{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:20:35Z","timestamp":1743128435659,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319170152"},{"type":"electronic","value":"9783319170169"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17016-9_21","type":"book-chapter","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T00:52:41Z","timestamp":1427590361000},"page":"319-326","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["A-PPL: An Accountability Policy Language"],"prefix":"10.1007","author":[{"given":"Monir","family":"Azraoui","sequence":"first","affiliation":[]},{"given":"Kaoutar","family":"Elkhiyaoui","sequence":"additional","affiliation":[]},{"given":"Melek","family":"\u00d6nen","sequence":"additional","affiliation":[]},{"given":"Karin","family":"Bernsmed","sequence":"additional","affiliation":[]},{"given":"Anderson Santana","family":"De Oliveira","sequence":"additional","affiliation":[]},{"given":"Jakub","family":"Sendor","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,28]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Azraoui, M., Elkhiyaoui, K., \u00d6nen, M., Bernsmed, K., de Oliveira, A.S., Sendor, J.: A-PPL: An Accountability Policy Language. Technical report (2014)","DOI":"10.1007\/978-3-319-17016-9_21"},{"key":"21_CR2","unstructured":"Bernsmed, K., Felici, M., de Oliveira, A.S., Sendor, J., Moe, N.B., R\u00fcbsamen, T., Tountopoulos, V., Hasnain, B.: Use case descriptions. Deliverable, Cloud Accountability (A4Cloud) Project (2013)"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Bernsmed, K., Kuan, H., Millard, C.: Deploying Medical Sensor Networks in the Cloud - Accountability Obligations from a European Perspective. Submitted for publication (2014)","DOI":"10.2139\/ssrn.2427746"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Butin, D., Chicote, M., Le M\u00e9tayer, D.: Log design for accountability. In: 2013 IEEE Security and Privacy Workshops (SPW), pp. 1\u20137. IEEE (2013)","DOI":"10.1109\/SPW.2013.26"},{"key":"21_CR5","unstructured":"Cherrueau, R.-A., Douence, R., Grall, H., Royer, J.-C., Sellami, M., S\u00fcdholt, M., Azraoui, M., Elkhiyaoui, K., Molva, R., \u00d6nen, M., Garaga, A., de Oliveira, A.S., Sendor, J., Bernsmed, K.: Policy representation framework. Deliverable (to be published), Cloud Accountability (A4Cloud) Project (2013)"},{"issue":"4","key":"21_CR6","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10207-007-0051-9","volume":"7","author":"F Cuppens","year":"2008","unstructured":"Cuppens, F., Cuppens-Boulahia, N.: Modeling contextual security policies. Int. J. Inf. Secur. 7(4), 285\u2013305 (2008)","journal-title":"Int. J. Inf. Secur."},{"key":"21_CR7","unstructured":"European Parliament. Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995)"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Henze, M., Gro\u00dffengels, M., Koprowski, M., Wehrle, K.: Towards data handling requirements-aware cloud computing. In: 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) (2013)","DOI":"10.1109\/CloudCom.2013.145"},{"key":"21_CR9","unstructured":"HERAS AF team. HERAS AF (Holistic Enterprise-Ready Application Security Architecture Framework). http:\/\/herasaf.org\/"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Li, N., Chen, H., Bertino, E.: On practical specification and enforcement of obligations. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, pp. 71\u201382. ACM (2012)","DOI":"10.1145\/2133601.2133611"},{"issue":"6","key":"21_CR11","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.ijinfomgt.2012.04.001","volume":"32","author":"A Lin","year":"2012","unstructured":"Lin, A., Chen, N.-C.: Cloud computing as an innovation: percepetion, attitude, and adoption. Int. J. Inf. Manage. 32(6), 533\u2013540 (2012)","journal-title":"Int. J. Inf. Manage."},{"key":"21_CR12","unstructured":"OASIS Standard. eXtensible Access Control Markup Language (XACML) Version 3.0. 22 January 2013. http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-319-05302-8_13","volume-title":"Foundations and Practice of Security","author":"EI Papagiannakopoulou","year":"2014","unstructured":"Papagiannakopoulou, E.I., et al.: Leveraging ontologies upon a holistic privacy-aware access control model. In: Danger, J.L., Debbabi, M., Marion, J.-Y., Garcia-Alfaro, J., Heywood, N.Z. (eds.) FPS 2013. LNCS, vol. 8352, pp. 209\u2013226. Springer, Heidelberg (2014)"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Pearson, S., Tountopoulos, V., Catteddu, D., Sudholt, M., Molva, R., Reich, C., Fischer-Hubner, S., Millard, C., Lotz, V., Jaatun, M., Leenes, R., Rong, C., Lopez, J.: Accountability for cloud and other future internet services. In: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 629\u2013632 (2012)","DOI":"10.1109\/CloudCom.2012.6427512"},{"key":"21_CR15","unstructured":"Trabelsi, S., Neven, G., Raggett, D., Ardagna, C., Bournez, C., Bussard, L., Bezzi, M., Camenisch, J., de Capitani di Vimercati, S., Gey, F., Kuczerawy, A., Meissner, S., Neven, G., Njeh, A., Paraboschi, S., Pedrini, E., Foresti, S., Pinsdorf, U., Preiss, F.-S., Sendor, J., Tziviskou, C., Raggett, D., Roessler, T., Samarati, P., Schallaboeck, J., Short, S., Sommer, D., Verdicchio, M., Wenning, R.: D5.3.4 - report on design and implementation of the primelife policy language and engine. Deliverable, Primelife Project (2011)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17016-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T07:14:41Z","timestamp":1676445281000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17016-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319170152","9783319170169"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17016-9_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}