{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:10:24Z","timestamp":1743113424193,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319253596"},{"type":"electronic","value":"9783319253602"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25360-2_3","type":"book-chapter","created":{"date-parts":[[2015,10,7]],"date-time":"2015-10-07T02:23:32Z","timestamp":1444184612000},"page":"26-37","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Aware Access Control for Cloud-Based Data Platforms"],"prefix":"10.1007","author":[{"given":"D\u00f3nal","family":"McCarthy","sequence":"first","affiliation":[]},{"given":"Paul","family":"Malone","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Hange","sequence":"additional","affiliation":[]},{"given":"Kenny","family":"Doyle","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Robson","sequence":"additional","affiliation":[]},{"given":"Dylan","family":"Conway","sequence":"additional","affiliation":[]},{"given":"Stepan","family":"Ivanov","sequence":"additional","affiliation":[]},{"given":"\u0141ukasz","family":"Radziwonowicz","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Kleinfeld","sequence":"additional","affiliation":[]},{"given":"Theodoros","family":"Michalareas","sequence":"additional","affiliation":[]},{"given":"Timotheos","family":"Kastrinogiannis","sequence":"additional","affiliation":[]},{"given":"Nikos","family":"Stasinos","sequence":"additional","affiliation":[]},{"given":"Fenareti","family":"Lampathaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,6]]},"reference":[{"key":"3_CR1","unstructured":"Apache Cordova. \n                    http:\/\/cordova.apache.org\/\n                    \n                  . Accessed 15 October 2015"},{"key":"3_CR2","unstructured":"Couchbase Server. \n                    http:\/\/www.couchbase.com\/\n                    \n                  . Accessed 15 January 2015"},{"key":"3_CR3","unstructured":"Docker: Build, Ship and Run Any App, Anywhere. \n                    https:\/\/www.docker.com\/\n                    \n                  . Accessed 15 January 2015"},{"key":"3_CR4","unstructured":"Google Cloud Messaging for Android. \n                    https:\/\/developer.android.com\/google\/gcm\/index.html\n                    \n                  . Accessed 15 January 2015"},{"key":"3_CR5","unstructured":"JSON Web Token (JWT). \n                    http:\/\/jwt.io\/\n                    \n                  . Accessed 15 January 2015"},{"key":"3_CR6","unstructured":"Mongrel2. \n                    http:\/\/mongrel2.org\/\n                    \n                  . Accessed 15 January 2015"},{"key":"3_CR7","unstructured":"OPENi - Open-Source, Web-Based, Framework for Integrating Applications with Cloud-based Services and Personal Cloudlets. \n                    http:\/\/www.openi-ict.eu\/\n                    \n                  . Accessed 15 January 2015"},{"key":"3_CR8","unstructured":"OPENi open source project. \n                    https:\/\/github.com\/OPENi-ict\/\n                    \n                  . Accessed 15 January 2015"},{"key":"3_CR9","unstructured":"ZeroMQ. \n                    http:\/\/zeromq.org\/\n                    \n                  . Accessed 15 January 2015"},{"key":"3_CR10","unstructured":"Doyle, K., McCarthy, D.: OPENi White Paper: An End Users Perspective: Digital Identity Putting the Genie Back in the Bottle, September 2014. \n                    http:\/\/www.openi-ict.eu\/wp-content\/uploads\/2014\/07\/openi_whitepaper.pdf\n                    \n                  . Accessed 15 January 2015"},{"key":"3_CR11","unstructured":"Illera, R., Ortega, S., Petychakis, M.: OPENi Deliverable D2.3: Security and Privacy Considerations for Cloud-based Services and Cloudlets, January 2013. \n                    http:\/\/www.openi-ict.eu\/wp-content\/uploads\/2013\/11\/OPENi_D2.3.pdf\n                    \n                  . Accessed 15 January 2015"},{"key":"3_CR12","unstructured":"Iosif, A., et al.: A community-based, graph API framework to integrate and orchestrate cloud-based services. In: Proceedings of AICCSA. IEEE Computer Society (2014), awaiting publication"},{"key":"3_CR13","unstructured":"Kleinfeld, R., et al.: OPENi Deliverable D3.6: OPENi Security and Privacy Specification, September 2014. \n                    http:\/\/www.openi-ict.eu\/wp-content\/uploads\/2014\/10\/OPENi_D3.6.pdf\n                    \n                  . Accessed 15 January 2015"},{"key":"3_CR14","unstructured":"McCarthy, D., et al.: OPENi Deliverable D3.5: OPENi Cloudlet Framework Design Document, September 2014. \n                    http:\/\/www.openi-ict.eu\/wp-content\/uploads\/2014\/10\/OPENi_D3.5.pdf\n                    \n                  . Accessed 15 January 2015"},{"key":"3_CR15","unstructured":"Mogul, R.: Data Security Lifecycle 2.0, September 2014. \n                    https:\/\/www.securosis.com\/blog\/data-security-lifecycle-2.0\n                    \n                  . Accessed 15 January 2015"},{"key":"3_CR16","series-title":"IFIP Advances in Information and Communication Technology","first-page":"153","volume-title":"Collaborative Systems for Smart Networked Environments","author":"E Biliri","year":"2014","unstructured":"Biliri, E., Tsouroplis, R., Lampathaki, F., Askounis, D., Petychakis, M., Alvertis, I.: Enterprise collaboration framework for managing, advancing and unifying the functionality of multiple cloud-based services with the help of a graph API. In: Camarinha-Matos, L.M., Afsarmanesh, H. (eds.) Collaborative Systems for Smart Networked Environments. IFIP AICT, vol. 434, pp. 153\u2013160. Springer, Heidelberg (2014)"}],"container-title":["Communications in Computer and Information Science","Cyber Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25360-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T23:55:35Z","timestamp":1559260535000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25360-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319253596","9783319253602"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25360-2_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]}}}