{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:10:33Z","timestamp":1748664633854,"version":"3.41.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319248578"},{"type":"electronic","value":"9783319248585"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24858-5_5","type":"book-chapter","created":{"date-parts":[[2015,9,19]],"date-time":"2015-09-19T13:09:52Z","timestamp":1442668192000},"page":"72-88","source":"Crossref","is-referenced-by-count":3,"title":["How to Trust the Re-use of Data"],"prefix":"10.1007","author":[{"given":"Erisa","family":"Karafili","sequence":"first","affiliation":[]},{"given":"Hanne Riis","family":"Nielson","sequence":"additional","affiliation":[]},{"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,9]]},"reference":[{"issue":"15","key":"5_CR1","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1016\/S1383-7621(98)00067-8","volume":"45","author":"GA Agha","year":"1999","unstructured":"Agha, G.A., Kim, W.: Actors: a unifying model for parallel and distributed computing. J. Syst. Architect. 45(15), 1263\u20131277 (1999)","journal-title":"J. Syst. Architect."},{"issue":"3","key":"5_CR2","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1017\/S0960129504004153","volume":"14","author":"F Arbab","year":"2004","unstructured":"Arbab, F.: Reo: a channel-based coordination model for component composition. Math. Struct. Comp. Sci. 14(3), 329\u2013366 (2004)","journal-title":"Math. Struct. Comp. Sci."},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Basu, A., Bozga, M., Sifakis, J.: Modeling heterogeneous real-time components in BIP. In: Proceedings of SEFM, pp. 3\u201312 (2006)","DOI":"10.1109\/SEFM.2006.27"},{"issue":"10","key":"5_CR4","doi-asserted-by":"publisher","first-page":"1315","DOI":"10.1109\/TC.2008.26","volume":"57","author":"S Bliudze","year":"2008","unstructured":"Bliudze, S., Sifakis, J.: The algebra of connectors-structuring interaction in BIP. IEEE Trans. Comput. 57(10), 1315\u20131330 (2008)","journal-title":"IEEE Trans. Comput."},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Brewer, D.F.C., Nash, M.J.: The chinese wall security policy. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 206\u2013214 (1989)","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"5_CR6","unstructured":"Callaway, E.: Fraud investigation rocks danish university (2011). http:\/\/www.nature.com\/news\/2011\/110107\/full\/news.2011.703.html"},{"issue":"5","key":"5_CR7","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/32.685256","volume":"24","author":"R Nicola De","year":"1998","unstructured":"De Nicola, R., Ferrari, G.L., Pugliese, R.: KLAIM: a kernel language for agents interaction and mobility. IEEE Trans. Softw. Eng. 24(5), 315\u2013330 (1998)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Hankin, C., Nielson, F., Nielson, H.R.: Advice from belnap policies. In: Proceedings of IEEE Computer Security Foundations Symposium, pp. 234\u2013247 (2009)","DOI":"10.1109\/CSF.2009.8"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-540-68265-3_10","volume-title":"Coordination Models and Languages","author":"C Hankin","year":"2008","unstructured":"Hankin, C., Nielson, F., Nielson, H.R., Yang, F.: Advice for coordination. In: Lea, D., Zavattaro, G. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 153\u2013168. Springer, Heidelberg (2008)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Hartswood, M., Procter, R., Taylor, P., Blot, L., Anderson, S., Rouncefield, M., Slack, R.: Problems of data mobility and reuse in the provision of computer-based training for screening mammography. In: Human Factors in Computing Systems, pp. 909\u2013918 (2012)","DOI":"10.1145\/2207676.2208533"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-71316-6_4","volume-title":"Programming Languages and Systems","author":"A Lapadula","year":"2007","unstructured":"Lapadula, A., Pugliese, R., Tiezzi, F.: A calculus for orchestration of web services. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol. 4421, pp. 33\u201347. Springer, Heidelberg (2007)"},{"issue":"1","key":"5_CR12","doi-asserted-by":"publisher","first-page":"3:1","DOI":"10.1145\/2071389.2071392","volume":"44","author":"HR Nielson","year":"2012","unstructured":"Nielson, H.R., Nielson, F., Pilegaard, H.: Flow logic for process calculi. ACM Comput. Surv. 44(1), 3:1\u20133:39 (2012)","journal-title":"ACM Comput. Surv."},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-642-23556-6_10","volume-title":"Secure Data Management","author":"M Petkovi\u0107","year":"2011","unstructured":"Petkovi\u0107, M., Prandi, D., Zannone, N.: Purpose control: did you process the data for the intended purpose? In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2011. LNCS, vol. 6933, pp. 145\u2013168. Springer, Heidelberg (2011)"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-540-68265-3_16","volume-title":"Coordination Models and Languages","author":"D Prandi","year":"2008","unstructured":"Prandi, D., Quaglia, P., Zannone, N.: Formal analysis of BPMN via a translation into COWS. In: Lea, D., Zavattaro, G. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 249\u2013263. Springer, Heidelberg (2008)"},{"issue":"7","key":"5_CR15","doi-asserted-by":"publisher","first-page":"e67332","DOI":"10.1371\/journal.pone.0067332","volume":"8","author":"JC Wallis","year":"2013","unstructured":"Wallis, J.C., Rolando, E., Borgman, C.L.: If we share data, will anyone use them? data sharing and reuse in the long tail of science and technology. PLoS ONE 8(7), e67332 (2013)","journal-title":"PLoS ONE"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24858-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T18:33:07Z","timestamp":1748629987000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24858-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319248578","9783319248585"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24858-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}