{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:13:41Z","timestamp":1746245621685,"version":"3.40.4"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319074511"},{"type":"electronic","value":"9783319074528"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07452-8_15","type":"book-chapter","created":{"date-parts":[[2014,5,22]],"date-time":"2014-05-22T01:53:43Z","timestamp":1400723623000},"page":"366-392","source":"Crossref","is-referenced-by-count":0,"title":["Preserving Data Privacy in e-Health"],"prefix":"10.1007","author":[{"given":"Riccardo","family":"Conti","sequence":"first","affiliation":[]},{"given":"Alessio","family":"Lunardelli","sequence":"additional","affiliation":[]},{"given":"Ilaria","family":"Matteucci","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Mori","sequence":"additional","affiliation":[]},{"given":"Marinella","family":"Petrocchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E.S., Hamed, H.H.: Firewall policy advisor for anomaly discovery and rule editing. In: Goldszmidt, G., Sch\u00f6nw\u00e4lder, J. (eds.) Integrated Network Management VII. IFIP, vol.\u00a0118, pp. 17\u201330. Springer, Boston (2003)","DOI":"10.1007\/978-0-387-35674-7_2"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-642-16265-7_4","volume-title":"Integrated Formal Methods","author":"A.E. Arenas","year":"2010","unstructured":"Arenas, A.E., Aziz, B., Bicarregui, J., Wilson, M.D.: An Event-B Approach to Data Sharing Agreements. In: M\u00e9ry, D., Merz, S. (eds.) IFM 2010. LNCS, vol.\u00a06396, pp. 28\u201342. Springer, Heidelberg (2010)"},{"key":"15_CR3","unstructured":"Axiomatics.com. Policy Administrator Point, http:\/\/goo.gl\/A5OEHW (last checked July 24, 2013)"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-87603-8_15","volume-title":"Abstract State Machines, B and Z","author":"J. Bicarregui","year":"2008","unstructured":"Bicarregui, J., Arenas, A., Aziz, B., Massonet, P., Ponsard, C.: Towards Modelling Obligations in Event-B. In: B\u00f6rger, E., Butler, M., Bowen, J.P., Boca, P. (eds.) ABZ 2008. LNCS, vol.\u00a05238, pp. 181\u2013194. Springer, Heidelberg (2008)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Brodie, C., et al.: An Empirical Study of Natural Language Parsing of Privacy Policy Rules using the SPARCLE Policy Workbench. In: SOUPS. ACM (2006)","DOI":"10.1145\/1143120.1143123"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Brodie, C., et al.: The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment. In: POLICY, pp. 247\u2013249 (2008)","DOI":"10.1109\/POLICY.2008.25"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Cholvy, L., Cuppens, F.: Analyzing consistency of security policies. In: IEEE Symposium on Security and Privacy, pp. 103\u2013112 (1997)","DOI":"10.1109\/SECPRI.1997.601324"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"All About Maude - A High-Performance Logical Framework","year":"2007","unstructured":"Clavel, M., Dur\u00e1n, F., Eker, S., Lincoln, P., Mart\u00ed-Oliet, N., Meseguer, J., Talcott, C. (eds.): All About Maude - A High-Performance Logical Framework. LNCS, vol.\u00a04350. Springer, Heidelberg (2007)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Colombo, M., Martinelli, F., Matteucci, I., Petrocchi, M.: Context-aware analysis of data sharing agreements. In: Advances in Human-Oriented and Personalized Mechanisms, Technologies and Services (2010)","DOI":"10.1109\/CENTRIC.2010.17"},{"key":"15_CR10","unstructured":"Consequence Project. Infrastructure for data sharing agreements (December 2010), http:\/\/goo.gl\/is7cpR"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Conti, R., Matteucci, I., Mori, P., Petrocchi, M.: Expertise-driven Authoring Tool of Privacy Policies for e-Health. In: Computer-Based Medical Systems, Tech. Rep. IIT-CNR TR-02-2014 (2014)","DOI":"10.1109\/CBMS.2014.86"},{"key":"15_CR12","first-page":"3","volume":"186","author":"F. Cuppens","year":"2007","unstructured":"Cuppens, F., Cuppens-Boulahia, N., Ghorbel, M.B.: High level conflict management strategies in advanced access control models. ENTCS\u00a0186, 3\u201326 (2007)","journal-title":"ENTCS"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/3-540-44618-4_5","volume-title":"CONCUR 2000 - Concurrency Theory","author":"R. Nicola De","year":"2000","unstructured":"De Nicola, R., Ferrari, G.