"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Dunlop, N., et al.: Methods for conflict resolution in policy-based management systems. In: IEEE Enterprise Distributed Object Computing, pp. 98\u2013109 (2003)","DOI":"10.1109\/EDOC.2003.1233841"},{"key":"11_CR16","unstructured":"Hall-May, M., Kelly, T.: Towards conflict detection and resolution of safety policies. In: Intl. System Safety Conf. (2006)"},{"key":"11_CR17","unstructured":"Hardjono, T., Greenwood, D., Pentland, A.: Towards a Trustworthy Digital Infrastructure for Core Identities and Personal Data Stores. Global Forum on Identity (2013)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Jin, J., Ahn, G.-J., Hu, H., Covington, M.J., Zhang, X.: Patient-centric authorization framework for electronic healthcare services. Computers & Security 30(2-3), 116\u2013127","DOI":"10.1016\/j.cose.2010.09.001"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Johnson, M., et al.: Optimizing a policy authoring framework for security and privacy policies. In: SOUPS, pp. 8:1\u20138:9. ACM (2010)","DOI":"10.1145\/1837110.1837121"},{"key":"11_CR20","unstructured":"J\u00f8sang, A., Pope, S.: User centric identity management. In: AusCERT Asia Pacific Information Technology Security Conference (2005)"},{"key":"11_CR21","unstructured":"Kan, Y., Jia, X., Ren, K.: DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems. IACR Cryptology ePrint Archive, 419 (2012)"},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/11555261_54","volume-title":"Human-Computer Interaction - INTERACT 2005","author":"J. Karat","year":"2005","unstructured":"Karat, J., Karat, C.-M., Brodie, C., Feng, J.: Designing Natural Language and Structured Entry Methods for Privacy Policy Authoring. In: Costabile, M.F., Patern\u00f3, F. (eds.) INTERACT 2005. LNCS, vol.\u00a03585, pp. 671\u2013684. Springer, Heidelberg (2005)"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-540-44993-5_8","volume-title":"Digital Rights Management","author":"L. Korba","year":"2003","unstructured":"Korba, L., Kenny, S.: Towards Meeting the Privacy Challenge: Adapting DRM. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol.\u00a02696, pp. 118\u2013136. Springer, Heidelberg (2003)"},{"key":"11_CR24","unstructured":"Leenes, R., Schallab\u00f6ck, J., Hansen, M.: PRIME White Paper, Version 3. PRIME Project (2008)"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182\u20131191","DOI":"10.1109\/TPDS.2012.331"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Lunardelli, A., Matteucci, I., Mori, P., Petrocchi, M.: A Prototype for Solving Conflicts in XACML-based e-Health Policies. In: Proc. 26th IEEE International Symposium on Computer-Based Medical Systems, pp. 449\u2013452 (2013)","DOI":"10.1109\/CBMS.2013.6627838"},{"issue":"6","key":"11_CR27","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1109\/32.824414","volume":"25","author":"E.C. Lupu","year":"1999","unstructured":"Lupu, E.C., Sloman, M.: Conflicts in policy-based distributed systems management. IEEE Trans. Softw. Eng.\u00a025(6), 852\u2013869 (1999)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"11_CR28","first-page":"543","volume":"4","author":"A. McDonald","year":"2008","unstructured":"McDonald, A., Cranor, L.: The cost of reading privacy policies. ISJLP\u00a04, 543 (2008)","journal-title":"ISJLP"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Masoumzadeh, A., Amini, M., Jalili, R.: Conflict detection and resolution in context-aware authorization. In: IEEE SNDS, pp. 505\u2013511 (2007)","DOI":"10.1109\/AINAW.2007.127"},{"key":"11_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-35890-6_10","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"I. Matteucci","year":"2013","unstructured":"Matteucci, I., Mori, P., Petrocchi, M.: Prioritized Execution of Privacy Policies. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM 2012 and SETOP 2012. LNCS, vol.\u00a07731, pp. 133\u2013145. Springer, Heidelberg (2013)"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Moiso, C., Antonelli, F., Vescovi, M.: How do I manage my Personal Data? \u2013 A Telcoperspective. In: Proc. Data 2012, pp. 123\u2013128 (2012)","DOI":"10.5220\/0003996301230128"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Moiso, C., Minerva, R.: Towards a User-Centric Personal Data Ecosystem \u2013 The Role of the Bank of Individuals\u2019 Data. In: Intelligence in Next Generation Networks (2012)","DOI":"10.1109\/ICIN.2012.6376027"},{"key":"11_CR33","unstructured":"OASIS, eXtensible Access Control Markup Language (XACML) Ver. 3.0 (January 2013)"},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"Pentland, A.: Society\u2019s Nervous System: Building Effective Government, Energy, and Public Health Systems. IEEE Computer 45(1), 31\u201338","DOI":"10.1109\/MC.2011.299"},{"key":"11_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-74800-7_11","volume-title":"Human-Computer Interaction \u2013 INTERACT 2007","author":"R.W. Reeder","year":"2007","unstructured":"Reeder, R.W., Karat, C.-M., Karat, J., Brodie, C.: Usability challenges in security and privacy policy-authoring interfaces. In: Baranauskas, C., Abascal, J., Barbosa, S.D.J. (eds.) INTERACT 2007. LNCS, vol.\u00a04663, pp. 141\u2013155. Springer, Heidelberg (2007)"},{"key":"11_CR36","unstructured":"Reuters.com, WhatsApp violates privacy laws over phone numbers: report, http:\/\/goo.gl\/9tJzF (last checked February 21, 2014)"},{"key":"11_CR37","unstructured":"Roussopoulos, M., et al.: Technology-induced challenges in Privacy & Data Protection in Europe. A report by the ENISA Ad Hoc Working Group on Privacy & Technology (2008)"},{"key":"11_CR38","unstructured":"Syukur, E.: Methods for policy conflict detection and resolution in pervasive computing environments. In: Policy Management for Web (WWW 2005), pp. 10\u201314. ACM (2005)"},{"issue":"2","key":"11_CR39","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"F. Uriel","year":"1988","unstructured":"Uriel, F., et al.: Zero-knowledge proofs of identity. Journal of Cryptology\u00a01(2), 77\u201394 (1988)","journal-title":"Journal of Cryptology"},{"key":"11_CR40","unstructured":"Vescovi, M., Moiso, C., Antonelli, F., Lepri, B., Clippinger, J.-H.: Toward Personal Big Data passing through User Transparency, Control and Awareness: A Living-Lab experience. In: Proc. European Data Forum (to appear, 2014)"},{"key":"11_CR41","unstructured":"Whitley, E.: Towards effective, consent based control of Personal Data. In: Hildebrandt, M., O\u2019Hare, K., Waidner, M. (eds.) The Value of Personal Data, pp. 165\u2013176 (2013)"},{"key":"11_CR42","unstructured":"World Economic Forum, Rethinking Personal Data: Strengthening Trust (2012), http:\/\/www.weforum.org\/reports\/rethinking-personal-data-strengthening-trust"},{"key":"11_CR43","unstructured":"World Economic Forum, Unlocking the Value of Personal Data: From Collection to Usage (2013), http:\/\/www.weforum.org\/reports\/unlocking-value-personal-data-collection-usage"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06749-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T22:43:42Z","timestamp":1746225822000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06749-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319067483","9783319067490"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06749-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}