{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:04:36Z","timestamp":1743123876380,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319208091"},{"type":"electronic","value":"9783319208107"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20810-7_16","type":"book-chapter","created":{"date-parts":[[2015,6,21]],"date-time":"2015-06-21T23:47:00Z","timestamp":1434930420000},"page":"233-241","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System"],"prefix":"10.1007","author":[{"given":"Annanda Thavymony","family":"Rath","sequence":"first","affiliation":[]},{"given":"Jean-No\u00ebl","family":"Colin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,23]]},"reference":[{"key":"16_CR1","unstructured":"Anderson, A.: XACML profile for Role Based Access Control, 13 February 2004. \n                      http:\/\/www.oasis-open.org\/committees\/xacml"},{"key":"16_CR2","unstructured":"European Community Research And Development Information Service, 7 Framework Program. \n                      http:\/\/www.foi.se\/p5\n                      \n                    . Accessed April 2014"},{"key":"16_CR3","first-page":"24:1","volume":"13","author":"N Qun","year":"2010","unstructured":"Qun, N., Elisa, B., Jorge, L., Carolyn, B., Karat, C.-M., Alberto, T.: Privacy-aware role-based access control. ACM Trans. Inf. Syst. Secur. 13, 24:1\u201324:31 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"16_CR4","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995. \n                      http:\/\/www.dataprotection.ie\/\n                      \n                    . Accessed December 2014"},{"issue":"3","key":"16_CR5","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 222\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"16_CR6","volume-title":"Assessment of Access Control System","author":"VC Hu","year":"2006","unstructured":"Hu, V.C., Ferraiolo, D.F., Kuhn, D.R.: Assessment of Access Control System. National Institute of Standards and Technology, Gaithersbur (2006)"},{"issue":"4","key":"16_CR7","doi-asserted-by":"crossref","first-page":"369","DOI":"10.3233\/JCS-2008-0328","volume":"16","author":"CA Ardagna","year":"2008","unstructured":"Ardagna, C.A., Cremonini, M., De Capitani di Vimercati, S., Samarati, P.: A privacy-aware access control system. J. Comput. Secur. (JCS) 16(4), 369\u2013392 (2008)","journal-title":"J. Comput. Secur. (JCS)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Rath, A.T., Colin, J.-N.: Towards enforcement of purpose for privacy policy in distributed healthcare. In: The 3rd IEEE International Conference on Consumer eHealth Platforms, Services and Applications (CeHPSA), IEEE CCNC 2013","DOI":"10.1109\/CCNC.2013.6488578"},{"issue":"4","key":"16_CR9","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10207-007-0051-9","volume":"7","author":"F Cuppens","year":"2008","unstructured":"Cuppens, F., Cuppens, N.: Modeling contextual security policies in OrBAC. Int. J. Inf. Secur. (IJIS) 7(4), 285\u2013305 (2008)","journal-title":"Int. J. Inf. Secur. (IJIS)"},{"key":"16_CR10","unstructured":"Yuan, E., Tong, J.: Attribute based access control a new access control approach for service oriented architectures (soa). In: Workshop on New Challenges for Access Control, Ottawa, ON, Canada, April 2005"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20810-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T20:15:17Z","timestamp":1561148117000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20810-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319208091","9783319208107"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20810-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"23 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}