-L., Pugliese, R.: Programming Access Control: The KLAIM Experience. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol.\u00a01877, pp. 48\u201365. Springer, Heidelberg (2000)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Dunlop, N., Indulska, J., Raymond, K.: Methods for conflict resolution in policy-based management systems. In: Enterprise Distributed Object Computing, pp. 98\u2013109. IEEE (2003)","DOI":"10.1109\/EDOC.2003.1233841"},{"key":"15_CR15","unstructured":"Hall-May, M., Kelly, T.: Towards conflict detection and resolution of safety policies. In: Intl. System Safety Conf. (2006)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Hansen, R.R., Nielson, F., Nielson, H.R., Probst, C.W.: Static Validation of Licence Conformance Policies. In: ARES, pp. 1104\u20131111 (2008)","DOI":"10.1109\/ARES.2008.162"},{"issue":"2-3","key":"15_CR17","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.cose.2010.09.001","volume":"30","author":"J. Jin","year":"2011","unstructured":"Jin, J., Ahn, G.-J., Hu, H., Covington, M.J., Zhang, X.: Patient-centric authorization framework for electronic healthcare services. Computers & Security\u00a030(2-3), 116\u2013127 (2011)","journal-title":"Computers & Security"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Johnson, M., Karat, J., Karat, C.-M., Grueneberg, K.: Optimizing a policy authoring framework for security and privacy policies. In: SOUPS, pp. 8:1\u20138:9. ACM (2010)","DOI":"10.1145\/1837110.1837121"},{"key":"15_CR19","unstructured":"Joint NEMA\/COCIR\/JIRA Security and Privacy Committee (SPC). Break-glass: An approach to granting emergency access to healthcare systems (2004)"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/11555261_54","volume-title":"Human-Computer Interaction - INTERACT 2005","author":"J. Karat","year":"2005","unstructured":"Karat, J., Karat, C.-M., Brodie, C., Feng, J.: Designing Natural Language and Structured Entry Methods for Privacy Policy Authoring. In: Costabile, M.F., Patern\u00f3, F. (eds.) INTERACT 2005. LNCS, vol.\u00a03585, pp. 671\u2013684. Springer, Heidelberg (2005)"},{"key":"15_CR21","unstructured":"Kransner, G.E., Pope, S.: Cookbook for using the Model-View-Controller User Interface paradigm. Object Oriented Programming, 26\u201349 (1988)"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Lunardelli, A., Matteucci, I., Mori, P., Petrocchi, M.: A Prototype for Solving Conflicts in XACML-based e-Health Policies. In: Computer-Based Medical Systems, pp. 449\u2013452. IEEE (2013)","DOI":"10.1109\/CBMS.2013.6627838"},{"issue":"6","key":"15_CR23","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1109\/32.824414","volume":"25","author":"E.C. Lupu","year":"1999","unstructured":"Lupu, E.C., Sloman, M.: Conflicts in policy-based distributed systems management. IEEE Trans. Softw. Eng.\u00a025(6), 852\u2013869 (1999)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"15_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/978-3-642-32498-7_42","volume-title":"Multidisciplinary Research and Practice for Information Systems","author":"F. Martinelli","year":"2012","unstructured":"Martinelli, F., Matteucci, I., Petrocchi, M., Wiegand, L.: A formal support for collaborative data sharing. In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. LNCS, vol.\u00a07465, pp. 547\u2013561. Springer, Heidelberg (2012)"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Masoumzadeh, A., Amini, M., Jalili, R.: Conflict detection and resolution in context-aware authorization. In: Security in Networks and Distributed Systems, pp. 505\u2013511. IEEE (2007)","DOI":"10.1109\/AINAW.2007.127"},{"key":"15_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-35890-6_10","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"I. Matteucci","year":"2013","unstructured":"Matteucci, I., Mori, P., Petrocchi, M.: Prioritized Execution of Privacy Policies. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM 2012 and SETOP 2012. LNCS, vol.