{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:15:56Z","timestamp":1743059756405,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_63","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"705-716","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["XACML Privacy Policy Editor for Critical Infrastructures"],"prefix":"10.1007","author":[{"given":"Nils","family":"Ulltveit-Moe","sequence":"first","affiliation":[]},{"given":"Henrik","family":"Nergaard","sequence":"additional","affiliation":[]},{"given":"Terje","family":"Gj\u00f8s\u00e6ter","sequence":"additional","affiliation":[]},{"given":"Jennifer","family":"Betts","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"unstructured":"Moses, T. (ed.): OASIS eXtensible Access Control Markup Language (XACML) Version 2.0 (2005)","key":"63_CR1"},{"issue":"6","key":"63_CR2","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.csi.2011.10.007","volume":"34","author":"N Ulltveit-Moe","year":"2012","unstructured":"Ulltveit-Moe, N., Oleshchuk, V.: Decision-cache based XACML authorisation and anonymisation for XML documents. Comput. Stand. Interfaces 34(6), 527\u2013534 (2012)","journal-title":"Comput. Stand. Interfaces"},{"key":"63_CR3","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.is.2014.05.007","volume":"48","author":"N Ulltveit-Moe","year":"2014","unstructured":"Ulltveit-Moe, N., Oleshchuk, V.: A novel policy-driven reversible anonymisation scheme for XML-based services. Inf. Syst. 48, 164\u2013178 (2014)","journal-title":"Inf. Syst."},{"doi-asserted-by":"crossref","unstructured":"Nergaard, H., Ulltveit-Moe, N., Gj\u00f8s\u00e6ter, T.: A scratch-based graphical policy editor for XACML. In: ICISSP 2015 Proceedings of the 1st International Conference on Information Systems Security and Privacy ESEO, Angers, Loire Valley, France, pp. 182\u2013191 (2015)","key":"63_CR4","DOI":"10.1007\/978-3-319-27668-7_7"},{"doi-asserted-by":"crossref","unstructured":"Malan, D.J., Leitner, H.H.: Scratch for budding computer scientists. In: Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, pp. 223\u2013227, New York, NY, USA (2007)","key":"63_CR5","DOI":"10.1145\/1227310.1227388"},{"issue":"11","key":"63_CR6","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/1592761.1592779","volume":"52","author":"M Resnick","year":"2009","unstructured":"Resnick, M., Maloney, J., Monroy-Hern\u00e1ndez, A., Rusk, N., Eastmond, E., Brennan, K., Millner, A., Rosenbaum, E., Silver, J., Silverman, B., Kafai, Y.: Scratch: programming for all. Commun. ACM 52(11), 60\u201367 (2009)","journal-title":"Commun. ACM"},{"issue":"2","key":"63_CR7","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s12394-010-0053-z","volume":"3","author":"A Cavoukian","year":"2010","unstructured":"Cavoukian, A., Taylor, S., Abrams, M.E.: Privacy by design - essential for organizational accountability and strong business practices. Identity Inf. Soc. 3(2), 405\u2013413 (2010)","journal-title":"Identity Inf. Soc."},{"unstructured":"Intel Security: BERserk vulnerability part 1: RSA signature forgery attack due to incorrect parsing of ASN.1 encoded DigestInfo in PKCS#1 v1.5. Intel (2014)","key":"63_CR8"},{"key":"63_CR9","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TIT.1983.1056621","volume":"IT-29","author":"JGE Karnin","year":"1983","unstructured":"Karnin, J.G.E., Hellman, M.: On secret sharing system. IEEE Trans. Info Theor. IT-29, 35\u201341 (1983)","journal-title":"IEEE Trans. Info Theor."},{"issue":"5","key":"63_CR10","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1057\/ejis.2008.40","volume":"17","author":"B Kuechler","year":"2008","unstructured":"Kuechler, B., Vaishnavi, V.: On theory development in design science research: anatomy of a research project. Eur. J. Inf. Syst. 17(5), 489\u2013504 (2008)","journal-title":"Eur. J. Inf. Syst."},{"issue":"1","key":"63_CR11","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1037\/1076-898X.11.1.13","volume":"11","author":"RE Mayer","year":"2005","unstructured":"Mayer, R.E., Jackson, J.: The case for coherence in scientific explanations: quantitative details can hurt qualitative understanding. J. Exp. Psychol. Appl. 11(1), 13\u201318 (2005)","journal-title":"J. Exp. Psychol. Appl."},{"doi-asserted-by":"crossref","unstructured":"Stepien, B., Matwin, S., Felty, A.: Advantages of a non-technical XACML notation in role-based models. In: 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST), pp. 193\u2013200 (2011)","key":"63_CR12","DOI":"10.1109\/PST.2011.5971983"},{"key":"63_CR13","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-01187-0_5","volume-title":"E-Technologies: Innovation in an Open World","author":"B Stepien","year":"2009","unstructured":"Stepien, B., Felty, A., Matwin, S.: A non-technical user-oriented display notation for XACML conditions. In: Babin, G., Kropf, P., Weiss, M. (eds.) E-Technologies: Innovation in an Open World. LNBIP, vol. 26, pp. 53\u201364. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Stepien, B., Felty, A., Matwin, S.: A non-technical XACML target editor for dynamic access control systems, pp. 150\u2013157. IEEE (2014)","key":"63_CR14","DOI":"10.1109\/CTS.2014.6867558"},{"doi-asserted-by":"crossref","unstructured":"Zhao, H., Lobo, J., Bellovin, S.M.: An algebra for integration and analysis of ponder2 policies. In: IEEE Workshop on Policies for Distributed Systems and Networks 2008, POLICY 2008, pp. 74\u201377 (2008)","key":"63_CR15","DOI":"10.1109\/POLICY.2008.42"},{"unstructured":"Matheus, A. (ed.): OGC 07-026r2 geospatial extensible access control markup language (GeoXACML) version 1.0. Open Geospatial Consortium, Inc. (2007)","key":"63_CR16"},{"doi-asserted-by":"crossref","unstructured":"Ulltveit-Moe, N., Oleshchuk, V.: Enforcing mobile security with location-aware role-based access control. Secur. Commun. Netw., p. n\/a\u2013n\/a (2013)","key":"63_CR17","DOI":"10.1002\/sec.879"},{"key":"63_CR18","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-642-30244-2_15","volume-title":"Security and Privacy in Mobile Information and Communication Systems","author":"N Ulltveit-Moe","year":"2012","unstructured":"Ulltveit-Moe, N., Oleshchuk, V.: Mobile security with location-aware role-based access control. In: Prasad, R., Farkas, K., Schmidt, A.U., Lioy, A., Russello, G., Luccio, F.L. (eds.) MobiSec 2011. LNICST, vol. 94, pp. 172\u2013183. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_63","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:21:57Z","timestamp":1583508117000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_63","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}