{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:10:53Z","timestamp":1743055853648,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319254135"},{"type":"electronic","value":"9783319254142"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25414-2_2","type":"book-chapter","created":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T13:29:05Z","timestamp":1451914145000},"page":"15-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Semantic Generation of Clouds Privacy Policies"],"prefix":"10.1007","author":[{"given":"Hanene Boussi","family":"Rahmouni","sequence":"first","affiliation":[]},{"given":"Kamran","family":"Munir","sequence":"additional","affiliation":[]},{"given":"Marco Casassa","family":"Mont","sequence":"additional","affiliation":[]},{"given":"Tony","family":"Solomonides","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Brandic, I., Dustdar, S., Anstett, T., Schumm, D., Leymann, F., Konrad, R.: Compliant cloud computing (C3): architecture and language support for user-driven compliance management in clouds. In: IEEE 3rd International Conference on Cloud Computing (2010)","DOI":"10.1109\/CLOUD.2010.42"},{"key":"2_CR2","unstructured":"EC.Directive 95\/46\/ECofthe European Parliament and of the Council (1995) (cited 2010). http:\/\/ec.europa.eu\/justice\/policies\/privacy\/law\/index_en.htm#directive"},{"key":"2_CR3","unstructured":"McCullagh, K.: Study of data protection: harmonization or confusion? In: Proceeding of the 21st BILETA Conference: Globalisation and Harmonisation in Technology Law. Malta (2006)"},{"key":"2_CR4","volume-title":"Implementation of the Data Protection Directive in Relation to Medical Research in Europe","author":"D Beyleveld","year":"2004","unstructured":"Beyleveld, D., Townend, D., Rouill\u00e9-Mirza, S., Wright, J.: Implementation of the Data Protection Directive in Relation to Medical Research in Europe. Ashgate Publishing Limited, UK (2004). ISBN-10: 0754623696"},{"issue":"7534","key":"2_CR5","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1136\/bmj.332.7534.165","volume":"332","author":"A Iversen","year":"2006","unstructured":"Iversen, A., Liddell, K., Fear, N., Hotopf, M., Consent, W.S.: Confidentiality and the data protection act. Br. Med. J. (Clin. Res. Ed.) 332(7534), 165\u2013169 (2006)","journal-title":"Br. Med. J. (Clin. Res. Ed.)"},{"key":"2_CR6","unstructured":"Italian Personal Data Protection Code (2003). http:\/\/www.privacy.it\/privacycode-en.html. Legislative Decreeno. 196 of 30 June 2003 (cited 2012)"},{"key":"2_CR7","unstructured":"The Open Cloud Standards Incubator (OCSI): Architecture for Managing Clouds, White Paper from the Open Cloud Standards Incubator 1.0, DMTF DSP-IS0102 (2010). http:\/\/www.dmtf.org\/standards\/published_documents\/DSP-IS0101_1.0.pdf"},{"key":"2_CR8","unstructured":"Horrocks, I., et al.: SWRL: a semantic web rule language combining OWL and RuleML (2004). http:\/\/www.w3.org\/Submission\/SWRL\/. Accessed 2013"},{"key":"2_CR9","unstructured":"OASIS XACML: eXtensible Access Control Markup Language (XACML), version 2.0 (2005). http:\/\/docs.oasisopen.org\/xacml\/2.0\/XACML-2.0-OSNORMATIVE.zip"},{"key":"2_CR10","unstructured":"Casassa Mont, M., Crosta, S., Kriegelstein, T., Sommer, D.: PRIME architecture V2. Deliverable D14.2.c. (2007). https:\/\/www.primeproject.eu\/prime_products\/reports\/arch\/pub_del_D14.2.c_ec_WP14.2_v1_Final.pdf. Accessed 2014"},{"key":"2_CR11","unstructured":"Sommer, D., Casassa Mont, M., Pearson, S.: PRIME architecture V3. Deliverable 14.2.d (2008). https:\/\/www.primeproject.eu\/prime_products\/reports\/arch\/pub_del_D14.2.d_ec_WP14.2_v3_Final.pdf. Accessed 2014"},{"key":"2_CR12","unstructured":"Casassa Mont, M., Shen, Y., Kounga, G., Pearson, S.: EnCoRe project deliverable D2.1. Technical Architecture for the First Realized Case Study [Online] (1.0) (2010). http:\/\/www.encoreproject.info. Accessed June 2014"},{"key":"2_CR13","doi-asserted-by":"publisher","first-page":"4057","DOI":"10.1098\/rsta.2010.0169","volume":"368","author":"HB Rahmouni","year":"2010","unstructured":"Rahmouni, H.B., Solomonides, T., Casassa Mont, M., Shiu, S.: Privacy compliance and enforcement on European healthgrids: an approach through ontology. Philos. Trans. R. Soc. 368, 4057\u20134072 (2010)","journal-title":"Philos. Trans. R. Soc."},{"issue":"4","key":"2_CR14","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3414\/ME10-01-0075","volume":"50","author":"HB Rahmouni","year":"2011","unstructured":"Rahmouni, H.B., Solomonides, T., Casassa, M.M., Shiu, S., Rahmouni, M.A.: Modeldriven privacy compliance decision support for medical data sharing in europe. Methods Inf. Med. 50(4), 326\u2013336 (2011)","journal-title":"Methods Inf. Med."