\u00a07731, pp. 133\u2013145. Springer, Heidelberg (2013)"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Matteucci, I., Mori, P., Petrocchi, M., Wiegand, L.: Controlled data sharing in e-health. In: STAST, pp. 17\u201323 (2011)","DOI":"10.1109\/STAST.2011.6059251"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Matteucci, I., Petrocchi, M., Sbodio, M.L.: CNL4DSA: A Controlled Natural Language for Data Sharing Agreements. In: SAC: Privacy on the Web Track. ACM (2010)","DOI":"10.1145\/1774088.1774218"},{"key":"15_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-28879-1_3","volume-title":"Data Privacy Management and Autonomous Spontaneus Security","author":"I. Matteucci","year":"2012","unstructured":"Matteucci, I., Petrocchi, M., Sbodio, M.L., Wiegand, L.: A design phase for data sharing agreements. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. LNCS, vol.\u00a07122, pp. 25\u201341. Springer, Heidelberg (2012)"},{"key":"15_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-28879-1_3","volume-title":"Data Privacy Management and Autonomous Spontaneus Security","author":"I. Matteucci","year":"2012","unstructured":"Matteucci, I., Petrocchi, M., Sbodio, M.L., Wiegand, L.: A design phase for data sharing agreements. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. LNCS, vol.\u00a07122, pp. 25\u201341. Springer, Heidelberg (2012)"},{"key":"15_CR31","volume-title":"A Calculus of Communicating Systems","author":"R. Milner","year":"1982","unstructured":"Milner, R.: A Calculus of Communicating Systems. Springer-Verlag New York, Inc., Secaucus (1982)"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Ni, Q., et al.: Privacy-aware Role-based Access Control. ACM Transactions on Information and System Security\u00a013 (2010)","DOI":"10.1145\/1805974.1805980"},{"key":"15_CR33","unstructured":"OASIS. eXtensible Access Control Markup Language (XACML) Version 3.0 (January 2013)"},{"key":"15_CR34","unstructured":"Policy Design Tool (2009), http:\/\/www.alphaworks.ibm.com\/tech\/policydesigntool"},{"key":"15_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-74800-7_11","volume-title":"Human-Computer Interaction \u2013 INTERACT 2007","author":"R.W. Reeder","year":"2007","unstructured":"Reeder, R.W., Karat, C.-M., Karat, J., Brodie, C.: Usability challenges in security and privacy policy-authoring interfaces. In: Baranauskas, C., Abascal, J., Barbosa, S.D.J. (eds.) INTERACT 2007. LNCS, vol.\u00a04663, pp. 141\u2013155. Springer, Heidelberg (2007)"},{"issue":"3","key":"15_CR36","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/0022-2496(77)90033-5","volume":"15","author":"T.L. Saaty","year":"1977","unstructured":"Saaty, T.L.: A scaling method for priorities in hierarchical structures. Journal of Mathematical Psychology\u00a015(3), 234\u2013281 (1977)","journal-title":"Journal of Mathematical Psychology"},{"issue":"1","key":"15_CR37","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/S0377-2217(02)00227-8","volume":"145","author":"T.L. Saaty","year":"2003","unstructured":"Saaty, T.L.: Decision-making with the AHP: Why is the principal eigenvector necessary. European Journal of Operational Research\u00a0145(1), 85\u201391 (2003)","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"15_CR38","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1504\/IJSSCI.2008.017590","volume":"1","author":"T.L. Saaty","year":"2008","unstructured":"Saaty, T.L.: Decision making with the Analytic Hierarchy Process. International Journal of Services Sciences\u00a01(1), 83\u201398 (2008)","journal-title":"International Journal of Services Sciences"},{"key":"15_CR39","unstructured":"Syukur, E.: Methods for policy conflict detection and resolution in pervasive computing environments. In: Policy Management for Web (WWW 2005), pp. 10\u201314. ACM (2005)"},{"key":"15_CR40","doi-asserted-by":"crossref","unstructured":"Verdejo, A., Mart\u00ed-Oliet, N.: Implementing CCS in Maude 2. ENTCS\u00a071 (2002)","DOI":"10.1016\/S1571-0661(05)82540-X"},{"key":"15_CR41","doi-asserted-by":"crossref","unstructured":"Wishart, R., Corapi, D., Marinovic, S., Sloman, M.: Collaborative Privacy Policy Authoring in a Social Networking Context. In: POLICY, pp. 1\u20138. IEEE (2010)","DOI":"10.1109\/POLICY.2010.13"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Future Internet Services and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07452-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T00:32:31Z","timestamp":1746232351000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07452-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319074511","9783319074528"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07452-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}