{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:55:20Z","timestamp":1742925320362,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319208091"},{"type":"electronic","value":"9783319208107"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20810-7_18","type":"book-chapter","created":{"date-parts":[[2015,6,21]],"date-time":"2015-06-21T23:47:00Z","timestamp":1434930420000},"page":"250-258","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Automated Translation of End User Policies for Usage Control Enforcement"],"prefix":"10.1007","author":[{"given":"Prachi","family":"Kumari","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Pretschner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,23]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Kelbert, F., Pretschner, A.: Towards a policy enforcement infrastructure for distributed usagecontrol. In: Proceedings of SACMAT 2012, pp. 119\u2013122 (2012)","DOI":"10.1145\/2295136.2295159"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Kumari, P., Pretschner, P., Peschla, P., Kuhn, J.: Distributed data usage control for web applications: a social network implementation. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, pp. 85\u201396 (2011)","DOI":"10.1145\/1943513.1943526"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/978-3-540-74835-9_35","volume-title":"Computer Security \u2013 ESORICS 2007","author":"M Hilty","year":"2007","unstructured":"Hilty, M., Pretschner, A., Basin, D., Schaefer, C., Walter, T.: A policy language for distributed usage control. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 531\u2013546. Springer, Heidelberg (2007)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Pretschner, A., Hilty, M., Basin, D., Schaefer, C., Walter, T.: Mechanisms for Usage Control. In: Proceedings of ASIACCS, pp. 240\u2013245 (2008)","DOI":"10.1145\/1368310.1368344"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Pretschner, A., Lovat, E., Buechler, M.: Representation-independent data usage control. In Proceedings of 6th International Workshop on Data Privacy Management (2011)","DOI":"10.1007\/978-3-642-28879-1_9"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Kumari, P., Pretschner, A.: Deriving implementation-level policies for usage control enforcement. In: Proceedings of CODASPY 2012, pp. 83\u201394. ACM (2012)","DOI":"10.1145\/2133601.2133612"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Kumari, P., Pretschner, A.: Model-based usage control policy derivation. In: Proceedings of ESSOS 2013, pp. 58\u201374 (2013)","DOI":"10.1007\/978-3-642-36563-8_5"},{"key":"18_CR8","unstructured":"Rudolph, M., Schwarz, R., Jung, C., Mauthe, A., Shirazi, N.: Deliverable 3.2 - policy specification methodology. Technical report, SECCRIT, June 2014"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of WWW 2010, pp. 351\u2013360. ACM, New York (2010)","DOI":"10.1145\/1772690.1772727"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"W\u00fcchner, T., Pretschner, A.: Data loss prevention based on data-driven usage control. In: Proceedings of ISSRE 2012, pp. 151\u2013160 (2012)","DOI":"10.1109\/ISSRE.2012.10"},{"key":"18_CR11","unstructured":"Su, L., Chadwick, D., Basden, A., Cunningham, J.: Automated decomposition of access control policies. In: Proceedings of POLICY 2005, pp. 6\u20138 (2005)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Bandara, A.K., Lupu, E.C., Moffett, J., Russo, A.: A goal-based approach to policy refinement. In: Proceedings of POLICY 2004, pp. 229\u2013239 (2004)","DOI":"10.1109\/POLICY.2004.1309175"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Craven, R., Lobo, J., Lupu, E., Russo, A., Sloman, M.: Decomposition techniques for policy refinement. In: Proceedings of CNSM 2010, pp. 72\u201379 (2010)","DOI":"10.1109\/CNSM.2010.5691331"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Udupi, Y.B., Sahai, A., Singhal, S.: A classification-based approach to policy refinement. In: Proceedings of 10th IFIP\/IEEE IM, pp. 785\u2013788 (2007)","DOI":"10.1109\/INM.2007.374713"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/11907466_20","volume-title":"Large Scale Management of Distributed Systems","author":"A Guerrero","year":"2006","unstructured":"Guerrero, A., Villagr\u00e1, V.A., de Vergara, J.E.L., S\u00e1nchez-Maci\u00e1n, A., Berrocal, J.: Ontology-based policy refinement using swrl rules for management information definitions in OWL. In: State, R., van der Meer, S., O\u2019Sullivan, D., Pfeifer, T. (eds.) DSOM 2006. LNCS, vol. 4269, pp. 227\u2013232. Springer, Heidelberg (2006)"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Harvan, M., Pretschner, A.: State-based usage control enforcement with data flow tracking using system call interposition. In: Proceedings of NSS, pp. 373\u2013380 (2009)","DOI":"10.1109\/NSS.2009.51"},{"key":"18_CR17","unstructured":"Pretschner, A., Buechler, M., Harvan, M., Schaefer, C., and T. Walter. Usage control enforcement with data flow tracking for x11. In: Proceedings of STM 2009, pp. 124\u2013137 (2009)"},{"key":"18_CR18","unstructured":"Kumari, P., Kelbert, F., Pretschner, A.: Data protection in heterogeneous distributed systems: a smart meter example. In: DSCI (2011)"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Neisse, R., Doerr, J.: Model-based specification and refinement of usage control policies. In: Proceedings of PST\u20192013, pp. 169\u2013176 (2013)","DOI":"10.1109\/PST.2013.6596051"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20810-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T20:15:28Z","timestamp":1561148128000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20810-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319208091","9783319208107"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20810-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"23 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}