},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Muppavarapu, V., Chung, S.M.: Semantic-based access control for grid data resources in open grid services architecture - data access and integration (OGSA-DAI). In: 20th IEEE International Conference on Tools with Artificia lIntelligence (ICTAI 2008), Dayton, Ohio, USA. IEEE Computer Society (2008)","DOI":"10.1109\/ICTAI.2008.148"},{"key":"2_CR16","unstructured":"Gowadia, V., Scalavino, E., Lupu, E., Aziz, B.: The consequence project, deliverable D3.1: models and framework for meta-data generation and policy infrastructure (2008). http:\/\/www.consequenceproject.eu\/Deliverables_Y1\/D3.1.pdf"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Matteucci, I., Petrocchi, M., Sbodio, M.L.: CNL4DSA \u2013 a controlled natural language for data sharing agreements. In: Proceedings of the 2010 ACM Symposium on Applied Computing, Sierre, Switzerland. ACM (2010)","DOI":"10.1145\/1774088.1774218"},{"key":"2_CR18","unstructured":"Boley, H., et al.: Schema specification of RuleML 1.0 (2010). http:\/\/ruleml.org\/1.0\/. Accessed 2012"},{"key":"2_CR19","unstructured":"Bechhofer, S., et al.: OWL web ontology language reference (2004). http:\/\/www.w3.org\/TR\/owl-ref\/. Accessed 2013"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-540-30504-0_13","volume-title":"Rules and Rule Markup Languages for the Semantic Web: Third International Workshop, RuleML","author":"K Wang","year":"2004","unstructured":"Wang, K., Billington, D., Blee, J., Antoniou, G.: Combining description logic and defeasible logic for the semantic web. In: Antoniou, G., Boley, H. (eds.) Rules and Rule Markup Languages for the Semantic Web: Third International Workshop, RuleML. Lecture Notes in Computer Science, pp. 170\u2013181. Springer, Heidelberg (2004)"},{"issue":"4\u20135","key":"2_CR21","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1006\/ijhc.1995.1081","volume":"43","author":"TR Gruber","year":"1995","unstructured":"Gruber, T.R.: Toward principles for the design of ontologies used for knowledge sharing. Int. J. Hum. Comput. Stud. 43(4\u20135), 907\u2013928 (1995)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Demchenko, Y., Koeroo, O., de Laat, C., Sagehaug, H.: Extending XACML authorisation model to support policy obligations handling in distributed applications. In: Proceedings of the 6th International Workshop on Middleware for Grid Computing. ACM (2008)","DOI":"10.1145\/1462704.1462709"},{"key":"2_CR23","doi-asserted-by":"publisher","unstructured":"Priebe, T. et al.: Supporting attribute-based access control with ontologies. ARES, pp. 465-472 (2006). doi:10.1109\/ARES.2006.127","DOI":"10.1109\/ARES.2006.127"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-540-27834-4_41","volume-title":"Web Engineering","author":"E Damiani","year":"2004","unstructured":"Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Extending policy languages to the semantic web. In: Fraternali, P., Koch, N., Wirsing, M. (eds.) ICWE 2004. LNCS, vol. 3140, pp. 330\u2013343. Springer, Heidelberg (2004)"},{"key":"2_CR25","unstructured":"Kolovski, V.: Formalizing XACML using defeasible description logics. Technical report TR-233-11. University of Maryland - College Park (2006)"},{"key":"2_CR26","unstructured":"Kolosvki, V.: Logic-based framework for web access control policies. Ph.D. thesis, Digital Repository at the University of Maryland, College Park, Md (2008)"},{"key":"2_CR27","unstructured":"Kolovski, V., Hendler, J.: XACML policy analysis using descriptionlogics (2008). http:\/\/www.mindswap.org\/~kolovski\/KolovskiXACMLAnalysis-JCSSubmission.pd. Accessed 2012"},{"key":"2_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-28166-2_7","volume-title":"Engineering Secure Software and Systems","author":"M Masi","year":"2012","unstructured":"Masi, M., Pugliese, R., Tiezzi, F.: Formalisation and implementation of the XACML access control mechanism. In: Livshits, B., Scandariato, R., Barthe, G. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 60\u201374. Springer, Heidelberg (2012)"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Bryans, J.W., Fitzgerald, J.S.: Formal engineering of XACML access control policies in VDM\u00a0++. In: Proceedings of the Formal Engineering Methods 9th International Conference on Formal Methods and Software Engineering, Boca Raton, FL, 14\u201315 November 2007","DOI":"10.1007\/978-3-540-76650-6_4"},{"key":"2_CR30","unstructured":"OASIS XACML: eXtensible Access Control Markup Language (XACML), version 3.0 (2013) http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.pdf. Accessed 2013"},{"key":"2_CR31","unstructured":"Rahmouni, H.B., Solomonides, T., Casassa Mont, M., Shiu, S.: Ontology based privacy compliance for health data disclosure in Europe. Ph.D. thesis, University of the West of England, Bristol (2011)"},{"key":"2_CR32","unstructured":"Powers, C., Adler, S., Wishart, B.: EPAL translation of the freedom of information and protection of privacy act. In: White Paper, IBM Tivoli and Information and Privacy Commissioner, Ontario (2004)"},{"key":"2_CR33","unstructured":"Ontario: freedom of information and protection of privacy act (2008). http:\/\/www.elaws.gov.on.ca\/html\/statutes\/english\/elaws_statutes_90f31_e.htm. Accessed 2013"}],"container-title":["Communications in Computer and Information Science","Cloud Computing and Services Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25414-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T11:04:25Z","timestamp":1697886265000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-25414-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319254135","9783319254142"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25414-2_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"30 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CLOSER","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Services Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2014","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 April 2014","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 April 2014","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"closer2014","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}